This reference list provides clickable links to those documents that exist only on the Web. The links go to the document itself or to an index page containing a link to the document. References to Internet RFCs include a link to the document at the Internet Engineering Task Force web site.
We have not provided links to items that are published in the literature because of their tendancy to decay. The published items are best retrieved by pasting title or author details into the excellent Citeseer publications database or search engines such as Google or Google Scholar.
Index to the list of references
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
Abadi, M. and Gordon, A.D. (1999). A calculus for cryptographic protocols: The spi calculus. Information and Computation, Vol. 148, No. 1, pp. 1-70. |
|
Abadi et al. 1998 |
Abadi, M., Birrell, A.D., Stata, R. and Wobber, E.P. (1998). Secure Web tunneling. In Proceedings of the 7th International World Wide Web Conference, pp. 531-9. |
Abrossimov et al. 1989 |
Abrossimov, V., Rozier, M. and Shapiro, M. (1989). Generic virtual memory management for operating system kernels. In Proceedings of 12th ACM Symposium on Operating System Principles, December, pp. 123-36. |
Accetta et al. 1986 |
Accetta, M., Baron, R., Golub, D., Rashid, R., Tevanian, A. and Young, M. (1986). Mach: A new kernel foundation for UNIX development. In Proceedings Summer 1986 USENIX Conference, pp. 93-112. |
Adjie-Winoto et al. 1999 |
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H. and Lilley, J. (1999). The design and implementation of an intentional naming system. In Proceedings of the 17th ACM Symposium on Operating System Principles, published as Operating Systems Review, Vol. 34, No. 5, pp. 186-201. |
Adve and Hill 1990 |
Adve, S. and Hill, M. (1990). Weak ordering – a new definition. In Proceedings 17th. Annual Symposium on Computer Architecture, IEEE, pp. 2-14. |
Agrawal et al. 1987 |
Agrawal, D., Bernstein, A., Gupta, P. and Sengupta, S. (1987). Distributed optimistic concurrency control with reduced rollback. Distributed Computing, Vol. 2, No 1, pp. 45-59. |
Ahamad et al. 1992 |
Ahamad, M., Bazzi, R., John, R., Kohli, P. and Neiger, G. (1992). The Power of Processor Consistencyy. Technical report GIT-CC-92/34, Georgia Institute of Technology, Atlanta, GA. |
Al-Muhtadi et al. 2002 |
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D. and Yi, S. (2002). Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02), Vienna, Austria, July, pp. 74-83. |
Albanna, Z., Almeroth, K., Meyer, D. and Schipper, M. (2001). IANA Guidelines for IPv4 Multicast Address Assignments. Internet RFC 3171. |
|
Alonso et al. 2004 |
Alonso, G., Casata, C., Kuno, H. and Machiraju, V. (2004). Web Services, Concepts, Architectures and Application s. Berlin, Heidelberg: Springer-Verlag. |
Anderson 1993 |
Anderson, D.P. (1993). Metascheduling for continuous media. ACM Transactions on Computer Systems, Vol. 11, No. 3, pp. 226-52. |
Anderson 1996 |
Anderson, R. J. (1996). The Eternity Service. In Proceedings of Pragocrypt ’96, pp.242-52. |
Anderson 2008 |
Anderson, R.J. (2008). Security Engineering., 2nd edn. John Wiley & Sons. |
Anderson et al. 1990 |
Anderson, D.P., Herrtwich, R.G. and Schaefer, C. (1990). SRP – A Resource Reservation Protocol for Guaranteed-Performance Communication in the Internet. Technical report 90-006, International Computer Science Institute, Berkeley, CA. |
Anderson et. al 1991 |
Anderson, T., Bershad, B., Lazowska, E. and Levy, H. (1991). Scheduler activations: Efficient kernel support for the user-level management of parallelism. In Proceedings of the 13th ACM Symposium on Operating System Principles, pp. 95–109. |
Anderson et al. 1995 |
Anderson, T., Culler, D., Patterson, D. and the NOW team. (1995). A case for NOW (Networks Of Workstations). IEEE Micro, Vol. 15, No. 1, pp.54-64. |
Anderson et al. 1996 |
Anderson, T.E., Dahlin, M.D., Neefe, J.M., Patterson, D.A., Roselli, D.S. and Wang, R.Y. (1996). Serverless Network File Systems. ACM Trans. on Computer Systems, Vol. 14, No. 1, pp. 41-79. |
Anderson et al. 2002 |
Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M. and Werthimer, D. (2002). SETI@home: An experiment in public-resource computing. Communications of the ACM, Vol. 45, No. 11, pp. 56-61. |
Anderson et al. 2004 |
Anderson, R., Chan, H. and Perrig, A. (2004). Key Infection: Smart trust for smart dust. In Proceedings of the IEEE 12th International Conference on Network Protocols (ICNP 2004), Berlin, Germany, October, pp. 206-215. |
Anderson et al. 2004 |
Explore the simplicity and comfort of controlling your type 2 diabetes with Semaglutide, now accessible for Rybelsus online purchase. Our reputable pharmacy provides genuine Rybelsus, an innovative oral treatment for type 2 diabetes management. |
ANSA 1989 |
ANSA (1989). The Advanced Network Systems Architecture (ANSA) Reference Manual. Castle Hill, Cambridge, England: Architecture Project Management. |
ANSI 1985 |
American National Standards Institute (1985). American National Standard for Financial Institution Key Management, Standard X9.17 (revised). |
Apache 2004 |
The Apache foundation (2004). Apache Tomcat. http://jakarta.apache.org/tomcat/ |
Armand et al. 1989 |
Armand, F., Gien, M., Herrman, F. and Rozier, M. (1989). Distributing UNIX brings it back to its original virtues. In Proc. Workshop on Experiences with Building Distributed and Multiprocessor Systems, October, pp. 153-174. |
Arnold et al. 1999 |
Arnold, K., O’Sullivan, B., Scheifler, R.W., Waldo, J. and Wollrath, A. (1999). The Jini Specification,. Reading, MA: Addison-Wesley. |
Amazon Web Service FAQs. |
|
Attiya and Welch 1998 |
Attiya, H. and Welch, J. (1998). Distributed Computing – Fundamentals, Simulations and Advanced Topics. Maidenhead, England. McGraw-Hill. |
Amazon Web Services. |
|
Babaoglu, O., Davoli, R., Montresor, A. and Segala, R. (1998). System support for partition-aware network applications. In Proceedings of the 18th International Conference on Distributed Computing Systems (ICDCS ‘ 98), pp. 184-191. |
|
Bacon 2002 |
Bacon, J. (2002). Concurrent Systems, 3rd Edn. Harlow, England: Addison-Wesley. |
Baker 1997 |
Baker, S. (1997). CORBA Distributed Objects Using Orbix. Harlow, England: Addison-Wesley. |
Bakken and Schlichting 1995 |
Bakken, D.E. and Schlichting, R.D. (1995). Supporting fault-tolerant parallel programming in Linda. IEEE Transactions Parallel and Distributed Systems, Vol. 6, No. 3, pp. 287302. |
Bal et al. 1990 |
Bal, H.E., Kaashoek, M.F. and Tanenbaum, A.S. (1990). Experience with distributed programming in Orca. In Proceedings of the International Conference on Computer Languages ’90, IEEE, pp. 79-89. |
Balakrishnan et al. 1995 |
Balakrishnan, H., Seshan, S. and Katz, R.H. (1995). Improving reliable transport and hand-off performance in cellular wireless networks. In Proceedings of the ACM Mobile Computing and Networking Conference, pp. 2-11. |
Balakrishnan et al. 1996 |
Balakrishnan, H., Padmanabhan, V., Seshan, S. and Katz, R. (1996). A comparison of mechanisms for improving TCP performance over wireless links. In Proceedings of the ACM SIGCOMM ’96 Conference, pp. 256-69. |
Balan et al. 2003 |
Balan, R.K., Satyanarayanan, M., Park, S., Okoshi, T. (2003). Tactics-Based Remote Execution for Mobile Computing. Proceedings First USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA, May, pp. 273-286. |
Balazinska et al. 2002 |
Balazinska, M., Balakrishnan, H. and Karger, D. (2002). INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery. In Proceedings Pervasive 2002 – International Conference on Pervasive Computing, Zurich, Switzerland, August, pp. 195-210. |
Baldoni et al. 2005 |
Baldoni, R. Beraldi, R., Cugola, G., Migliavacca, M. and Querzoni, L. (2005). Structure-less content-based routing in mobile ad hoc networks. In Proceedings International Conference on Pervasive Services, pp. 37-46. |
Baldoni and Virgillito 2005 |
Baldoni, R. and Virgillito, A. (2005). Distributed event routing in publish/ subscribe communication systems: A survey. Technical Report 15-05, Dipartimento di Informatica e Sistemistica, Universita di Roma La Sapienza. |
Baldoni et al. 2007 |
Baldoni, R., Beraldi, R., Quema, V., Querzoni, L. and Tucci-Piergiovanni, S. (2007). TERA: Topic-based event routing for peer-to-peer architectures. In Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems. Toronto, Ontario, Canada, June, pp. 2-13. |
Balfanz et al. 2002 |
Balfanz, D., Smetters, D.K., Stewart, P. and Wong, H.C. (2002). Talking to strangers: Authentication in ad-hoc wireless networks.In Proceedings Network and Distributed System Security Symposium, San Diego, CA, February. |
Banerjea and Mah 1991 |
Banerjea, A. and Mah, B.A. (1991). The real-time channel administration protocol. Second International Workshop on Network and Operating System Support for Digital Audio and Video, Heidelberg, Germany. |
Banga et al. 1999 |
Banga, G., Druschel, P. and Mogul, J. C. (1999). Resource containers: a new facility for resource management in server systems. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, Louisiana, USENIX Association, pp. 45-58. |
Baran 1964 |
Baran, P. (1964). On Distributed Communications . Research Memorandum RM-3420-PR, Rand Corporation. |
Barborak et al. 1993 |
Barborak, M., Malek, M. and Dahbura, A. (1993). The consensus problem in fault-tolerant computing. ACM Computing Surveys, Vol. 25, No. 2, pp. 171-220. |
Barghouti and Kaiser 1991 |
Barghouti, N.S. and Kaiser, G.E. (1991). Concurrency control in advanced database applications. ACM Computing Surveys, Vol. 23, No. 3, pp. 269-318. |
Barham et al. 2003a |
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I. and Warfield, A. (2003). Xen and the art of virtualization In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, October, pp. 164-177. |
Barham et al. 2003b |
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A.,Kotsovinos, E., Madhavapeddy, A.V.S., Neugebauer, R., Pratt, I. and Warfield, A. (2003). Xen 2002. Technical Report UCAM-CL-TR-553, Computing Laboratory, University of Cambridge. |
Barr and Asanovic 2003 |
Barr, K. and Asanovic, K. (2003). Energy aware lossless data compression. In Proceedings of the First USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA, May, pp. 231-244. |
Bartoli et al. 1993 |
Bartoli, A., Mullender, S.J. and van der Valk, M. (1993). Wide-address spaces – exploring the design space. ACM Operating Systems Review, Vol. 27, No. 1, pp. 11-17. |
Barton et al. 2002 |
Barton, J., Kindberg, T. and Sadalgi, S. (2002). Physical registration: Configuring electronic directories using handheld devices. IEEE Wireless Communications, Vol. 9, No. 1, pp. 30-38. |
Baset and Schulzrinne 2006 |
Baset, S.A. and Schulzrinne, H.G. (2006). An analysis of the Skype peer-to-peer Internet telephony protocol. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM06), pp. 111. |
Bates et al. 1996 |
Bates, J., Bacon, J., Moody, K. and Spiteri, M. (1996). Using events for the scalable federation of heterogeneous components. European SIGOPS Workshop. |
Baude et al. 2009 |
Baude, F., Caromel, D., Dalmasso, C., Danelutto, M., Getov, V., Henrio, L. and Pérez, C. (2009). GCM: A grid extension for Fractal autonomous distributed components. Annals of Telecommunications, Springer, Vol. 64, No. 1, pp. 5-24. |
Bell and LaPadula 1975 |
Bell, D.E. and LaPadula, L.J. (1975). Computer Security Model: Unified Exposition and Multics Interpretation. Mitre Corporation. |
Bellman 1957 |
Bellman, R.E. (1957). Dynamic Programming . Princeton, NJ: Princeton University Press. |
Bellovin and Merritt 1990 |
Bellovin, S.M. and Merritt, M. (1990). Limitations of the Kerberos authentication system. ACM Computer Communications Review, Vol. 20, No. 5, pp. 119-32. |
Bellwood, T., Clément, L. and von Riegen, C. (eds.) (2003). UDDI Version 3.0.1. Oasis Corporation. |
|
Beresford and Stajano 2003 |
Beresford, A. and Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, Vol. 2, No. 1, Jan.-Mar., pp. 46-55. |
Berners-Lee, T. (1991). World Wide Web Seminar. |
|
Berners-Lee 1999 |
Berners-Lee, T. (1999). Weaving the Web. New York: HarperCollins. |
Berners Lee, T., Fielding, R. and Masinter, L. (2005). Uniform Resource Identifiers (URI): Generic syntax. Internet RFC 3986. |
|
Bernstein et al. 1980 |
Bernstein, P.A., Shipman, D.W. and Rothnie, J.B. (1980). Concurrency control in a system for distributed databases (SDD-1). ACM Transactions on Database Systems, Vol. 5, No. 1, pp. 18-51. |
Bernstein, P., Hadzilacos, V. and Goodman, N. (1987). Concurrency Control and Recovery in Database Systems. Reading, MA: Addison-Wesley. Text available online. |
|
Bershad et al. 1990 |
Bershad, B., Anderson, T., Lazowska, E. and Levy, H. (1990). Lightweight remote procedure call. ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 37-55. |
Bessani et al. 2008 |
Bessani, A. N., Alchieri, E. P., Correia, M., and Fraga, J. S. (2008). DepSpace: a byzantine fault-tolerant coordination service. In Proceedings of the 3rd ACM Sigops/Eurosys European Conference on Computer Systems. Glasgow, Scotland, April. pp.163-176. |
Bershad et al. 1991 |
Bershad, B., Anderson, T., Lazowska, E. and Levy, H. (1991). User-level interprocess communication for shared memory multiprocessors. ACM Transactions on Computer Systems, Vol. 9, No. 2, pp. 175-198. |
Bershad et al. 1993 |
Bershad, B., Zekauskas, M. and Sawdon, W. (1993). The Midway distributed shared memory system. In Proceedings IEEE COMPCON Conference, IEEE, pp. 528-37. |
Bershad et al. 1995 |
Bershad, B., Savage, S., Pardyak, P., Sirer, E., Fiuczynski, M., Becker, D., Chambers, C. and Eggers, S. (1995). Safety and performance in the SPIN operating system. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 267-84. |
Bhagwan et al. 2003 |
Bhagwan, R., Savage, S. and Voelker, G. (2003). Understanding availability. In Proc. 2nd International Workshop on Peer-to-Peer Systems (IPTPS ’03), Berkeley, CA, February 2003. |
Bessani et al. 2008 |
Bessani, A. N., Alchieri, E. P., Correia, M. and Fraga, J. S. (2008). DepSpace: A Byzantine fault-tolerant coordination service. In Proceedings of the 3rd ACM Sigops/Eurosys European Conference on Computer Systems. Glasgow, Scotland, April, pp.163-176. |
Bhatti and Friedrich 1999 |
Bhatti, N. and Friedrich, R. (1999). Web Server Support for Tiered Services. Hewlett-Packard Corporation Technical Report HPL-1999-160. |
Birman 1993 |
Birman, K.P. ( 1993 ). The process group approach to reliable distributed computing. Comms. ACM, Vol. 36, No. 12, pp. 36-53. |
Birman 1996 |
Birman, K.P. (1996). Building Secure and Reliable Network Applications. Greenwich, CT: Manning. |
Birman 2004 |
Birman, K.P. (2004). Like it or not, web services are distributed objects! Comms. of the ACM. Vol. 47, No. 12, pp. 60-62. |
Birman 2005 |
Birman, K.P. (2005). Reliable Distributed Systems: Technologies, Web Services and Applications.Springer-Verlag. |
Birman and Joseph 1987a |
Birman, K.P. and Joseph, T.A. (1987). Reliable communication in the presence of failures. ACM Transactions on Computer Systems, Vol. 5, No. 1, pp. 47-76. |
Birman and Joseph 1987b |
Birman, K. and Joseph, T. (1987). Exploiting virtual synchrony in distributed systems. In Proceedings of the 11th ACM Symposium on Operating Systems Principles, pp. 123-38. |
Birman et al. 1991 |
Birman, K.P., Schiper, A. and Stephenson, P. (1991). Ligh tweight causal and atomic group multicast. ACM Transactions on Computer Systems, Vol. 9, No. 3, pp. 272-314. |
Birrell and Needham 1980 |
Birrell, A.D. and Needham, R.M. (1980). A universal file server. IEEE Transactions Software Engineering, Vol. SE-6, No. 5, pp. 450-3. |
Birrell and Nelson 1984 |
Birrell, A.D. and Nelson, B.J. (1984). Implementing remote procedure calls. ACM Transactions on Computer Systems, Vol. 2, No. 1, pp. 39-59. |
Birrell et al. 1982 |
Birrell, A.D., Levin, R., Needham, R.M. and Schroeder, M.D. (1982). Grapevine: An exercise in distributed computing. Comms. ACM, Vol. 25, No. 4, pp. 260-73. |
Birrell et al. 1995 |
Birrell, A., Nelson, G. and Owicki, S. (1993). Network objects. In Proceedings 14th ACM Symposium on Operating Systems Principles, pp. 217-30. |
Bishop and Warren 2003 |
Bishop, P. and Warren, N. (2003). JavaSpaces in Practice. Pearson Education. |
Bisiani and Forin 1988 |
Bisiani, R. and Forin, A. (1988). Multilanguage parallel programming of heterogeneous machines. IEEE Transactions Computers, Vol. 37, No. 8, pp. 930-45. |
Bisiani and Ravishankar 1990 |
Bisiani, R. and Ravishankar, M. (1990). Plus: a distributed shared memory system. In Proceedings 17th International Symposium on Computer Architecture, pp. 115-24. |
Black 1990 |
Black, D. (1990). Scheduling s upport for concurrency and parallelism in the Mach operating system. IEEE Computer, Vol. 23, No. 5, pp. 35-43. |
Black and Artsy 1990 |
Black, A. and Artsy, Y. (1990). Implementing location independent invocation, IEEE Transactions Parallel and Distributed Systems, Vol. 1, No. 1. |
Blair and Stefani 1997 |
Blair, G.S. and Stefani, J.-B. (1997). Open Distributed Processing and Multimedia. Harlow, England: Addison-Wesley. |
Blakley 1999 |
Blakley, R. (1999). CORBA Security – An Introduction to Safe Computing with Objects. Reading, MA: Addison-Wesley. |
Bloch 2006 |
Bloch, J. (2006). How to design a good API and why it matters. In Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications. (OOPSLA ’06), Portland, Oregon, pp. 506-507. |
Bolosky et al. 1996 |
Bolosky, W., Barrera, J., Draves, R., Fitzgerald, R., Gibson, G., Jones, M., Levi, S., Myhrvold, N. and Rashid, R. (1996). The Tiger video fileserver. In Proc. of the 16th NOSSDAV Conference, Zushi, Japan, April. |
Bolosky et al. 1997 |
Bolosky, W., Fitzgerald, R. and Douceur, J. (1997). Distributed schedule management in the Tiger video fileserver, 16th ACM Symposium on Operating System Principles, St Malo, France, October, pp. 212-23,. |
Bolosky et al. 2000 |
Bolosky, W.J., Douceur, J.R., Ely, D. and Theimer, M. (2000). Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In Proceedings of the International Conference on Measurement and Modeling of Computer Systems, pp. 34-43. |
Bonnaire et al. 1995 |
Bonnaire, X., Baggio, A. and Prun, D. (1995). Intrusion free monitoring: An observation engine for message server based applications. In Proceedings of the 10th International Symposium on Computer and Information Sciences (ISCIS X), pp. 541-48. |
Booch et al. 2005 |
Booch, G., Rumbaugh, J. and Jacobson, I. (2005). Intrusion free monitoring: an observation engine for message server based applications. The Unified Modeling Language User Guide,2nd edn. Reading, MA: Addison-Wesley. |
Borisov et al. 2001 |
Borisov, N., Goldberg, I. and Wagner, D. (2001). Intercepting mobile communications: The insecurity of 802.11. In Proceedings of MOBICOM 2001, pp.180-9. |
Bowman et al. 1990 |
Bowman, M., Peterson, L. and Yeatts, A. (1990). Univers: an attribute-based name server. Software-Practice and Experience, Vol. 20, No. 4, pp. 403-24. |
Box 1998 |
Box, D. (1998). Essential COM. Reading, MA: Addison-Wesley. |
Box, D. and Curbera, F. (2004). Web Services Addressing (WS-Addressing ), BEA Systems, IBM and Microsoft. August. |
|
Boxee. Home page |
|
Boykin et al. 1993 |
Boykin, J., Kirschen, D., Langerman, A. and LoVerso, S. (1993). Programming under Mach. Reading, MA: Addison-Wesley. |
Bray and Sturman 2002 |
Bray, J. and Sturman. C.F. (2002). Bluetooth: Connect Without Cables, 2nd edn. Upper Saddle River, NJ: Prentice Hall. |
Bruneton et al. 2006 |
Bruneton, E., Coupaye, T., LeClercq, M., Quema, V. and Stefani, J.B. (2006). The Fractal component model and its support in Java. Software – Practice and Experience, Vol. 36, Nos. 11-12, pp. 1257-1284. |
Buford 1994 |
Buford, J.K. (1994). Multimedia Systems. Addison-Wesley. |
Burns and Wellings 1998 |
Burns, A. and Wellings, A. (1998). Concurrency in Ada. Cambridge, England: Cambridge University Press. |
Burrows et al. 1989 |
Burrows, M., Abadi, M. and Needham, R. (1989). A logic of authentication. Technical Report 39. Palo Alto, CA: Digital Equipment Corporation Systems Research Center. |
Burrows et al. 1990 |
Burrows, M., Abadi, M. and Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36. |
Burrows 2006 |
Burrows, M. (2006). The Chubby lock service for loosely-coupled distributed systems. In Proc. of the 7th Symposium on Operating Systems Design and Implementation,Seattle, WA, pp. 335-350. |
Bush 1945 |
Bush, V. (1945). As we may think. The Atlantic Monthly, July. |
Bushmann et al. 2007 |
Bushmann, F., Henney, K. and Schmidt, D.C. (2007). Pattern-Oriented Software Architecture: A Pattern for Distributed Computing. New York: John Wiley & Sons. |
Busi et al. 2003 |
Busi, N., Manfredini, C., Montresor, A. and Zavattaro, G. (2003) PeerSpaces: Data-driven coordination in peer-to-peer networks. In Proceedings of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, March, pp. 380-386. |
Callaghan, B. (1996). WebNFS Client Specification. Internet RFC 2054. |
|
Callaghan, B. (1996). WebNFS Server Specification. Internet RFC 2055. |
|
Callaghan 1999 |
Callaghan, B. (1999). NFS Illustrated, Reading, MA: Addison-Wesley. |
Callaghan, B., Pawlowski, B. and Staubach, P. (1995). NFS Version 3 Protocol Specification. Internet RFC 1813, Sun Microsystems. |
|
Campbell 1997 |
Campbell, R. (1997). Managing AFS: The Andrew File System, Upper Saddle River, NJ: Prentice-Hall. |
Campbell et al. 1993 |
Campbell, R., Islam, N., Raila, D. and Madany, P. (1993). Designing and implementing Choices: An object-oriented system in C++. Comms. ACM, Vol. 36, No. 9, pp. 117-26. |
Canetti and Rabin 1993 |
Canetti, R. and Rabin, T. (1993). Fast asynchronous Byzantine agreement with optimal resilience. In Proceedings 25th of the ACM Symposium on Theory of Computing, pp. 42-51. |
Cao and Singh 2005 |
Cao, F. and Singh, J. P. (2005). MEDYM: Match-early with dynamic multicast for content-based publish-subscribe networks. In Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware, Grenoble, France, November, pp. 292-313. |
Carriero and Gelernter 1989 |
Carriero, N. and Gelernter, D. (1989). Linda in context. Comms. ACM, Vol. 32, No. 4, pp. 444-58. |
Carriero et al. 1995 |
Carriero, N., Gelernter, D. and Zuck, L. (1995). Bauhaus Linda. In LNCS 924: Object-based models and languages for concurrent systems, Berlin, Heidelberg: Springer-Verlag. pp. 66-76. |
Carter et al. 1991 |
Carter, J.B., Bennett, J.K. and Zwaenepoel, W. (1991). Implementation and performance of Munin. In Proceedings of the 13th ACM Symposium on Operating System Principles, pp. 152-64. |
Carter et al. 1998 |
Carter, J., Ranganathan, A. and Susarla, S. (1998). Khazana, an infrastructure for building distributed services. In Proceedings of ICDCS ’98. Amsterdam, The Netherlands, pp. 562-71. |
Carzaniga et al. 2001 |
Carzaniga, A., Rosenblum, D. S. and Wolf, A. L. (2001). Design and evaluation of a wide-area event notification service. ACM Trans. on Computer Systems, Vol. 19, No. 3, pp. 332-383. |
Castro and Liskov 2000 |
Castro, M. and Liskov, B. (2000). Proactive recovery in a Byzantine-fault-tolerant system, Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI ’00), San Diego, CA, October, p. 19. |
Castro et al. 2002a |
Castro, M., Druschel, P., Hu, Y.C. and Rowstron, A. (2002). Topology-aware routing in structured peer-to-peer overlay networks. Technical Report MSR-TR-2002-82, Microsoft Research, 2002. http://www.research.microsoft.com/~antr/PAST/location.pdf |
Castro et al. 2002b |
Castro, M., Druschel, P., Kermarrec, A.-M. and Rowstron, A.. (2002). SCRIBE: A large-scale and decentralised application-level multicast infrastructure. in IEEE Journal on Selected Areas in Communication (JSAC), Vol. 20, No, 8,pp. 1489-99. |
Castro, M., Costa, M. and Rowstron, A. (2003). Performance and dependability of structured peer-to-peer overlays. Technical Report MSR-TR-2003-94, Microsoft Research, 2003. |
|
CCITT 1988a |
CCITT (1988). Recommendation X.500 : The Directory – Overview of Concepts, Models and Service. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland. |
CCITT 1988b |
CCITT (1988). Recommendation X.509: The Directory – Authentication Framework. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland. |
CCITT 1990 |
CCITT (1990). Recommendation I.150 : B-ISDN ATM Functional Characteristics. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland. |
Ceri and Owicki 1982 |
Ceri, S. and Owicki, S. (1982). On the use of optimistic methods for concurrency control in distributed databases. In Proceedings of the 6th Berkeley Workshop on Distributed Data Management and Computer Networks, Berkeley, CA. pp. 117-30. |
Ceri and Pelagatti 1985 |
Ceri, S. and Pelagatti, G. (1985). Distributed Databases – Principles and Systems.Maidenhead, England: McGraw-Hill. |
Chalmers et al. 2004 |
Chalmers, D., Dulay, N. and Sloman, M. (2004). Meta data to support context aware mobile applications. In Proceedings of the IEEE Intl. Conference on Mobile Data Management (MDM 2004), Berkeley, CA, January, pp. 199-210. |
Chandra and Toueg 1996 |
Chandra, T. and Toueg, S. (1996). Unreliable failure detectors for reliable distributed systems. Journal of the ACM, Apr., Vol. 43, No. 2, pp. 225-67. |
Chandra et al. 2007 |
Chandra, T. D., Griesemer, R. and Redstone, J. (2007). Paxos made live: An engineering perspective. In Proc. of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC07, Portland, Oregon, pp. 398-407. |
Chandy and Lamport 1985 |
Chandy, K. and Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems, Vol. 3, No. 1, pp. 63-75. |
Chang and Maxemchuk 1984 |
Chang, J. and Maxemchuk, N. (1984). Reliable broadcast protocols. ACM Transactions on Computer Systems, Vol. 2. No. 3. pp. 251-75. |
Chang and Roberts 1979 |
Chang, E.G. and Roberts, R. (1979). An improved algorithm for decentralized extrema-finding in circular configurations of processors. Comms. ACM, Vol. 22, No. 5, pp. 281-3. |
Chang et al. 2008 |
Chang, F., Dean, J., Ghemawat, S., Hsieh, W., Wallach, D., Burrows, M., Chandra, T., Fikes, A. and Gruber, R. (2008). Bigtable: A distributed storage system for structured data. In ACM Trans. on Computer Systems Vol. 26, No. 2, pp. 1-26. |
Charron-Bost 1991 |
Charron-Bost, B. (1991). Concerning the size of logical clocks in distributed systems. Information Processing Letter s, Vol. 39, No. 1, pp. 11-16. |
Chaum 1981 |
Chaum, D. (1981). Untraceable electronic mail, return addresses and digital pseudonyms. Comms. ACM, Vol. 24, No. 2, pp. 84-88. |
Chen et al. 1994 |
Chen, P., Lee, E., Gibson, G., Katz, R. and Patterson, D. (1994). RAID: High-performance, reliable secondary storage. ACM Computing Surveys, Vol. 26, No. 2, pp. 145-188. |
Cheng 1998 |
Cheng, C.K. (1998). A survey of media servers. Hong Kong University CSIS, November. |
Cheng et al. 2005 |
Cheng, Y-C., Chawathe, Y., LaMarca, A. and Krumm J. (2005.) Accuracy characterization for metropolitan-scale Wi-Fi localization. In Third International Conference on Mobile Systems, Applications, and Services (MobiSys 2005), June. |
Cheriton 1984 |
Cheriton, D.R. (1984). The V kernel: a software base for distributed systems. IEEE Software, Vol. 1, No. 2, pp. 19-42. |
Cheriton 1985 |
Cheriton, D.R. (1985). Preliminary thoughts on problem-oriented shared memory: a decentralized approach to distributed systems. ACM Operating Systems Review, Vol. 19, No. 4, pp. 26-33. |
Cheriton 1986 |
Cheriton, D.R. (1986). VMTP: A protocol for the next generation of communication systems.In Proceedings of the SIGCOMM ’86 Symposium on Communication Architectures and Protocols, pp. 406-15. |
Cheriton and Mann 1989 |
Cheriton, D. and Mann, T. (1989). Decentralizing a global naming service for improved performance and fault tolerance. ACM Transactions on Computer Systems, Vol. 7, No. 2, pp. 147-83. |
Cheriton and Skeen 1993 |
Cheriton, D. and Skeen, D. (1993). Understanding the limitations of causally and totally ordered communication. In Proceedings of the 14th ACM Symposium on Operating System Principles, Dec., pp. 44-57. |
Cheriton and Zwaenepoel 1985 |
Cheriton, D.R. and Zwaenepoel, W. (1985). Distributed process groups in the V kernel. ACM Transactions on Computer Systems, Vol. 3, No. 2, pp. 77-107. |
Cheswick and Bellovin 1994 |
Cheswick, E.R. and Bellovin, S.M. (1994). Firewalls and Internet Security. Reading, MA: Addison-Wesley. |
Chien 2004 |
Chien, A. (2004). Massively distributed computing: virtual screening on a desktop Grid. In Foster, I. and Kesselman, C. (eds.), The Grid 2. San Francisco, CA: Morgan Kauffman. |
Chisnall 2007 |
Chisnall, D. (2007). The Definitive Guide to the Xen Hypervisor, Upper Saddle River: Prentice Hall. |
Choudhary et al. 1989 |
Choudhary, A., Kohler, W., Stankovic, J. and Towsley, D. (1989). A modified priority based probe algorithm for distributed deadlock detection and resolution. IEEE Transactions Software Engineering, Vol. 15, No. 1, pp. 10-17. |
Chu et al. 2000 |
Chu,Y.-H., Rao, S.G. and Zhang, H. (2000). A case for end system multicast. In Proc. of ACM Sigmetrics, June, pp. 1-12. |
Cilia et al. 2004 |
Cilia, M., Antollini, M., Bornhövd, C. and Buchmann, A. (2004). Dealing with heterogeneous data in pub/sub systems: The concept-based approach. In Proceedings of the International Workshop on Distributed Event-Based Systems, Edinburgh, Scotland, May, pp. 26–31. |
Clark, D.D. (1982). Window and Acknowledgement Strategy in TCP, Internet RFC 813. |
|
Clark 1988 |
Clark, D.D. (1988). The design philosophy of the DARPA Internet protocols. ACM SIGCOMM Computer Communication Review, Vol. 18, No. 4, August, pp. 106-114. |
Clarke et al. 2000 |
Clarke, I., Sandberg, O., Wiley, B. and Hong, T. (2000). Freenet: A distributed anonymous information storage and retrieval system. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, pp. 46–66. |
Protocol buffers. Home page. |
|
Protocol buffers. Developer guide: techniques. |
|
Protocol buffers. Third-party add-ons (RPC implementations). |
|
Cohen, B. (2003). Incentives build robustness in BitTorrent. May 2003, Internet publication. |
|
Comer 2006 |
Comer, D. E. ( 2006 ). Internetworking with TCP/IP, Volume 1: Principles, Protocols and Architecture, 5th edn. Upper Saddle River, NJ: Prentice-Hall. |
Comer 2007 |
Comer, D. E. (2007). The Internet Book, 4th edn. Upper Saddle River, NJ: Prentice-Hall. |
Condict et al. 1994 |
Condict, M., Bolinger, D., McManus, E., Mitchell, D. and Lewontin, S. (1994). Microkernel modularity with integrated kernel performance. Technical report, OSF Research Institute, Cambridge, MA, April. |
Coulouris et al. 1998 |
Coulouris, G.F., Dollimore, J. and Roberts, M. (1998). Role and task-based access control in the PerDiS groupware platform. Third ACM Workshop on Role-Based Access Control, George Mason University, Washington, DC, October 22-23. |
Coulson et al. 2008 |
Coulson, G., Blair, G., Grace, P., Taiani, F., Joolia, A., Lee, K., Ueyama, J. and Sivaharan, T. (2008). A generic component model for building systems software. ACM Trans. on Computer Systems, Vol. 26, No. 1, pp. 1-42. |
Cristian 1989 |
Cristian, F. (1989). Probabilistic clock synchronization. Distributed Computing, Vol. 3, pp. 146-58. |
Cristian 1991 |
Cristian, F. (1991). Reaching agreement on processor group membership in synchronous distributed systems. Distributed Computing, Vol. 4, pp. 175-87. |
Cristian and Fetzer 1994 |
Cristian, F. and Fetzer, C. (1994). Probabilistic internal clock synchronization. In Proceedings of the 13th Symposium on Reliable Distributed Systems, October, pp. 22–31. |
Crow et al. 1997 |
Crow, B., Widjaja, I., Kim, J. and Sakai, P. (1997). IEEE 802.11 wireless local area networks. IEEE Communications Magazine, Vol. 35, No. 9, pp. 116–26. |
cryptography.org |
North American Cryptography Archives. http://cryptography.org/ |
Culler et al. 2001 |
Culler, D.E., Hill, J., Buonadonna, P., Szewczyk, R. and Woo, A. (2001). A network-centric approach to embedded software for tiny devices. Proceedings of the First International Workshop on Embedded Software, Tahoe City, CA, October, pp. 114–130. |
Culler et al. 2004 |
Culler, D., Estrin, D. and Srivastava, M. (2004). Overview of sensor networks. IEEE Computer, Vol. 37, No. 8, pp. 41–49. |
Curtin and Dolske 1998 |
Kurtin, M. and Dolski, J. (1998). A brute force search of DES Keyspace. ;login: – the Newsletter of the USENIX Association, May. |
Custer 1998 |
Custer, H. (1998). Inside Windows NT, 2nd edn.. Redmond, WA: Microsoft Press.
|
Czerwinski et al. 1999 |
Czerwinski, S., Zhao, B., Hodes, T., Joseph, A. and Katz, R. (1999). An architecture for a secure discovery service. In Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks. Seattle, WA, pp. 24–53. |
Dabek, F., Kaashoek, M.F., Karger, D., Morris, R. and Stoica, I. (2001). Wide-area cooperative storage with CFS. In Proc. of the ACM Symposium on Operating System Principles, October, pp. 202-15. |
|
Dabek et al. 2003 |
Dabek, F., Zhao, B., Druschel, P., Kubiatowicz, J. and Stoica, I.(2003). Ion Stoica, Towards a common API for structured peer-to-peer overlays. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS ’03), Berkeley, CA, February, pp. 33–44. |
Daemen and Rijmen 2000 |
Daemen, J. and Rijmen, V. (2000). The block cipher Rijndael. Quisquater, J.-J. and Schneier, B.(eds.). Smart Card Research and Applications, LNCS 1820. Springer-Verlag, pp. 288–296. |
Daemen and Rijmen 2002 |
Daemen, J. and Rijmen, V. (2002). The Design of Rijndael: AES – The Advanced Encryption Standard, New York: Springer-Verlag. |
Dasgupta et al. 1991 |
Dasgupta, P., LeBlanc Jr,, R.J., Ahamad, M. and Ramachandran, U. (1991). The Clouds distributed operating system. IEEE Computer, Vol. 24, No. 11, pp. 34-44. |
Davidson 1984 |
Davidson, S.B. ( 1984 ). Optimism and consistency in partitioned database systems. ACM Transactions on Database Systems, Vol. 9, No. 3, pp. 456-81. |
Davidson et al. 1985 |
Davidson, S.B., Garcia-Molina, H. and Skeen, D. (1985). Consistency in partitioned networks. Computing Surveys, Vol. 17, No. 3, pp. 341-70. |
Davies et al. 1998 |
Davies, N., Friday, A., Wade, S. and Blair, G. (1998). L2imbo: A distributed systems platform for mobile computing. Mobile Networks and Applications, Vol. 3, No. 2, pp. 143-156. |
de Ipiña et al. 2002 |
de Ipiña, D.L., Mendonça, P. and Hopper, A. (2002). TRIP: A low-cost vision-based location system for ubiquitous computing. Personal and Ubiquitous Computing, Vol. 6, No. 3, pp. 206-219. |
Dean 2006 |
Dean, J. (2006). Experiences with MapReduce, an abstraction for large-scale computation. In Proc. of the 15th International Conference on Parallel Architectures and Compilation Techniques, (PACT06), Seattle, WA. |
Dean and Ghemawat 2004 |
Dean, J. and Ghemawat, S. (2004). MapReduce: Simplified data processing on large clusters. In Proc. of Operating System Design and Implementation, (OSDI04), San Francisco, CA, pp. 137-150. |
Dean and Ghemawat 2008 |
Dean, J. and Ghemawat, S. (2008). MapReduce: simplified data processing on large clusters. Comms. ACM, Vol. 51, No. 1, pp. 107-113. |
Dean and Ghemawat 2010 |
Dean, J. and Ghemawat, S. (2010). MapReduce: a flexible data processing tool. Comms. ACM, Vol. 53, No. 1, pp. 72-77. |
Debaty and Caswell 2001 |
Debaty, P. and Caswell, D. (2001). Uniform web presence architecture for people, places, and things. IEEE Personal Communications, Vol. 8, No. 4, pp. 6-11. |
DEC 1990 |
Digital Equipment Corporation (1990). In Memoriam: J. C. R. Licklider 1915-1990. Technical Report 61, DEC Systems Research Center. |
DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P. and Vogels, W. (2007). Dynamo: Amazon’s highly available key-value store. SIGOPS Oper. Syst. Rev, Vol. 41, No. 6, pp. 205-220.. |
|
Delgrossi et al. 1993 |
Delgrossi, L., Halstrick, C., Hehmann, D., Herrtwich, R.G., Krone, O., Sandvoss, J. and Vogt, C. (1993). Media scaling for audiovisual communication with the Heidelberg transport system. ACM Multimedia ‘ 93, Anaheim, CA. |
Demers et al. 1989 |
Demers, A., Keshav, S. and Shenker, S. (1989). Analysis and simulation of a fair queueing algorithm. ACM SIGCOMM ‘ 89. |
Denning and Denning 1977 |
Denning, D. and Denning, P. (1977). Certification of programs for secure information flow. Comms. ACM, Vol. 20, No. 7, pp. 504-13. |
Dertouzos 1974 |
Dertouzos, M.L. (1974). Control robotics – the procedural control of physical processes. IFIP Congress. |
Dierks, T. and Allen, C. (1999). The TLS Protocol Version 1.0. Internet RFC 2246. |
|
Diffie 1988 |
Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, Vol. 76, No. 5, pp. 560-77. |
Diffie and Hellman 1976 |
Diffie, W. and Hellman, M.E. (1976). New directions in cryptography. IEEE Transactions Information Theory, Vol. IT-22, pp. 644-54. |
Diffie and Landau 1998 |
Diffie, W. and Landau, S. (1998). Privacy on the Line. Cambridge, MA: MIT Press. |
Dijkstra 1959 |
Dijkstra, E.W. (1959). A note on two problems in connection with graphs. Numerische Mathematic, Vol. 1, pp. 269-71. |
Dilley, J., Maggs, B., Parikh, J., Prokop, H., Sitaraman, R. and Weihl, B. (2002). Globally distributed content delivery. IEEE Internet Computing, Vol. 6, No. 5, pp 50-58. |
|
Dingledine et al. 2000 |
Dingledine, R., Freedman, M.J. and Molnar, D. (2000). The Free Haven project: Distributed anonymous storage service. In Proc. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July, pp. 67-95. |
Dolev and Malki 1996 |
Dolev, D. and Malki, D. (1996). The Transis approach to high availability cluster communication. Comms. ACM, Vol. 39, No. 4, pp. 64-70. |
Dolev and Strong 1983 |
Dolev, D. and Strong, H. (1983). Authenticated algorithms for byzantine agreement. SIAM Journal of Computing, Vol. 12, No. 4, pp. 656-66. |
Dolev et al. 1986 |
Dolev, D., Halpern, J., and Strong, H. (1986). On the possibility and impossibility of achieving clock synchronization. Journal of Computing Systems Science, Vol. 32, No. 2, pp. 230-50. |
Dorcey 1995 |
Dorcey, T. (1995). CU-SeeMe desktop video conferencing software, Connexions, Vol. 9, No. 3, pp. 42-45. |
Douceur and Bolosky 1999 |
Douceur, J.R. and Bolosky, W. (1999). Improving responsiveness of a stripe-scheduled media server. In Proc. IS &T/SPIE Conf. on Multimedia Computing and Networking, pp. 192–203. |
Douglis and Ousterhout 1991 |
Douglis, F. and Ousterhout, J. (1991). Transparent process migration: Design alternatives and the Sprite implementation, Software – Practice and Experience, Vol. 21, No. 8, pp. 757-89. |
Draves 1990 |
Draves, R. (1990). A revised IPC interface. In Proceedings USENIX Mach Workshop, pp. 101-21, October. |
Draves et al. 1989 |
Draves, R.P., Jones, M.B. and Thompson, M.R. (1989). MIG – the Mach Interface Generator. Technical Report, Dept. of Computer Science, Carnegie-Mellon University. |
Druschel and Peterson 1993 |
Druschel, P. and Peterson, L. (1993). Fbufs: a high-bandwidth cross-domain transfer facility. In Proceedings 14th ACM Symposium on Operating System Principles, pp. 189-202. |
Druschel and Rowstron 2001 |
Druschel, P. and Rowstron, A. (2001). PAST: A large-scale, persistent peeer-to-peer storage utility. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May, pp. 75-80. |
Dubois et al. 1988 |
Dubois, M., Scheurich, C. and Briggs, F.A. (1988). Synchronization, coherence and event ordering in multiprocessors. IEEE Computer, Vol. 21, No. 2, pp. 9-21. |
Dwork et al. 1988 |
Dwork, C., Lynch, N. and Stockmeyer, L. (1988). Consensus in the presence of partial synchrony. Journal of the ACM, Vol. 35, No. 2, pp. 288-323. |
Eager, D., Lazowska, E. and Zahorjan, J. (1986). Adaptive load sharing in homogeneous distributed systems. IEEE Transactions on Software Engineering, Vol. SE-12, No. 5, pp. 662-675. |
|
Google Earth Home page. |
|
Edney and Arbaugh 2003 |
Edney, J. and Arbaugh, W. (2003). Real 802.11 Security: Wi-Fi Protected. Boston, MA: Pearson Education. |
Edwards and Grinter 2001 |
Edwards, W.K. and Grinter, R. (2001). At home with ubiquitous computing: Seven challenges. In Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, Sep.–Oct., pp. 256–272. |
Edwards et al. 2002 |
Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F. and Izadi, S. (2002). Challenge: Recombinant computing and the speakeasy approach. In Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MobiCom 2002), Atlanta, GA, September, pp. 279–286. |
EFF 1998 |
Electronic Frontier Foundation (1998). Cracking DES, Secrets of Encryption Research, Wiretap Politics & Chip Design. Sebastapol, CA: O’Reilly & Associates. |
Egevang, K. and Francis, P. (1994). The IP Network Address Translator (NAT). Internet RFC 1631. |
|
Eisler, M., Chiu, A. and Ling, L. (1997). RPCSEC_GSS Protocol Specification. Sun Microsystems, Internet RFC 22. | |
El Abbadi et al. 1985 |
El Abbadi, A., Skeen, D. and Cristian, C. (1985). An efficient fault-tolerant protocol for replicated data management. In Proc. of the 4th Annual ACM SIGACT/SIGMOD Symposium on Principles of Data Base Systems, Portland, OR, pp. 215–29. |
Ellis et al. 1991 |
Ellis, C., Gibbs, S. and Rein, G. (1991). Groupware – some issues and experiences. Comms. ACM, Vol. 34, No. 1, pp. 38-58. |
Ellison 1996 |
Ellison, C. (1996). Establishing identity without certification authorities. In Proc. of the 6th USENIX Security Symposium, San Jose, CA, July, p.7. |
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. and Ylonen, T. (1999). SPKI Certificate Theory. Internet RFC 2693, September. |
|
Elrad et al. 2001 |
Elrad, T., Filman, R. and Bader A. (eds.) (2001). Theme section on aspect-oriented programming, Comms. ACM, Vol. 44, No. 10, pp. 29-32. |
Emmerich 2000 |
Emmerich, W. (2000). Engineering Distributed Object, New York: John Wiley & Sons. |
ESM project at CMU. Home page. |
|
Eugster et al. 2003 |
Eugster, P.T., Felber, P.A., Guerraoui, R. and Kermarrec A-M. (2003). The many faces of publish-subscribe. ACM Computing Surveys,Vol. 35, No. 2, pp. 114-131. |
Evans, C. and 15 other authors (2003). Web Services Reliability (WS-Reliability), Fujitsu, Hitachi, NEC, Oracle Corporation, Sonic Software, and Sun Microsystems. January. |
|
Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the ACM 2003 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications (SIGCOMM 2003), Karlsruhe, Germany, August, pp. 27–34. | |
Farley 1998 |
Farley, J. (1998). Java Distributed Computing. Cambridge, MA: O’Reilly. |
Farrow 2000 |
Farrow, R. (2000). Distributed denial of service attacks – how Amazon, Yahoo, eBay and others were brought down. Network Magazine, March. |
Ferguson and Schneier 2003 |
Ferguson, N. and Schneier, B. (2003). Practical Cryptography,. New York: John Wiley & Sons. |
Ferrari and Verma 1990 |
Ferrari, D. and Verma, D. (1990). A scheme for real-time channel establishment in wide-area networks. IEEE Journal on Selected Areas in Communications, Vol. 8, No. 4, pp. 368-79. |
Ferreira et al. 2000 |
Ferreira, P., Shapiro, M., Blondel, X., Fambon, O., Garcia, J., Kloostermann, S., Richer, N., Roberts, M., Sandakly, F., Coulouris, G., Dollimore, J., Guedes, P., Hagimont, D. and Krakowiak, S. (2000). PerDiS: Design, implementation, and use of a PERsistent DIstributed Store. In LNCS 1752: Advances in Distributed SystemsBerlin, Heidelberg, New York: Springer-Verlag. pp. 427-53. |
Ferris, C. and Langworthy, D. (eds.), Bilorusets, R. and 22 other authors (2004). Web Services Reliable Messaging Protocol (WS-Reliable Messaging). BEA, IBM, Microsoft and TibCo. |
|
Fidge 1991 |
Fidge, C. (1991). Logical time in distributed computing systems. IEEE Computer, Vol. 24, No. 8, pp. 28-33. |
Fielding, R. (2000). Architectural Styles and the Design of Network-based Software Architectures. PhD. dissertation. |
|
Fielding, R., Gettys, J., Mogul, J.C., Frystyk, H., Masinter, L., Leach, P. and Berners-Lee, T. (1999). Hypertext Transfer Protocol – HTTP/1.1. Internet RFC 2616. |
|
Filman et al. 2004 |
Filman, R., Elrad, T., Clarke, S. and Aksit, M. (2004). Aspect-Oriented Software Development, Addison-Wesley. |
Fischer 1983 |
Fischer, M. (1983). The consensus problem in unreliable distributed systems (a brief survey). In Karpinsky, M. (ed.), Foundations of Computation Theory, Vol. 158 of Lecture Notes in Computer Science, Springer-Verlag, pp. 127-140. Yale University Technical Report YALEU/DCS/TR-273. |
Fischer and Lynch 1982 |
Fischer, M. and Lynch, N. (1982). A lower bound for the time to assure interactive consistency. Inf. Process. Letters, Vol. 14, No. 4, pp. 183-6. |
Fischer and Michael 1982 |
Fischer, M.J. and Michael, A. (1982). Sacrificing serializability to attain high availability of data in an unreliable network. In Proceedings of the Symposium on Principles of Database Systems, pp. 70–5. |
Fischer et al. 1985 |
Fischer, M., Lynch, N. and Paterson, M. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM, Vol. 32, No. 2, pp. 374-82. |
Fitzgerald and Rashid 1986 |
Fitzgerald, R. and Rashid, R.F. (1986). The integration of virtual memory management and interprocess communication in Accent. ACM Transactions on Computer Systems, Vol. 4, No. 2, pp. 147-77. |
Flanagan 2002 |
Flanagan, D. (2002). Java in a Nutshell, 4th edn. Cambridge, MA: O’Reilly. |
Fleisch and Popek 1989 |
Fleisch, B. and Popek, G. (1989). Mirage: a coherent distributed shared memory design. In Proceedings 12th ACM Symposium on Operating System Principles, December, pp. 211-23. |
Floyd 1986 |
Floyd, R. (1986). Short term file reference patterns in a UNIX environment. Technical Rep. TR 177, Rochester, NY: Dept of Computer Science, University of Rochester. |
Floyd and Jacobson 1993 |
Floyd, S. and Jacobson, V. (1993). The synchronization of periodic routing messages. ACM Sigcomm ’93 Symposium. |
Floyd et al. 1997 |
Floyd, S., Jacobson, V., Liu, C., McCanne, S. and Zhang, L. (1997). A reliable multicast framework for lightweight sessions and application level framing. IEEE/ACM Transactions on Networking, Vol. 5, No. 6, pp. 784-803. |
Fluhrer et al. 2001 |
Fluhrer, S., Mantin, I. and Shamir, A. (2001). Weaknesses in the key scheduling algorithm of RC4. In Proceedings of the 8th annual workshop on Selected Areas of Cryptography (SAC), Toronto, Canada, pp. 1-24. |
Ford and Fulkerson 1962 |
Ford, L.R. and Fulkerson, D.R. (1962). Flows in Networks. Princeton, NJ: Princeton University Press. |
Foster and Kesselman 2004 |
Foster, I. and Kesselman, C. (eds.) (2004). The Grid 2. San Francisco, CA: Morgan Kauffman. |
Foster et al. 2001 |
Foster, I., Kesselman, C. and Tuecke, S. (2001). The anatomy of the Grid: Enabling scalable virtual organisations. Intl. J. Supercomputer Applications, Vol. 15, No. 3, pp. 200-222. |
Foster et al. 2002 |
Foster, I., Kesselman, C., Nick, J. and Tuecke, S. (2002). Grid services for distributed systems integration. IEEE Computer, Vol. 35, No. 6, pp. 37-46. |
Foster et al. 2004 |
Foster, I., Kesselman, C. and Tuecke, S. (2004). T he Open Grid Services Architecture. In Foster, I. and Kesselman, C. (eds.), The Grid 2. San Francisco, CA: Morgan Kauffman. |
Fox et al. 1997 |
Fox, A., Gribble, S., Chawathe, Y., Brewer, E. and Gauthier, P. (1997). Cluster-based scalable network services. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 78-91. |
Fox et al. 1998 |
Fox, A., Gribble, S.D., Chawathe, Y. and Brewer, E.A. (1998). Adapting to network and client variation using active proxies: Lessons and perspectives. IEEE Personal Communications, Vol. 5, No. 4, pp. 10–19. |
Fox et al. 2003 |
Fox, D., Hightower, J., Liao, L., Schulz, D. and Borriello, G. (2003). Bayesian filtering for location estimation. IEEE Pervasive Computing, Vol. 2, No. 3, pp. 24–33. |
Fractal Project. Home page. |
|
Fractal Project. Tutorial. |
|
France and Rumpe 2007 |
France, R. and Rumpe, B. (2007). Model-driven development of complex software: A research roadmap. International Conference on Software Engineering (Future of Software Engineering session). IEEE Computer Society, Washington, DC, pp. 37–54. |
Fraser et al. 2003 |
Fraser, K.A., Hand, S.M., Harris, T.L., Leslie, I.M. and Pratt, I.A. (2003). The Xenoserver computing infrastructure. Technical Report UCAM-CL-TR-552, Computer Laboratory, University of Cambridge. |
Freed, N. and Borenstein, N. (1996). MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies. September. Internet RFC 1521. |
|
The Free Network Project (2004). |
|
FreePastry project (2004). Pastry: A substrate for peer-to-peer applications. |
|
Frey and Roman 2007 |
Frey, D. and Roman, G-C. (2007). Context-aware publish subscribe in mobile ad hoc networks. In Proceedings of the 9th International Conference on Coordination Models and Languages, pp. 37-55. |
Ganesh et al. 2003 |
Ganesh, A. J., Kermarrec, A. and Massoulié, L. (2003). Peer-to-peer membership management for gossip-based protocols. IEEE Transactions on Computers, Vol. 52, No. 2, pp. 139–149. |
Garay, J. and Moses, Y. (1993). Fully polynomial Byzantine agreement in t+1 rounds. In Proceedings of the 25th ACM symposium on theory of computing, pp. 31–41. | |
Garcia-Molina 1982 |
Garcia-Molina, H. (1982). Elections in distributed computer systems. IEEE Transactions on Computers, Vol. C-31, No. 1, pp. 48-59. |
Garcia-Molina and Spauster 1991 |
Garcia-Molina, H. and Spauster, A. (1991). Ordered and reliable multicast communication. ACM Transactions on Computer Systems, Vol. 9, No. 3, pp. 242-71. |
Garfinkel 1994 |
Garfinkel, S. (1994). PGP: Pretty Good Privacy. Cambridge, MA: O’Reilly. |
Gehrke and Madden 2004 |
Gehrke, J. and Madden, S. (2004). Query processing in sensor networks. IEEE Pervasive Computing, Vol. 3, No. 1, pp. 46-55. |
Gelernter 1985 |
Gelernter, D. (1985). Generative communication in Linda. ACM Transactions on Programming Languages and Systems, Vol. 7, No. 1, pp. 80112. |
Gharachorloo et al. 1990 |
Gharachorloo, K., Lenoski, D., Laudon, J., Gibbons, P., Gupta, A. and Hennessy, J. (1990). Memory Consistency and Event Ordering in Scalable Shared-Memory Multiprocessors. In Proceedings 17th. Annual International Symposium on Computer Architecture, May, pp. 15-26. |
Ghemawat et al. 2003 |
Ghemawat, S., Gobioff, H. and Leung, S. (2003). The Google file system. SIGOPS Oper. Syst. Rev, Vol. 37, No. 5, pp. 29-43. |
Gibbs and Tsichritzis 1994 |
Gibbs, S.J. and Tsichritzis, D.C. (1994). Multimedia Programming. Addison-Wesley. |
Gibson et al. 2004 |
Gibson, G., Courtial, J., Padgett, M.J., Vasnetsov, M., Pas’ko, V., Barnett, S.M. and Franke-Arnold, S. (2004). Free-space information transfer using light beams carrying orbital angular momentum. Optics Express, Vol. 12, No. 22, pp. 5448-5456. |
Gifford 1979 |
Gifford, D.K. (1979). Weighted voting for replicated data. In Proceedings of the 7th Symposium on Operating Systems Principles, ACM, pp. 150-62. |
GlassFish Application Server. Home page. |
|
The Globus Alliance (2004). WS-Resource framework. |
|
Gokhale and Schmidt 1996 |
Gokhale, A. and Schmidt, D. (1996). Measuring the performance of communication middleware on high-speed networks. In Proceedings of SIGCOMM ’96, pp. 306-17. |
Golding and Long 1993 |
Golding, R. and Long, D. (1993). Modeling replica divergence in a weak-consistency protocol for global-scale distributed databases. Technical report UCSC-CRL-93-09, Computer and Information Sciences Board, University of California, Santa Cruz. |
Goldschlag et al. 1999 |
Goldschlag, D., Reed, M. and Syverson, P. (1999). Onion routing for anonymous and private Internet connections. Communications of the ACM, Vol. 42, No. 2, pp. 39-41. |
Golub et al. 1990 |
Golub, D., Dean, R., Forin, A. and Rashid, R. (1990). UNIX as an application program.In Proc. USENIX Summer Conference, pp. 87-96. |
Gong 1989 |
Gong, L. (1989). A secure identity-based capability system. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May, pp. 56-63. |
Goodman 1989 |
Goodman, J. ( 1989 ). Cache Consistency and Sequential Consistency. Technical Report 61, SCI Committee. |
The Official Google Blog. Powering a Google search. |
|
The Official Google Blog. New Search Engine: Caffeine. |
|
Gordon, J. (1984). The Story of Alice and Bob. |
|
Govindan and Anderson 1991 |
Govindan, R. and Anderson, D.P. (1991). Scheduling and IPC mechanisms for continuous media. ACM Operating Systems Review, Vol. 25, No. 5, pp. 68-80. |
Goyal and Carter 2004 |
Goyal, S. and Carter, J. (2004). A lightweight secure cyber foraging infrastructure for resource-constrained devices. In Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), December, pp. 186-195. |
Grace et al. 2003 |
Grace, P., Blair, G.S. and Samuel, S. (2003). ReMMoC: A reflective middleware to support mobile client interoperability. In Proceedings of the International Symposium on Distributed Objects and Applications (DOA03), Catania, Sicily, November, pp. 1170-1187. |
Grace et al. 2008 |
Grace, P., Hughes, D., Porter, B., Blair, G.S., Coulson, G. and Taiani, F. (2008). Experiences with open overlays: A middleware approach to network heterogeneity. In Proceedings of the 3rd ACM Sigops/Eurosys European Conference on Computer Systems (Eurosys08), Glasgow, Scotland, pp. 123-136 |
Graumann et al. 2003 |
Graumann, D., Lara, W., Hightower, J. and Borriello, G. (2003). Real-world implementation of the Location Stack: The Universal Location Framework. In Proceedings of the 5th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2003), Monterey, CA, October, pp. 122-128. |
Gray 1978 |
Gray, J. (1978). Note s on database operating systems. In Operating Systems: an Advanced Course. Lecture Notes in Computer Science, Vol. 60, Springer-Verlag, pp. 394-481,. |
Gray, J. and Szalay, A. (2002). The World-Wide Telescope, an Archetype for Online Science. Technical Report. MSR-TR-2002-75. Microsoft Research. |
|
Greenfield and Dornan 2004 |
Greenfield, D. and Dornan, A. (2004). Amazon: Web site to web services, Network Magazine. October. |
Grimm 2004 |
Grimm, R. (2004). One.world: Experiences with a pervasive computing architecture. IEEE Pervasive Computing, Vol. 3, No. 3, pp. 22-30. |
Gruteser and Grunwald 2003 |
Gruteser, M. and Grunwald, D. (2003). Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH ’03), San Diego, CA, September, pp. 46-55. |
Guerraoui et al. 1998 |
Guerraoui, R., Felber, P., Garbinato, B. and Mazouni, K. (1998). System support for object groups. In Proceedings of the ACM Conference on Object Oriented Programming Systems, Languages and Applications (OOPSLA’98). |
Gummadi et al. 2003 |
Gummadi, K.P., Gummadi, R., Gribble, S.D., Ratnasamy, S., Shenker, S. and Stoica, I. (2003). The impact of DHT routing geometry on resilience and proximity. In Proc. ACM SIGCOMM 200, pp. 381-94. |
Gupta et al. 2004 |
Gupta, A., Sahin, O. D., Agrawal, D. and Abbadi, A. E. (2004). Meghdoot: content-based publish/subscribe over P2P networks. In Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware,Toronto, Canada, October, pp. 254-273. |
Gusella and Zatti 1989 |
Gusella, R. and Zatti, S. (1989). The accuracy of clock synchronization achieved by TEMPO in Berkeley UNIX 4.3BSD. IEEE Transactions Son oftware Engineering, Vol. 15, No. 7, pp. 847-53. |
Guttman 1999 |
Guttman, E. (1999). Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing, Vol. 3, No. 4, pp. 71-80. |
Haartsen, J., Naghshineh, M., Inouye, J., Joeressen, O.J. and Allen, W. (1998). Bluetooth: Vision, goals, and architecture, ACM Mobile Computing and Communications Review, Vol. 2, No. 4, pp. 38-45. |
|
Hadoop. Home page. |
|
Hadzilacos and Toueg 1994 |
Hadzilacos, V. and Toueg, S. (1994). A Modular Approach to Fault-tolerant Broadcasts and Related Problems,.Technical report, Dept of Computer Science, University of Toronto. |
Hand et al. 2003 |
Hand, S., Harris, T., Kotsovinos, E. and Pratt, I. (2003). Controlling the XenoServer open platform. In Proceedings of the 6th IEEE Conference on Open Architectures and Network Programming (OPEN ARCH 2003), pp. 3-11. |
Handley 1998 |
Handley, M. (1998). Session Directories and Scalable Internet Multicast Address Allocation. Proceedings of ACM SIGCOMM, September. |
Handley, M., Schulzrinne, H., Schooler, E. and Rosenberg, J. (1999). SIP: Session Initiation Protocol. Internet RFC 2543. |
|
Harbison 1992 |
Harbison, S. P. (1992). Modula-3. Englewood Hills, NJ: Prentice Hall. |
Härder 1984 |
Härder, T. ( 1984 ). Observations on optimistic concurrency control schemes. Information Systems, Vol. 9, No. 2, pp. 111-20. |
Härder and Reuter 1983 |
Härder, T. and Reuter, A. (1983). Principles of transaction-oriented database recovery. ACM Computing Surveys, Vol. 15, No. 4. |
Harrenstien, K., Stahl, M. and Feinler, E. (1985). DOD Internet Host Table Specification. Internet RFC 952. |
|
Harter and Hopper 1994 |
Harter, A. and Hopper, A. (1994). A distributed location system for the active office. IEEE Network, Vol. 8, No. 1, pp. 62-70. |
Harter et al. 2002 |
Harter, A., Hopper, A., Steggles, P., Ward, A. and Webster, P. (2002). The anatomy of a context-aware application. Wireless Networks, Vol. 8, No. 2-3, pp. 187-197. |
Härtig et al. 1997 |
Härtig, H., Hohmuth, M., Liedtke, J., Schönberg, S. and Wolter, J. (1997). The performance of kernel-based systems. In Proceedings 16th ACM Symposium on Operating System Principles, pp. 66-77. |
Hartman and Ousterhout 1995 |
Hartman, J. and Ousterhout, J. (1995). The zebra striped network file system. ACM Trans. on Computer Systems, Vol. 13 , No. 3, pp. 274-310. |
Hauch and Reiser 2000 |
Hauch, R. and Reiser, H. (2000). Monitoring quality of service across organisational boundaries. In Trends in Distributed Systems: Towards a Universal Service Market, Proc. Third Intl. IFIP/HGI Working conference, USM, September. |
Hayton et al. 1998 |
Hayton, R., Bacon, J. and Moody, K. (1998). OASIS: Access control in an open, distributed environment. In Proceedings of the IEEE Symposium on Security and Privacy, May, Oakland, CA, pp. 3–14. |
Hedrick, R. (1988). Routing Information Protocol. Internet RFC 1058. |
|
Heidemann et al. 2001 |
Heidemann, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D. and Ganesan, D. (2001). Building efficient wireless sensor networks with low-level naming. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Alberta, Canada, October, pp. 146-159. |
Heineman and Councill 2001 |
Heineman, G.T. and Councill, W.T. (2001). Component-Based Software Engineering: Putting the Pieces Together, Reading, MA: Addison-Wesley. |
Hennessy and Patterson 2006 |
Hennessy, J.L. and Patterson, D.A. (2006). Computer Architecture: A Quantitative Approach. 4th edn. San Francisco, CA: Morgan Kaufmann. |
Henning 1998 |
Henning, M. (1998). Binding, migration and scalability in CORBA, Comms. ACM, Vol. 41, No. 10, pp. 62-71. |
Henning and Vinoski 1999 |
Henning, M. and Vinoski, S. (1999). Advanced CORBA Programming with C++. Reading, MA: Addison-Wesley. |
Herlihy 1986 |
Herlihy, M. (19 86 ). A quorum-consensus replication method for abstract aata types. ACM Transactions on Computer Systems, Vol. 4, No. 1, pp. 32-53. |
Herlihy and Wing 1990 |
Herlihy, M. and Wing, J. (1990). On linearizability: A correctness condition for concurrent objects. ACM Transactions on Programming Languages and Systems, Vol. 12, No. 3, pp. 463-92. |
Herrtwich 1995 |
Herrtwich, R.G. (1995). Achieving quality of service for multimedia applications. ERSADS ’95, European Research Seminar on Advanced Distributed Systems, l’Alpe d’Huez, France, April. |
Hightower and Borriello 2001 |
Hightower, J. and Borriello, G. (2001). Location systems for ubiquitous computing. IEEE Computer, Vol. 34, No. 8, pp. 57-66. |
Hightower et al. 2002 |
Hightower, J., Brumitt, B. and Borriello, G. (2002). The Location Stack: A layered model for location in ubiquitous computing. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Callicoon, NY, June, pp. 22-28. |
Hill et al. 2000 |
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000). System architecture directions for networked sensors. In Proceedings of the Ninth ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, MA, November, pp. 93–104. |
Hirsch 1997 |
Hirsch, F.J. (1997). Introducing SSL and certificates using SSLeay. World Wide Web Journal, Vol. 2, No. 3, pp. 141-75. |
Holmquist et al. 2001 |
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M. and Gellersen, H.-W. (2001). Smart-Its Friends: A technique for users to easily establish connections between smart artefacts. In Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, September –October, pp. 116–122. |
Housley, R. (2002). Cryptographic Message Syntax (CMS) Algorithms. Internet RFC 3370. |
|
Howard et al. 1988 |
Howard, J.H., Kazar, M.L., Menees, S.G, Nichols, D.A., Satyanarayanan, M., Sidebotham, R.N. and West, M.J. (1988). Scale and performance in a distributed file system. ACM Transactions on Computer Systems, Vol. 6, No. 1, pp. 51-81. |
Huang et al. 2000 |
Huang, A., Ling, B., Barton, J. and Fox, A. (2000). Running the Web backwards: Appliance data services. In Proceedings of the 9th international World Wide Web conference, pp. 619-31. |
Huitema 1998 |
Huitema, C. (1998). IPv6 – the New Internet Protocol. Upper Saddle River, NJ: Prentice-Hall. |
Huitema 2000 |
Huitema, C. (2000). Routing in the Internet, 2nd edn. Englewood Cliffs, NJ: Prentice-Hall. |
Hull et al. 2004 |
Hull, R., Clayton, B. and Melamad, T. (2004). Rapid authoring of mediascapes. In Proceedings of the Sixth International Conference on Ubiquitous Computing (Ubicomp 2004), Nottingham, England, September, pp. 125–14 |
Hulu. Home page. |
|
Hunter and Crawford 1998 |
Hunter, J. and Crawford, W. (1998). Java Servlet Programming. Sebastopol, CA: O’Reilly. |
Hutchinson and Peterson 1991 |
Hutchinson, N. and Peterson, L. (1991). The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering, Vol. 17, No. 1, pp. 64-76. |
Hutchinson et al. 1989 |
Hutchinson, N.C., Peterson, L.L., Abbott, M.B. and O’Malley, S.W. (1989). RPC in the x-kernel: Evaluating new design techniques. In Proc. 12th of the ACM Symposium on Operating System Principles, pp. 91-101. |
Hutto and Ahamad 1990 |
Hutto, P. and Ahamad, M. (1990). Slow memory: weakening consistency to enhance concurrency in distributed shared memories. In Proceedings 10th International Conference on Distributed Computer Systems, IEEE, pp. 302-11. |
Hyman et al. 1991 |
Hyman, J., Lazar, A.A. and Pacifici, G. (1991). MARS – The MAGNET-II Real-Time Scheduling Algorithm. ACM SlGCOM ‘ 91, Zurich. |
Institute of Electrical and Electronic Engineers (1985). Local Area Network – CSMA/CD Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.3, IEEE Computer Society. |
|
IEEE 1985b |
Institute of Electrical and Electronic Engineers (1985). Local Area Network – Token Bus Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.4, IEEE Computer Society. |
IEEE 1985c |
Institute of Electrical and Electronic Engineers (1985). Local Area Network – Token Ring Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.5, IEEE Computer Society. |
IEEE 1990 |
Institute of Electrical and Electronic Engineers (1990). IEEE Standard 802: Overview and Architecture. American National Standard ANSI/IEEE 802, IEEE Computer Society. |
IEEE 1994 |
Institute of Electrical and Electronic Engineers (1994). Local and Metropolitan Area Networks – Part 6: Distributed Queue Dual Bus (DQDB) Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.6, IEEE Computer Society. |
IEEE 1999 |
Institute of Electrical and Electronic Engineers (1999). Local and metropolitan area networks – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. American National Standard ANSI/IEEE 802.11, IEEE Computer Society. |
IEEE 2002 |
Institute of Electrical and Electronic Engineers (2002). Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs). American National Standard ANSI/IEEE 802.15.1, IEEE Computer Society. |
IEEE 2003 |
Institute of Electrical and Electronic Engineers (2003). Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). American National Standard ANSI/IEEE 802.15.4, IEEE Computer Society. |
IEEE 2004a |
Institute of Electrical and Electronic Engineers (2004). IEEE Standard for Local and Metropolitan Area Networks – Part 16: Air Interface for Fixed Broadband Wireless Access Systems. American National Standard ANSI/IEEE 802.16, IEEE Computer Society. |
IEEE 2004b |
Institute of Electrical and Electronic Engineers (2004). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancement. American National Standard ANSI/IEEE 802.11i, IEEE Computer Society. |
Iftode et al. 1996 |
Iftode, L., Singh, J. and Li, K. (1996). Scope consistency: a bridge between release consistency and entry consistenc y. In Proceedings 8th annual ACM symposium on Parallel algorithms and architectures. pp. 277-87. |
Imielinski and Navas 1999 |
Imielinski, T. and Navas, J.C. (1999). GPS-based geographic addressing, routing, and resource discovery. Comms. ACM, Vol. 42, No. 4, pp. 86-92. |
The International PGP Home Page. |
|
Internet World Stats. |
|
Ishii and Ullmer 1997 |
Ishii, H. and Ullmer, B.,(1997). Tangible bits: Towards seamless interfaces between people, bits and atoms. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI ’97), Atlanta, GA, March, pp. 234–241. |
ISO 1992 |
International Organization for Standardization (1992). Basic Reference Model of Open Distributed Processing, Part 1: Overview and Guide to Use. ISO/IEC JTC1/SC212/WG7 CD 10746-1, International Organization for Standardization. |
International Organization for Standardization (1986). Information Processing – Text and Office Systems – Standard Generalized Markup Language (SGML). |
|
International Telecommunication Union / International Organization for Standardization (1997). Recommendation X.500 (08/97): Open Systems Interconnection – The Directory: Overview of Concepts, Models and Services. | |
Iyer et al. 2002 |
Iyer, S., Rowstron, A. and Druschel, P. (2002). Squirrel: A decentralized peer-to-peer web cache. In Proc. of the 12th ACM Symposium on Principles of Distributed Computing (PODC 2002), July. |
The Apache foundation. Apache Tomcat. |
|
Sun Microsystems. Java Remote Method Invocation. |
|
Sun Microsystems. Java Object Serialization Specification. |
|
Sun Microsystems. Servlet Tutorial. |
|
Jordan, M. and Atkinson, M. (1999). Orthogonal Persistence for the Java Platform – Draft Specification. Sun Microsystems Laboratories, Palo Alto, CA. |
|
Sun Microsystems, Java Security API. |
|
Sun Microsystems (1999). JavaSpaces technology. |
|
Sun Microsystems. The Java Web Services Tutorial. |
|
Sun Microsystems (2003). Java Data Objects (JDO). |
|
Sun Microsystems. Java Remote Object Activation Tutorial. |
|
Sun Microsystems. JavaSpaces Service Specification. |
|
Sun Microsystems. Java Messaging Service (JMS) home page. |
|
Sun Microsystems. Enterprise JavaBeans Specification. |
|
Johanson and Fox 2004 |
Johanson, B. and Fox, A. (2004). Extending tuplespaces for coordination in interactive workspaces. Journal of Systems and Software, Vol. 69, No. 3, pp. 243–266. |
Johnson and Zwaenepoel 1993 |
Johnson, D. and Zwaenepoel, W. (1993). The Peregrine high-performance RPC system. S oftware-Practice and Experience, Vol. 23, No. 2, pp. 201-21. |
Jordan 1996 |
Jordan, M. (1996). Early experiences with persistent Java. In Proceedings of the First International Workshop on Persistence and Java. Glasgow, Scotland, September, pp. 1–9. |
Joseph et al. 1997 |
Joseph, A., Tauber, J. and Kaashoek, M. (1997). Mobile Computing with the Rover Toolkit. IEEE Transactions on Computers: Special Issue on Mobile Computing, Vol. 46, No. 3, pp. 337-52. |
Jul et al. 1988 |
Jul, E., Levy, H., Hutchinson, N. and Black, A. (1988). Fine-grained mobility in the Emerald system. ACM Transactions on Computer Systems, Vol. 6, No. 1, pp. 109-33. |
Jxta Community. Home page. |
|
Kaashoek, F. and Tanenbaum, A. (1991). Group communication in the Amoeba distributed operating system. In Proceedings of the 11th International Conference on Distributed Computer Systems, pp. 222–30. | |
Kaashoek et al. 1989 |
Kaashoek, F., Tanenbaum, A., Flynn Hummel, S. and Bal, H. (1989). An efficient reliable broadcast protocol. Operating Systems Review, Vol. 23, No. 4, pp. 5-20. |
Kaashoek et al. 1997 |
Kaashoek, M., Engler, D., Ganzer, G., Briceño, H., Hunt, R., Mazières, D., Pinckney, T., Grimm, R., Jannotti, J. and Mackenzie, K. (1997). Application performance and flexibility on exokernel systems. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 52-65. |
Kahn 1967 |
Kahn, D. (1967). The Codebreakers: The Story of Secret Writing. New York: Macmillan. |
Kahn 1983 |
Kahn, D. (1983). Kahn on Codes. New York: Macmillan. |
Kahn 1991 |
Kahn, D. (1991). Seizing the Enigma. Boston: Houghton Mifflin. |
Kaler, C. (ed.) (2002). Specification: Web Services Security (WS-Security). |
|
Kaliski, B. and Staddon, J. (1998). RSA Cryptography Specifications, Version 2.0. Internet RFC 2437. |
|
Kantor, B. and Lapsley, P. (1986). Network News Transfer Protocol: A Proposed Standard for the Stream-Based Transmission of News. Internet RFC 977. |
|
Kehne et al. 1992 |
Kehne, A., Schonwalder, J. and Langendorfer, H. (1992). A nonce-based protocol for multiple authentications. ACM Operating Systems Review, Vol. 26, No. 4, pp. 84-9. |
Keith and Wittle 1993 |
Keith, B.E. and Wittle, M. (1993). LADDIS: The next generation in NFS file server benchmarking, USENIX Association Conference Proceedings, Berkeley, CA, June, pp. 261–78. |
Keleher et al. 1992 |
Keleher, P., Cox, A. and Zwaenepoel, W. (1992). Lazy consistency for software distributed shared memory. In Proceedings 19th Annual International Symposium on Computer Architecture. pp. 13-21, May 1992. |
Kessler and Livny 1989 |
Kessler, R.E. and Livny, M. (1989). An Analysis of Distributed Shared Memory Algorithms, In Proceedings 9th International Conference Distributed Computing Systems. IEEE, pp. 98-104. |
Kiciman and Fox 2000 |
Kiciman, E. and Fox, A. (2000). Using dynamic mediation to integrate COTS entities in a ubiquitous computing environment. In Proceedings of the Second International Symposium on Handheld and Ubiquitous Computing (HUC2K), Bristol, England, September, pp. 211–226 |
Kille 1992 |
Kille, S. (1992). Implementing X.400 and X.500: The PP and QUIPU Systems. Boston, MA: Artech House. |
Kindberg 1995 |
Kindberg, T. (1995). A sequencing service for group communication (abstract). In Proceedings of the 14th Annual ACM Symposium on Principles of Distributed Computing, p. 260. Technical Report No. 698, Queen Mary and Westfield College Dept. of CS, 1995. |
Kindberg 2002 |
Kindberg, T. (2002). Implementing physical hyperlinks using ubiquitous identifier resolution. In Proceedings of the Eleventh International World Wide Web Conference (WWW2002), Honolulu, HI, May pp. 191–199. |
Kindberg and Barton 2001 |
Kindberg, T. and Barton, J. (2001). A web-based nomadic computing system. Computer Networks, Vol. 35, No. 4, pp. 443–456. |
Kindberg and Fox 2001 |
Kindberg, T. and Fox, A. (2001). System software for ubiquitous computing. IEEE Pervasive Computing, Vol. 1, No. 1, pp. 70–81. |
Kindberg and Zhang 2003a |
Kindberg, T. and Zhang, K. (2003). Secure spontaneous device association. In Proceedings of the Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, October, pp. 124–131. |
Kindberg and Zhang 2003b |
Kindberg, T. and Zhang, K. (2003). Validating and securing spontaneous associations between wireless devices. In Proceedings of the 6th Information Security Conference (ISC’03), Bristol, England, October, pp. 44–53. |
Kindberg et al. 1996 |
Kindberg, T., Coulouris, G., Dollimore, J. and Heikkinen, J. (1996). Sharing objects over the Internet: The Mushroom approach. In Proceedings of the IEEE Global Internet 1996, London, England, Nov., pp. 67–71. |
Kindberg et al. 2002a |
Kindberg, T., Barton, J., Morgan, J., Becker, G., Bedner, I., Caswell, D., Debaty, P., Gopal, G., Frid, M., Krishnan, V., Morris, H., Pering, C., Schettino, J. and Serra, B. (2002). People, places, things: Web presence for the real world. Mobile Networks and Applications (MONET), Vol. 7, No. 5, pp. 365–376. |
Kindberg et al. 2002b |
Kindberg, T., Zhang, K. and Shanka, N. (2002). Context authentication using constrained channels. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Callicoon, NY, June, pp. 14–21. |
Kirsch and Amir 2008 |
Kirsch, J. and Amir, Y. (2008). Paxos for system builders: An overview. In Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware (LADIS ‘08), Vol. 341, Yorktown Heights, NY, pp. 1–6. |
Kistler and Satyanarayanan 1992 |
Kistler, J.J. and Satyanarayanan, M. (1992). Disconnected operation in the Coda file system. ACM Transactions on Computer Systems, Vol. 10, No. 1, pp. 3–25. |
Kleinrock 1961 |
Kleinrock, L. (1961). Information Flow in Large Communication Networks, MIT, RLE Quarterly Progress Report, July. |
Kleinrock 1997 |
Kleinrock, L. (1997). Nomadicity: Anytime, anywhere in a disconnected world. Mobile Networks and Applications, Vol. 1, No. 4, pp. 351-7. |
Kohl, J. and Neuman, C. (1993). The Kerberos Network Authentication Service (V5). Internet RFC 1510. |
|
Kon et al. 2002 |
Kon, F., Costa, F., Blair, G. and Campbell, R. (2002). The case for reflective middleware. Comms. ACM, Vol. 45, No. 6, pp. 33-38. |
Konstantas et al. 1997 |
Konstantas, D., Orlarey, Y., Gibbs, S. and Carbonel, O. (1997). Distributed music rehearsal. In Proceedings International Computer Music Conference 97. |
Kopetz and Verissimo 1993 |
Kopetz, H. and Verissimo, P. (1993). Real time and dependability concepts. In Mullender (eds.), Distributed Systems, 2nd edn. Addison-Wesley. |
Kopetz et al. 1989 |
Kopetz, H., Damm, A., Koza, C., Mulazzani, M., Schwabl, W. ,Senft, C. and Zainlinger, R. (1989). Distributed fault-tolerant real-time systems – The MARS Approach. IEEE Micro, Vol. 9, No. 1, pp. 112–26. |
Krawczyk, H., Bellare, M. and Canetti, R. (1997). HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104. |
|
Krumm et al. 2000 |
Krumm, J., Harris, S., Meyers, B., Brumitt, B., Hale, M. and Shafer, S. (2000). Multi-camera multi-person tracking for EasyLiving. In Proceedings of the Third IEEE International Workshop on Visual Surveillance (VS’2000), Dublin, Ireland, July, pp. 3–10. |
Kshemkalyani and Singhal 1991 |
Kshemkalyani, A. and Singhal, M. (1991). Invariant-based verification of a distributed deadlock detection algorithm. IEEE Transactions on Software Engineering, Vol. 17, No. 8, pp. 789–99. |
Kshemkalyani and Singhal 1994 |
Kshemkalyani, A. and Singhal, M. (1994). On characterisation and correctness of distributed deadlock detection. Journal of Parallel and Distributed Computing, Vol. 22, No. 1, pp. 44–59. |
Kubiatowicz 2003 |
Kubiatowicz, J. (2003). Extracting guarantees from chaos, Communications of the ACM, vol. 46, No. 2, pp. 33–38.
|
Kubiatowicz et al. 2000 |
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C. and Zhao, B. (2000). OceanStore: an architecture for global-scale persistent storage. In Proc. ASPLOS 2000, November. pp. 190-201. |
Kung and Robinson 1981 |
Kung, H.T. and Robinson, J.T. (1981). Optimistic methods for concurrency control. ACM Transactions on Database Systems, Vol. 6, No. 2, pp. 213-26. |
Kurose and Ross 2007 |
Kurose, J.F. and Ross, K.W. (2007). Computer Networking: A Top-Down Approach Featuring the Internet. Boston, MA: Addison Wesley Longman. |
Ladin, R., Liskov, B., Shrira, L. and Ghemawat, S. (1992). Providing availability using lazy replication. ACM Transactions on Computer Systems, Vol. 10, No. 4, pp. 360-91. |
|
Lai 1992 |
Lai, X. (1992). On the design and security of block ciphers, ETH Series in Information Processing, Vol. 1. Konstanz, Germany: Hartung-Gorre Verlag. |
Lai and Massey 1990 |
Lai, X. and Massey, J. (1990). A proposal for a new block encryption standard. In Proceedings Advances in Cryptology–Eurocrypt ’90, pp. 389–404. |
Lamport 1978 |
Lamport, L. (1978). Time, clocks and the ordering of events in a distributed system. Comms. ACM, Vol. 21, No. 7, pp. 558-65. |
Lamport 1979 |
Lamport, L. (1979). How to make a multiprocessor computer that correctly executes multiprocess programs. IEEE Transactions on Computers, Vol. C-28, No. 9, pp. 690–1. |
Lamport 1986 |
Lamport, L. (1986). On interprocess communication, parts I and II. Distributed Computing, Vol. 1, No. 2, pp. 77-101. |
Lamport 1989 |
Lamport, L. (1989). The Part-Time Parliament. Technical Report 49, DEC SRC, Palo Alto, CA. citeseer.ist.psu.edu/lamport89parttime.html |
Lamport 1998 |
Lamport, L. (1998). The part-time parliament. ACM Transactions on Computer Systems (TOCS), Vol. 16, No. 2, pp. 133–69. |
Lamport et al. 1982 |
Lamport, L., Shostak, R. and Pease, M. (1982). Byzantine generals problem. ACM Transactions on Programming Languages and Systems, Vol. 4, No. 3, pp. 382–401. |
Lampson 1971 |
Lampson, B. (1971). Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, p. 437. Reprinted in ACM Operating Systems Review. Vol. 8, No. 1, p. 18. |
Lampson 1981 |
Lampson, B.W. (1981). Atomic transactions. In Distributed systems: Architecture and Implementation. Vol 105 of Lecture Notes in Computer Science, Springer-Verlag, pp. 254–9. |
Lampson 1986 |
Lampson, B.W. (1986). Designing a global name service. In Proceedings of the 5th ACM Symposium on Principles of Distributed Computing, pp. 1–10. |
Lampson et al. 1992 |
Lampson, B.W., Abadi, M., Burrows, M. and Wobber, E. (1992). Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, Vol. 10, No. 4, pp. 265–310. |
Langheinrich 2001 |
Langheinrich, M. (2001). Privacy by design – principles of privacy-aware ubiquitous systems. In Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, Sep.–Oct., pp. 273–291. |
Langville and Meyer 2006 | Lanville, A.M. and Meyer, C.D. (2006). Pagerank and Beyond: The Science of Search Engine Rankings. Princeton, NJ: Princeton University Press. |
Langworthy, D. (ed.) (2004) Web Services Coordination (WS-Coordination), IBM, Microsoft, BEA. November. |
|
Lea et al. 1993 |
Lea, R., Jacquemot, C. and Pillevesse, E. (1993). COOL: system support for distributed programming. Comms. ACM, Vol. 36, No. 9, pp. 37-46. |
Leach et al. 1983 |
Leach, P.J., Levine, P.H., Douros, B.P., Hamilton, J.A., Nelson, D.L. and Stumpf, B.L. (1983). The architecture of an integrated local network. IEEE J. Selected Areas in Communications, Vol. SAC-1, No. 5, pp. 842-56. |
Lee and Thekkath 1996 |
Lee, E.K. and Thekkath, C.A. (1996). Petal: Distributed virtual disks, In Proc. of the 7th Intl. Conf. on Architectural Support for Prog. Langs. and Operating Systems, October, pp. 84-96. |
Lee et al. 1996 |
Lee, C., Rajkumar, R. and Mercer, C. (1996). Experiences with Processor Reservation and Dynamic QOS in Real-Time Mach. In Proceedings Multimedia Japan ’96. |
Leffler et al. 1989 |
Leffler, S., McKusick, M., Karels, M. and Quartermain, J. (1989). The Design and Implementation of the 4.3 BSD UNIX Operating System. Reading, MA: Addison-Wesley. |
Leibowitz et al. 2003 |
Leibowitz, N., Ripeanu, M. and Wierzbicki, A. (2003). Deconstructing the Kazaa network. In Proc. of the 3rd IEEE Workshop on Internet Applications (WIAPP’03), Santa Clara, CA, p. 112. |
Leiner et al. 1997 |
Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G. and Wolff, S. (1997). A brief history of the Internet. Comms. ACM, Vol. 40, No. 1, pp. 102-108. |
Leland et al. 1993 |
Leland, W.E., Taqqu, M.S., Willinger, W. and Wilson, D.V. (1993). On the self-similar nature of Ethernet traffic. ACM SIGCOMM ‘ 93, San Francisco. |
Lenoski et al. 1992 |
Lenoski, D., Laudon, J., Gharachorloo, K., Weber, W.D., Gupta, A., Hennessy, J., Horowitz, M. and Lam, M.S. (1992). The Stanford Dash multiprocessor, IEEE Computer, Vol. 25, No. 3, pp. 63-79. |
Leslie et al. 1996 |
Leslie, I., McAuley, D., Black, R., Roscoe, T., Barham, P., Evers, D., Fairbairns, R. and Hyden, E. (1996). The design and implementation of an operating system to support distributed multimedia applications. ACM Journal of Selected Areas in Communication, Vol. 14, No. 7, pp. 1280-97. |
Li and Hudak 1989 |
Li, K. and Hudak, P. (1989). Memory Coherence in Shared Virtual Memory Systems. ACM Transactions on Computer Systems, Vol. 7, No. 4, pp. 321-59. |
Liedtke 1996 |
Liedtke, J. (1996). Towards real microkernels. Comms. ACM, Vol. 39, No. 9, pp. 70-7. |
The Linux AFS FAQ. |
|
Lipton and Sandberg 1988 |
Lipton, R. and Sandberg, J. (1988). PRAM: A scalable shared memory. Technical Report CS-TR-180-88, Princeton University. |
Liskov 1988 |
Liskov, B. (1988). Distributed programming in Argus. Comms. ACM , Vol. 31, No. 3, pp. 300-12. |
Liskov 1993 |
Liskov, B. (1993). Practical uses of synchronized clocks in distributed systems, Distributed Computing. Vol. 6, No. 4, pp. 211-19. |
Liskov and Scheifler 1982 |
Liskov, B. and Scheifler, R.W. (1982). Guardians and actions: Linguistic support for robust, distributed programs. ACM Transactions Programming Languages and Systems, Vol. 5, No. 3, pp. 381-404. |
Liskov and Shrira 1988 |
Liskov, B. and Shrira, L. (1988). Promises: Linguistic support for efficient asynchronous procedure calls in distributed systems. In Proceedings of the SIGPLAN ’88 Conference Programming Language Design and Implementation. Atlanta, GA: pp. 260-7. |
Liskov et al. 1991 |
Liskov, B., Ghemawat, S., Gruber, R., Johnson, P., Shrira, L. and Williams, M. (1991). Replication in the Harp file system. In Proceedings of the 13th ACM Symposium on Operating System Principles, pp. 226-38. |
Liu and Albitz 1998 |
Liu, C. and Albitz, P. (1998). DNS and BIND, third edition. O’Reilly. |
Liu and Layland 1973 |
Liu, C.L. and Layland, J.W. (1973). Scheduling algorithms for multiprogramming in a hard real-time environment. Journal of the ACM, Vol. 20, No. 1, pp. 46-61. |
Liu et al. 2005 |
Liu, J., Sacchetti, D., Sailhan, F. and Issarny, V. (2005). Group management for mobile ad hoc networks: Design, implementation and experiment. In Proceedings of the 6th international Conference on Mobile Data Management, New York, pp. 192-199. |
Liu et al. 2008 |
Liu, J., Rao, S.G., Li, B. and Zhang, H. (2008). Opportunities and challenges of peer-to-peer Internet video broadcast. In Proceedings of the IEEE, Special Issue on Recent Advances in Distributed Multimedia Communications, Vol. 96, No. 1, pp. 11–24. |
Loepere 1991 |
Loepere, K. (1991). Mach 3 Kernel Principles. Open Software Foundation and Carnegie-Mellon University. |
Lundelius and Lynch 1984 |
Lundelius, J. and Lynch, N. (1984). An upper and lower bound for clock synchronization. Information and Control, Vol. 62, No. 2/3, pp. 190–204. |
Lv et al. 2002 |
Lv, Q., Cao, P., Cohen, E., Li, K., and Shenker, S. (2002). Real-world implementation of the Location Stack: The Universal Location Framework. In Proceedings of the 2002 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Marina Del Rey, CA, pp. 258-259. |
Lynch 1996 |
Lynch, N. (1996). Distributed Algorithms. San Francisco, CA: Morgan Kaufmann. |
Ma, C. (1992). Designing a Universal Name Service. Technical Report 270, University of Cambridge. |
|
Macklem 1994 |
Macklem, R. (1994). Not quite NFS: Soft cache consistency for NFS. In Proceedings of the Winter ’94 USENIX Conference, San Francisco, CA, January, pp. 261-278. |
Madhavapeddy et al. 2003 |
Madhavapeddy, A., Scott, D. and Sharp, R. (2003). Context-aware computing with sound. In Proceedings of the Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, October, pp. 315–332. |
Maekawa 1985 |
Maekawa, M. (1985). A Algorithm for Mutual Exclusion in Decentralized Systems. ACM Transactions on Computer System s, Vol. 3, No. 2, pp. 145-159. |
Maffeis 1995 |
Maffeis, S. (1995). Adding group communication and fault tolerance to CORBA. In Proceedings of the 1995 USENIX Conference on Object-Oriented Technologies. Monterey, CA. pp. 135–146. |
Malkin, G. (1993). RIP Version 2 – Carrying Additional Information. Internet RFC 1388.
|
|
Mamei and Zambonelli 2009 |
Mamei, M. and Zambonelli, F. (2009). Programming pervasive and mobile computing applications: The TOTA approach. ACM Transactions on Software Engineering and Methodology, Vol. 19, No. 4. |
maps.google.com | Google Maps. Home page. |
Marsh et al. 1991 |
Marsh, B., Scott, M., LeBlanc, T. and Markatos, E. (1991). First-class user-level ihreads. In Proceedings of the 13th ACM Symposium on Operating System Principles, pp. 110-21. |
Martin et al. 2004 |
Martin, T., Hsiao, M., Ha, D. and Krishnaswami, J. (2004). Denial-of-service attacks on battery-powered mobile computers. In Proceedings of the 2nd IEEE Pervasive Computing Conference, Orlando, FL, March, pp. 309-318. |
Marzullo and Neiger 1991 |
Marzullo, K. and Neiger, G. (1991). Detection of global state predicates. In Proceedings of the 5th International Workshop on Distributed Algorithms, pp. 254–72. |
Mattern 1989 |
Mattern, F. (1989). Virtual time and global states in distributed systems. In Proceedings of the Workshop on Parallel and Distributed Algorithms, Amsterdam, North-Holland, pp. 215–26. |
Maymounkov and Mazieres 2002 |
Maymounkov, P. and Mazieres, D. (2002). Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of IPTPS02, Cambridge, MA, March, pp. 53-65. |
BIBs: Introduction to the Multicast Backbone.
|
|
McGraw and Felden 1999 |
McGraw, G. and Felden, E. (1999). Securing Java. New York: John Wiley & Sons. |
McKusick and Quinlan 2010 | McKusick, K. and Quinlan, S. (2010). GFS: Evolution or fast-forward. Comms. ACM, Vol. 53, No. 3, pp. 42–49. |
Meier and Cahill 2010 |
Meier, R. and Cahill, V. (2010). On event-based middleware for location-aware mobile applications. IEEE Transactions on Software Engineering,Vol. 36, No. 3, pp. 409-430. |
Melliar-Smith et al. 1990 |
Melliar-Smith, P., Moser, L. and Agrawala, V. (1990). Broadcast protocols for distributed systems. IEEE Transactions on Parallel and Distributed Systems, Vol. 1, No. 1, pp. 17-25. |
Menezes 1993 |
Menezes, A. (1993). Elliptic Curve Public Key Cryptosystems. Dordrecht, The Netherlands: Kluwer Academic Publishers. |
Menezes et al. 1997 |
Menezes, A., van Oorschot, O. and Vanstone, S. (1997). Handbook of Applied Cryptography. Botca raton, FL:CRC Press. |
Metcalfe and Boggs 1976 |
Metcalfe, R.M. and Boggs, D.R. (1976). Ethernet: distributed packet switching for local computer networks. Comms. ACM, Vol. 19, No. 7, pp. 395-403. |
Milanovic et al. 2004 |
Milanovic, N., Malek, M., Davidson, A. and Milutinovic, V. (2004). Routing and security in mobile ad hoc networks. IEEE Computer, Vol. 37, No. 2, pp. 69-73. |
Mills 1995 |
Mills, D. (1995). Improved algorithms for synchronizing computer network clocks. IEEE Transactions Networks, Vol. 3, No. 3, pp. 245–54. |
Milojicic et al. 1999 |
Milojicic, J., Douglis, F. and Wheeler, R. (1999). Mobility, Processes, Computers and Agents. Reading, MA: Addison-Wesley. |
Minnich and Farber 1989 |
Minnich, R. and Farber, D. (1989). The Mether System: a Distributed Shared Memory for SunOS 4.0. In Proceedings Summer 1989 Usenix Conference. |
Mitchell and Dion 1982 |
Mitchell, J.G. and Dion, J. (1982). A comparison of two network-based file servers. Comms. ACM, Vol. 25, No. 4, pp. 233-45. |
Mitchell et al. 1992 |
Mitchell, C.J., Piper, F. and Wild, P. (1992). Digital signatures. In Simmons, G.J. (ed.), Contemporary Cryptology. New York: IEEE Press. |
Mockapetris, P. (1987). Domain names – concepts and facilities. Internet RFC 1034. |
|
Mogul 1994 |
Mogul, J.D. (1994). Recovery in Spritely NFS. Computing Systems, Vol. 7, No., pp. 201-62. |
Mok 1985 |
Mok, A.K. (1985). SARTOR – A design environment for real-time systems. In Proc. Ninth IEEE COMP-SAC, Chicago, IL, October, pp. 174–81. |
Morin 1997 |
Morin, R. (ed.) (1997). MkLinux: Microkernel Linux for the Power Macintosh. Prime Time Freeware. |
Morris et al. 1986 |
Morris, J., Satyanarayanan, M., Conner, M.H., Howard, J.H., Rosenthal, D.S. and Smith, F.D. (1986). Andrew: A distributed personal computing environment. Comms. ACM, Vol. 29, No. 3, pp. 184-201. |
Mosberger 1993 |
Mosberger, D. (1993). Memory Consistency Models. Technical Report 93/1 1, University of Arizona. |
Moser et al. 1994 |
Moser, L., Amir, Y., Melliar-Smith, P. and Agarwal, D. (1994). Extended virtual synchrony. In Proceedings of the 14th International Conference on Distributed Computing Systems, pp. 56–65. |
Moser et al. 1996 |
Moser, L., Melliar-Smith, P., Agarwal, D., Budhia, R. and Lingley-Papadopoulos, C. (1996). Totem: A fault-tolerant multicast group communication system. Comms. ACM, Vol. 39, No. 4, pp. 54–63. |
Moser et al. 1998 |
Moser, L., Melliar-Smith, P. and Narasimhan, P. (1998). Consistent object replication in the Eternal system. Theory and Practice of Object Systems, Vol. 4, No. 2, pp. 81–92. |
Moss 1985 |
Moss, E. (1985). Nested Transactions, An Approach to Reliable Distributed Computing. Cambridge, MA: MIT Press. |
Muhl et al. 2006 |
Muhl, G., Fiege, L. and Pietzuch, P.R. (2006). Distributed Event-based Systems, Berlin, Heidelberg: Springer-Verlag. |
Multimedia Directory (2005). Scala Inc. |
|
Murphy et al. 2001 |
Murphy, A.L., Picco, G.P. and Roman, G.-C. (2001). Lime: A middleware for physical and logical mobility. In Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21), Phoenix, AZ, April, pp. 524–233. |
Muthitacharoen et al. 2002 |
Muthitacharoen, A., Morris, R., Gil, T.M. and Chen, B. (2002). Ivy: A read/write peer-to-peer file system. In Proc. Fifth Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, December, pp. 31–44. |
Myers and Liskov 1997 |
Myers, A.C. and Liskov, B. (1997). A decentralized model for information flow control, ACM Operating Systems Review, Vol. 31, No. 5, pp. 129–42. |
Nagle, J. (1984). Congestion control in TCP/IP internetworks, Computer Communications Review, Vol. 14, No. 4, pp. 11–17. | |
Nagle 1987 |
Nagle, J. (1987). On packet switches with infinite storage. IEEE Transactions on Communications, Vol. 35, No. 4, pp. 435–8. |
National Bureau of Standards 1977 |
National Bureau of Standards (1977). Data Encryption Standard (DES). Federal Information Processing Standards No. 46, Washington, DC: US National Bureau of Standards. |
National Biomedical Computation Resource, University of California, San Diego. |
|
Needham 1993 |
Needham, R. (1993). Names. In Mullender, S. (ed.), Distributed Systems, an Advanced Course, 2nd edn. Wokingham, England: ACM Press/Addison-Wesley. pp. 315-26. |
Needham and Schroeder 1978 |
Needham, R.M. and Schroeder, M.D. (1978). Using encryption for authentication in large networks of computers. Comms. ACM, Vol. 21, pp. 993-9. |
Nelson et al. 1988 |
Nelson, M.N., Welch, B.B. and Ousterhout, J.K. (1988). Caching in the Sprite network file system. ACM Transactions on Computer Systems, Vol. 6, No. 1, No. 12, pp. 134-154. |
Netscape 1996 |
Netscape Corporation (1996). SSL 3.0 Specification. http://home.netscape.com/eng/ssl3/index.html |
Neuman, B.C., Tung, B. and Wray, J. (1999). Public Key Cryptography for Initial Authentication in Kerberos. Internet Draft ietf-cat-kerberos-pk-init-09. |
|
Neumann and Ts’o 1994 |
Neuman, B.C. and Ts’o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications, Vol. 32, No. 9, pp. 33-38. |
Newcomer 2002 |
Newcomer, E. (2002). Understanding Web Services XML, WSDL, SOAP and UDDI. Boston, MA: Pearson. |
Nielsen, H.F. and Thatte, S. (2001). Web Services Routing Protocol (WS-Routing). Microsoft Corporation. |
|
Nielsen et al. 1997 |
Nielsen, H., Gettys, J., Baird-Smith, A., Prud’hommeaux, E., Lie, H. and Lilley, C. (1997). Network performance effects of HTTP/1.1, CSS1, and PNG. In Proceedings SIGCOMM ’97, pp. 155-66. |
National Institute for Standards and Technology (1994). Digital Signature Standard, NIST FIPS 186. US Department of Commerce. |
|
National Institute for Standards and Technology (2002). Secure Hash Standard. NIST FIPS 180-2 + Change Notice to include SHA-224. US Department of Commerce. |
|
National Institute for Standards and Technology (2004). NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1. US Department of Commerce. |
|
Noble and Satyanarayanan 1999 |
Noble, B. and Satyanarayanan, M. (1999). Experience with adaptive mobile applications in Odyssey. Mobile Networks and Applications, Vol. 4 , No. 4, pp. 245-254. |
The Berkeley NOW project home page. |
|
The Berkeley RON project home page. |
|
Oaks, S. and Wong, H. (1999). Java Threads, 2nd edn., Sebastpol, CA: O’Reilly. |
|
Ohkubo et al. 2003 |
Ohkubo, M., Suzuki, K. and Kinoshita, S. (2003). Cryptographic approach to `privacy-friendly’ tags. In Proceedings of the RFID Privacy Workshop, MIT. |
Oki et al. 1993 |
Oki, B., Pfluegl, M., Siegel, A., and Skeen, D. (1993). The Information Bus: an architecture for extensible distributed systems. In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, Asheville, NC, December, pp. 58-68. |
Olson, M. and Ogbuji, U. (2002) Choose the best tool for the task at hand. |
|
Object Management Group (2000). Trading Object Service Specification, Vn. 1.0. Needham, MA: OMG. |
|
Object Management Group (2000). Concurrency Control Service Specification. Needham, MA: OMG. |
|
Object Management Group (2002). The CORBA IDL Specification. Needham, MA: OMG. |
|
Object Management Group (2002). CORBA Security Service Specification Vn. 1.8. Needham, MA: OMG. |
|
Object Management Group (2002). Value Type Semantics. Needham, MA: OMG. |
|
Object Management Group (2002). Life Cycle Service, Vn. 1.2. Needham, MA: OMG. |
|
Object Management Group (2002). Persistent State Service, Vn. 2.0. Needham, MA: OMG. |
|
Object Management Group, (2003). Object Transaction Service Specification. Vn. 1.4. Needham, MA: OMG. |
|
Object Management Group (2004). CORBA/IIOP 3.0.3 Specification. Needham, MA: OMG. |
|
Object Management Group (2004). Naming Service Specification. Needham, MA: OMG. |
|
Object Management Group (2004). Event Service Specification, Vn. 1.2. Needham, MA: OMG. |
|
Object Management Group (2004). Notification Service Specification, Vn. 1.1. Needham, MA: OMG. Technical report telecom/98-06-15. |
|
Object Management Group (2004). CORBA Messaging. Needham, MA: OMG. |
|
Omidyar and Aldridge 1993 |
Omidyar, C.G. and Aldridge, A. (1993). Introduction to SDH/SONET. IEEE Communications Magazine, Vol. 31, pp. 30-3. |
Home page. |
|
OpenNap: Open Source Napster Server, Beta release 0.44, September 2001. |
|
Oppen and Dalal 1983 |
Oppen, D.C. and Dalal Y.K. (1983). The Clearinghouse: A decentralized agent for locating named objects in a distributed environment. ACM Trans. on Office Systems, Vol. 1, No. 3, pp. 230-53. |
Oram 2001 |
Oram, A. (2001). Peer-to-Peer: Harnessing the Benefits of Disruptive Technologies, O’Reilly, Sebastapol, CA. |
Orfali et al. 1996 |
Orfali, R., Harkey, D. and Edwards, J. (1996). The Essential Distributed Objects Survival Guide. New York: Wiley. |
Orfali et al. 1997 |
Orfali, R., Harkey, D. and Edwards, J. (1997). Instant CORBA. New York: John Wiley & Sons. |
Organick 1972 |
Organick, E.I. (1972). The MULTICS System: An Examination of its Structure. Cambridge, MA: MIT Press. |
Orman et al. 1993 |
Orman, H., Menze, E., O’Malley, S. and Peterson, L. (1993). A fast and general implementation of Mach IPC in a Network. In Proceedings Third USENIX Mach Conference, April. |
OSF 1997 |
Introduction to OSF DCE. The Open Group. www.opengroup.org |
Ousterhout et al. 1985 |
Ousterhout, J., Da Costa, H., Harrison, D., Kunze, J., Kupfer, M. and Thompson, J. (1985). A Trace-driven analysis of the UNIX 4.2 BSD file system. In Proc of the 10th ACM Symposium Operating System Principles, pp. 15-24. |
Ousterhout et al. 1988 |
Ousterhout, J., Cherenson, A., Douglis, F., Nelson, M. and Welch, B. (1988). The Sprite network operating system. IEEE Computer, Vol. 21, No. 2, pp. 23-36. |
Parker, B. (1992). The PPP AppleTalk Control Protocol (ATCP). Internet RFC 1378. |
|
Parrington et al. 1995 |
Parrington, G.D., Shrivastava, S.K., Wheater, S.M. and Little, M.C. (1995). The Design and Implementation of Arjuna. USENIX Computing Systems Journal, Vol. 8, No. 3, pp. 255-308. |
Partridge, C. (1992). A Proposed Flow Specificatio n. Internet RFC 1363. |
|
Patel and Abowd 2003 |
Patel, S.N. and Abowd, G.D. (2003). A 2-way laser-assisted selections scheme for handhelds in a physical environment. In Proceedings of the Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, October, pp. 200-207. |
Patterson et al. 1988 |
Patterson, D., Gibson, G. and Katz, R. (1988). A case for redundant arrays of interactive disks. ACM International Conf. on Management of Data (SIGMOD), pp. 109-116. |
Pease et al. 1980 |
Pease, M., Shostak, R. and Lamport, L. (1980). Reaching agreement in the presence of faults. Journal of the ACM, Vol. 27, No. 2, pp. 228-34. |
Pedone and Schiper 1999 |
Pedone, F. and Schiper, A. (1999). Generic broadcast. In Proceedings of the 13th International Symposium on Distributed Computing (DISC ’99), September, pp. 94-108. |
Peng and Dabek 2010 |
Peng, D. and Dabex, F. (2010). Large-scale incremental processing using distributed transactions and notifications. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI ’10), Vancouver, Canada, October, pp. 1-15. |
Perrig et al. 2002 |
Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, Vol. 8, No. 5, pp. 521-534. |
Petersen et al. 1997 |
Petersen, K., Spreitzer, M., Terry, D., Theimer, M. and Demers, A. (1997). Flexible update propagation for weakly consistent replication. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 288-301. |
Peterson 1988 |
Peterson, L. (1988). The Profile Naming Service. ACM Transactions on Computer Systems, Vol. 6, No. 4, pp. 341-64. |
Peterson et al. 1989 |
Peterson, L.L., Buchholz, N.C. and Schlichting, R.D. (1989). Preserving and using context information in interprocess communication. ACM Transactions on Computer Systems, Vol. 7, No. 3, pp. 217-46. |
Petersen et al. 1997 |
Petersen, K., Spreitzer, M., Terry, D., Theimer, M. and Demers, A. (1997). Flexible update propagation for weakly consistent replication. In Proceedings of the 16th ACM Symposium on Operating Systems Principle,pp. 288-301. |
Petersen et al. 2005 |
Peterson, L.L., Shenker, S. and Turner, J. (2005). Overcoming the Internet impasse through virtualization. Computer, Vol. 38, No. 4, pp. 34-41. |
Pietzuch and Bacon 2002 |
Pietzuch, P. R. and Bacon, J. (2002). Hermes: A distributed event-based middleware architecture. In Proceedings of the First International Workshop on Distributed Event-Based Systems, Vienna, Austria, pp. 611-618. |
Pike et al. 1993 |
Pike, R., Presotto, D., Thompson, K., Trickey, H. and Winterbottom, P. (1993). The use of name spaces in Plan 9. Operating Systems Review, Vol. 27, No. 2, pp. 72-76. |
Pike et al. 2005 |
Pike, R., Dorward, S., Griesemer, R. and Quinlan, S. (2005). Interpreting the data: Parallel analysis with Sawzall. Scientific Programming, Vol. 13, No. 4, pp. 277-29. |
Pinheiro et al. 2007
|
Pinheiro, E., Weber, W.D. and Barroso, L.A. (2007). Failure trends in a large disk drive population. In Proceedings of the 5th USENIX Conference on File and Storage Technologies, pp. 17–28. |
Plaxton et al. 1997 |
Plaxton, C.G., Rajaraman, R. and Richa, A.W. (1997). Accessing nearby copies of replicated objects in a distributed environment. In Proc. of the ACM Symposium on Parallel Algorithms and Architectures, pp. 311-320. |
Ponnekanti and Fox 2004 |
Ponnekanti, S. and Fox, A. (2004). Interoperability among independently evolving web services. In Proceedings of the ACM/Usenix/IFIP 5th International Middleware Conference, Toronto, Canada, pp. 331–57. |
Ponnekanti et al. 2001 |
Ponnekanti, S.R., Lee, B., Fox, A., Hanrahan, P. and Winograd, T. (2001). ICrafter: A service framework for ubiquitous computing environments. In Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, Sep.–Oct., pp. 56–75. |
Popek and Walker 1985 |
Popek, G. and Walker, B. (eds.) (1985). The LOCUS Distributed System Architecture. Cambridge, MA: MIT Press. |
Postel, J. (1981). Internet Protocol. Internet RFC 791. |
|
Postel, J. (1981). Transmission Control Protocol. Internet RFC 793. |
|
Pottie and Kaiser 2000 |
Pottie, G.J. and Kaiser, W.J. (2000). Embedding the Internet: Wireless integrated network sensors. Comms. ACM, Vol. 43, No. 5, pp. 51-58. |
Powell 1991 |
Powell, D. (ed.) (1991). Delta-4: A Generic Architecture for Dependable Distributed Computing. Berlin and New York: Springer-Verlag. |
Pradhan and Chiueh 1998 |
Pradhan, P. and Chiueh, T. (1998). Real-time performance guarantees over wired and wireless LANS. In IEEE Conference on Real-Time Applications and Systems, RTAS’98, June, p. 29. |
Prakash and Baldoni 1998 |
Prakash, R. and Baldoni, R. (1998). Architecture for group communication in mobile systems. In Proceedings of the the 17th IEEE Symposium on Reliable Distributed Systems, Washington, DC, pp. 235–242. |
Preneel et al. 1998 |
Preneel, B., Rijmen, V. and Bosselaers, A. (1998). Recent developments in the design of conventional cryptographic algorithms. In Computer Security and Industrial Cryptography, State of the Art and Evolution. Vol. 1528 of Lecture Notes in Computer Science, Springer-Verlag, pp. 106–131. |
International Cryptography Freedom. |
|
Radia, S., Nelson, M. and Powell, M. (1993). The Spring Naming Service. Technical Report 93-16, Sun Microsystems Laboratories, Inc. |
|
Raman and McCanne 1999 |
Raman, S. and McCanne, S. (1999). A model, analysis, and protocol framework for soft state-based communication. In Proceedings of the ACM SIGCOMM, 1999, Cambridge, MA, pp. 15–25. |
Randall and Szydlo 2004 |
Randall, J. and Szydlo, M. (2004). Collisions for SHA0, MD5, HAVAL, MD4, and RIPEMD, but SHA1 still secure. RSA Laboratories Technical Note, August 31. |
Rashid 1985 |
Rashid, R.F. (1985). Network operating systems. In Local Area Networks: An Advanced Course, Lecture Notes in Computer Science, 184, Springer-Verlag, pp. 314-40. |
Rashid 1986 |
Rashid, R.F. (1986). From RIG to Accent to Mach: the evolution of a network operating system. In Proceedings of the ACM/IEEE Computer Society Fall Joint Conference, ACM, November. |
Rashid and Robertson 1981 |
Rashid, R. and Robertson, G. (1981). Accent: a communications oriented network operating system kernel. ACM Operating Systems Review, Vol. 15, No. 5, pp. 64-75. |
Rashid et al. 1988 |
Rashid, R., Tevanian Jr, A., Young, M., Golub, D., Baron, R., Black, D., Bolosky, W.J. and Chew, J. (1988). Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures. IEEE Transactions on Computers, Vol. 37, No. 8, pp. 896-907. |
Ratnasamy et al. 2001 |
Ratnasamy, S., Francis, P., Handley, M., Karp, R. and Shenker, S. (2001). A scalable content-addressable network. In Proc. ACM SIGCOMM 2001, August, pp. 161-72. |
Raynal 1988 |
Raynal, M. (1988). Distributed Algorithms and Protocols. New York: John Wiley & Sons. |
Raynal 1992 |
Raynal, M. (1992). About logical clocks for distributed systems. ACM Operating Systems Review, Vol. 26, No. 1, pp. 41-8. |
Raynal and Singhal 1996 |
Raynal, M. and Singhal, M. (1996). Logical time: Capturing causality in distributed systems. IEEE Computer, Vol. 29, No. 2, pp. 49–56. |
Redmond 1997 |
Redmond, F.E. (1997). DCOM: Microsoft Distributed Component Model. IDG Books Worldwide. |
Reed 1983 |
Reed, D.P. (1983). Implementing atomic actions on decentralized data. ACM Transactions on Computer Systems, Vol. 1, No. 1, pp. 3-23. |
Rellermeyer et al. 2007 |
Rellermeyer, J. S., Alonso, G., and Roscoe, T. (2007). R-OSGi: Distributed applications through software modularization. In Proceedings of the ACM/IFIP/USENIX 2007 international Conference on Middleware, Newport Beach, CA, November, pp. 1–20. |
Rescorla, E. (1999). Diffie-Hellman Key Agreement Method. Internet RFC 2631. |
|
Rether: A Real-Time Ethernet Protocol. |
|
Rhea et al. 2001 |
Rhea, S., Wells, C., Eaton, P., Geels, D., Zhao, B., Weatherspoon, H. and Kubiatowicz, J. (2001). Maintenance-free global data storage. IEEE Internet Computing, Vol. 5, No. 5, pp. 40–49. |
Rhea et al. 2003 |
Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B. and Kubiatowicz, J. (2003). Pond: The OceanStore prototype, In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST ’03), pp. 1–14. |
Ricart and Agrawala 1981 |
Ricart, G. and Agrawala, A.K. (1981). An optimal algorithm for mutual exclusion in computer networks. Comms. ACM, Vol. 24, No. 1, pp. 9-17. |
Richardson et al. 1998 |
Richardson, T., Stafford-Fraser, Q., Wood, K.R. and Hopper, A. (1998). Virtual network computing, IEEE Internet Computing, Vol. 2, No. 1, pp. 33–8. |
Ritchie 1984 |
Ritchie, D. (1984). A Stream Input Output System. AT&T Bell Laboratories Technical Journal, Vol. 63, No. 8, pt 2, pp. 1897-910. |
Rivest, R. (1992). The MD5 Message-Digest Algorithm. Internet RFC 1321. |
|
Rivest 1992 b |
Rivest, R. (1992). The RC4 Encryption Algorithm,. RSA Data Security Inc. |
Rivest et al. 1978 |
Rivest, R.L., Shamir, A. and Adelman, L. (1978). A method of obtaining digital signatures and public key cryptosystems. Comms. ACM, Vol. 21, No. 2, pp. 120-6. |
Rodrigues et al. 1998 |
Rodrigues, L., Guerraoui, R. and Schiper, A. (1998). Scalable atomic multicast. In Proceedings IEEE IC3N ’98. Technical Report 98/257. École polytechnique fédérale de Lausanne. |
Roman et al. 2001 |
Roman, G., Huang, Q. and Hazemi, A. (2001). Consistent group membership in ad hoc networks. In Proceedings of the 23rd International Conference on Software Engineering, pp. 381-388. |
Rose 1992 |
Rose, M.T. (1992). T he Little Black Book: Mail Bonding with OSI Directory Services. Englewood Cliffs, NJ: Prentice-Hall. |
Rosenblum and Ousterhout 1992 |
Rosenblum, M. and Ousterhout, J. (1992). The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, Vol. 10, No. 1, pp. 26–52. |
Rosenblum and Wolf 1997 |
Rosenblum, D.S. and Wolf, A.L. (1997). A design framework for Internet-scale event observation and notification. In Proceedings of the sixth European Software Engineering Conference/ACM SIGSOFT Fifth Symposium on the Foundations of Software Engineering, Zurich, Switzerland, pp. 344–60. |
Rowley, A. (1998). A Security Architecture for Groupware. Doctoral Thesis, Queen Mary and Westfield College, University of London. |
|
Rowstron and Druschel 2001 |
Rowstron, A. and Druschel, P. (2001). Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. IFIP/ACM Middleware 2001, Heidelberg, Germany, Nov, pp. 329-50. |
Rowstron and Wood 1996 |
Rowstron, A. and Wood, A. (1996). An efficient distributed tuple space implementation for networks of workstations. In Proceedings of the Second International Euro-Par Conference, Lyon, France, pp. 510-513. |
Rozier et al. 1988 |
Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien, M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard, P. and Neuhauser, W. (1988). Chorus Distributed Operating Systems. Computing Systems Journal, Vol. 1, No. 4, pp. 305-70. |
Rozier et al. 1990 |
Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien, M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard, P. and Neuhauser, W. (1990). Overview of the Chorus distributed operating system. Technical Report CS/TR-90-25.1, Chorus Systèmes, France. |
RTnet: Hard Real-Time Networking for Linux/RTAI. |
|
Salber, D., Dey, A.K. and Abowd, G.D. (1999). The Context Toolkit: Aiding the development of context-enabled applications. In Proceedings of the 1999 Conference on Human Factors in Computing Systems (CHI ’99), Pittsburgh, PA, May, pp. 434–441. | |
Saltzer et al. 1984 |
Saltzer, J.H., Reed, D.P. and Clarke, D. (1984). End-to-end arguments in system design. ACM Transactions on Computer Systems, Vol. 2, No. 4, pp. 277–88. |
Sandberg 1987 |
Sandberg, R. (1987). The Sun Network File System: Design, implementation and experience. Technical Report. Mountain View, CA: Sun Microsystems. |
Sandberg et al. 1985 |
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D. and Lyon, B. (1985). The design and implementation of the Sun Network File System. In Proceedings Usenix Conference, Portland, OR, p. 119. |
Sanders 1987 |
Sanders, B. (1987). The information structure of distributed mutual exclusion algorithms. ACM Transactions on Computer Systems, Vol. 5, No. 3, pp. 284-99. |
Sandholm, T. and Gawor, J. (2003). Globus Toolkit 3 Core – A Grid Service Container Framework. July. |
|
Sandhu et al. 1996 |
Sandhu, R., Coyne, E., Felstein, H. and Youman, C. (1996). Role-based access control models. IEEE Computer, Vol. 29, No. 2, pp. 38–47. |
Sane et al. 1990 |
Sane, A., MacGregor, K. and Campbell, R. (1990). Distributed Virtual Memory Consistency Protocols: Design and Performance. Second IEEE Workshop on Experimental Distributed Systems, pp. 91-6, October. |
Sansom et al. 1986 |
Sansom, R.D., Julin, D.P. and Rashid, R.F. (1986). Extending a capability based system into a network environment. Technical Report CMU-CS-86-116, Carnegie-Mellon University. |
Santifaller 1991 |
Santifaller, M. (1991). TCP/IP and NFS, Internetworking in a Unix Environment. Reading, MA: Addison-Wesley. |
Saroiu et al. 2002 |
Saroiu, S., Gummadi, P. and Gribble, S. (2002). A measurement study of peer-to-peer file sharing systems. In Proc. Multimedia Computing and Networking (MMCN), pp. 156–70. |
Sastry et al. 2003 |
Sastry, N., Shankar, U. and Wagner, D. (2003). Secure verification of location claims. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), September, pp. 1–10. |
Satyanarayanan 1981 |
Satyanarayanan, M. (1981). A study of file sizes and functional lifetimes. In Proceedings of the 8th ACM Symposium on Operating System Principles, Asilomar, CA, pp. 96-108. |
Satyanarayanan 1989a |
Satyanarayanan, M. (1989). Distributed file systems. In Mullender, S. (ed.), Distributed Systems, an Advanced Course, 2nd edn. Wokingham, England: ACM Press/Addison-Wesley. pp. 353-83. |
Satyanarayanan 1989b |
Satyanarayanan, M. (1989). Integrating security in a large distributed system. ACM Transactions on Computer Systems, Vol. 7, No. 3, pp. 247-80. |
Satyanarayanan 2001 |
Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, Vol. 8, No. 4, pp. 10-17. |
Satyanarayanan et al. 1990 |
Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M.E., Siegel, E.H. and Steere, D.C. (1990). Coda: A highly available file system for a distributed workstation environment. IEEE Transactions on Computers, Vol. 39, No. 4, pp. 447-59. |
Saunders 1987 |
Saunders, B. (1987). The Information Structure of Distributed Mutual Exclusion Algorithms. ACM Transactions on Computer Systems, Vol. 3, No. 2, pp. 145-59. |
Scheifler and Gettys 1986 |
Scheifler, R.W. and Gettys, J. (1986). The X window system. ACM Transactions on Computer Graphics, Vol. 5, No. 2, pp. 76-109. |
Schilit et al. 1994 |
Schilit, B.N., Adams, N.I. and Want, R. (1994). Context-aware computing applications. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December, pp. 85-90. |
Schiper and Raynal 1996 |
Schiper, A. and Raynal, M. (1996). From group communication to transactions in distributed systems. Comms. ACM, Vol. 39, No. 4, pp. 84-7. |
Schiper and Sandoz 1993 |
Schiper, A. and Sandoz, A. (1993). Uniform reliable multicast in a virtually synchronous environment. In Proceedings of the 13th International Conference on Distributed Computing Systems, pp. 561-8. |
Schlageter 1982 |
Schlageter, G. (1982). Problems of optimistic concurrency control in distributed database systems. SigMOD Record, Vol. 13, No. 3, pp. 62-6. |
Schmidt 1998 |
Schmidt, D. (1998). Evaluating architectures for multithreaded object request brokers. Comms. ACM, Vol. 44, No. 10, pp. 54-60. |
Schneider 1990 |
Schneider, F.B. (1990). Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, Vol. 22, No. 4, pp. 300–19. |
Schneider 1996 |
Schneider, S. (1996). Security properties and CSP. In IEEE Symposium, on Security and Privacy, pp. 174-187. |
Schneier 1996 |
Schneier, B. (1996). Applied Cryptography, 2nd edn. New York: John Wile & Sons. |
Schroeder and Burrows 1990 |
Schroeder, M. and Burrows, M. (1990). The performance of Firefly RPC. ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 1-17. |
Schroeder et al. 1984 |
Schroeder, M.D., Birrell, A.D. and Needham, R.M. (1984). Experience with Grapevine: The growth of a distributed system. ACM Transactions on Computer Systems, Vol. 2, No. 1, pp. 3-23. |
Schulzrinne, H., Casner, S., Frederick, D. and Jacobson, V. (1996). RTP: A Transport Protocol for Real-Time Applications. Internet RFC 1889. |
|
Sector/Sphere. Home page. |
|
Seetharamanan 1998 |
Seetharamanan, K. (ed.) (1998). Special Issue: The CORBA Connection. Comms. ACM, Vol. 41, No. 10. |
User Guide to sd (Session Directory). |
|
Shannon 1949 |
Shannon, C.E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715. |
Shepler, S. (1999). NFS Version 4 Design Considerations. Internet RFC 2624, Sun Microsystems. |
|
Shih et al. 2002 |
Shih, E., Bahl, P. and Sinclair, M. (2002). Wake on Wireless: An event driven energy saving strategy for battery operated devices. In Proceedings of the Eighth Annual ACM Conference on Mobile Computing and Networking, Altanta, GA, September, pp. 160–171. |
Shirky, C. (2000). What’s P2P and what’s not, 11/24/2000. Internet publication. |
|
Shoch and Hupp 1980 |
Shoch, J.F. and Hupp, J.A. (1980). Measured performance of an Ethernet local network. Comms. ACM, Vol. 23, No. 12, pp. 711-21. |
Shoch and Hupp 1982 |
Shoch, J.F. and Hupp, J.A. (1982). The `Worm’ programs – early experience with a distributed computation. Comms. ACM, Vol. 25, No. 3, pp. 172-80. |
Shoch et al. 1982 |
Shoch, J.F., Dalal, Y.K. and Redell, D.D. (1982). The evolution of the Ethernet local area network. IEEE Computer, Vol. 15, No. 8, pp. 10-28. |
Shoch et al. 1985 |
Shoch, J.F., Dalal, Y.K., Redell, D.D. and Crane, R.C. (1985). The Ethernet. In Local Area Networks: An Advanced Course,Vol 184 of Lecture Notes in Computer Science, Springer-Verlag, pp. 1-33. |
Shrivastava et al. 1991 |
Shrivastava, S., Dixon, G.N. and Parrington, G.D. (1991). An overview of the Arjuna distributed programming system. IEEE Software, pp. 66–73. |
Singh 1999 |
Singh, S. (1999). The Code Book. London: Fourth Estate. |
Sinha and Natarajan 1985 |
Sinha, M. and Natarajan, N. (1985). A priority based distributed deadlock detection algorithm. IEEE Transactions on Software Engineering. Vol. 11, No. 1, pp. 67–80. |
Sirivianos et al. 2007 |
Sirivianos, M., Park, J.H., Chen R. and Yang, X. (2007). Free-riding in BitTorrent networks with the large view exploit. In Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS ‘07), Bellevue, WA. |
Spafford 1989 |
Spafford, E.H. (1989). The Internet worm: Crisis and aftermath. Comms. ACM, Vol. 32, No. 6, pp. 678-87. |
Spasojevic and Satyanarayanan 1996 |
Spasojevic, M. and Satyanarayanan, M. (1996). An empirical study of a wide-area distributed file system. ACM Transactions on Computer Systems, Vol. 14, No. 2, pp. 200–222. |
Spector 1982 |
Spector, A.Z. (1982). Performing remote operations efficiently on a local computer network. Comms. ACM, Vol. 25, No. 4, pp. 246-60. |
Spurgeon 2000 |
Spurgeon, C.E. (2000). Ethernet: The Definitive Guide. Sebastopol, CA: O’Reilly. |
Srikanth and Toueg 1987 |
Srikanth, T. and Toueg, S. (1987). Optimal clock synchronization. Journal ACM. Vol. 34, No. 3, pp. 626–45. |
Srinivasan, R. (1995). RPC: Remote Procedure Call Protocol Specification Version 2. Sun Microsystems. Internet RFC 1831. August. |
|
Srinivasan, R. (1995). XDR: External Data Representation Standard. Sun Microsystems. Internet RFC 1832. Network Working Group. |
|
Srinivasan and Mogul 1989 |
Srinivasan, R. and Mogul, J.D. (1989). Spritely NFS: Experiments with cache-consistency protocols. In Proc. of the 12th ACM Symposium on Operating System Principles, Litchfield Park, AZ, December, pp. 45–57. |
Srisuresh, P. and Holdrege, M. (1999). IP Network Address Translator (NAT) Terminology and Considerations. Internet RFC 2663. |
|
Stajano 2002 |
Stajano, F. (2002). Security for Ubiquitous Computing. New York: John Wiley & Sons. |
Stajano and Anderson 1999 |
Stajano, F. and Anderson, R. (1999). The resurrecting duckling: Security issues for adhoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, pp. 172–194. |
Stallings 2002 |
Stallings, W. (2002). High Speed Networks – TCP/IP and ATM Design Principles, 2nd. edn. Upper Saddle River, NJ: Prentice-Hall. |
Stallings 2005 |
Stallings, W. (2005). Cryptography and Network Security – Principles and Practice, 4th edn. Upper Saddle River, NJ: Prentice-Hall. |
Stallings 2008 |
Stallings, W. (2008). Operating Systems, 6th edn. Upper Saddle River, NJ: Prentice-Hall International. |
Steiner et al. 1988 |
Steiner, J., Neuman, C. and Schiller, J. (1988). Kerberos: An authentication service for open network systems. In Proceedings Usenix Winter Conference, Berkeley, CA. |
Stelling et al. 1998 |
Steiner, J., Neuman, C. and Schiller, J. (1988). Kerberos: An authentication service for open network systems. In Proceedings of the Usenix Winter Conference, Berkeley, CA. |
Stoica et al. 2001 |
Stoica, I., Morris, R., Karger, D., Kaashoek, F. and Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. ACM SIGCOMM, ‘01, August, pp. 149–60. |
Stojmenovic 2002 |
Stojmenovic, I. (ed.) (2002). Handbook of Wireless Networks and Mobile Computing. New York: John Wiley & Sons. |
Stoll 1989 |
Stoll, C. (1989). The Cuckoo’s Egg: Tracking a Spy Through a Maze of Computer Espionage. New York: Doubleday. |
Stone 1993 |
Stone, H. (1993). High-performance Computer Architecture, 3rd edn. Reading, MA: Addison-Wesley. |
Stonebraker et al. 2010 |
Stonebraker, M., Abadi, D., DeWitt, D. J., Madden, S., Paulson, E., Pavlo, A. and Rasin, A. (2010). MapReduce and parallel DBMSs: Friends or foes? Comms. ACM, Vol. 53, No. 1, pp. 64–71. |
Sun Microsystems Inc. (1989). NFS: Network File System Protocol Specification. Internet RFC 1094. |
|
Sun and Ellis 1998 |
Sun, C. and Ellis, C. (1998). Operational transformation in real-time group editors: Issues, algorithms, and achievements. In Proceedings of the ACM Conference on Computer Supported Cooperative Work Systems, pp. 59-68. |
Shared Wireless Access Protocol (Cordless Access) Specification (SWAP-CA), Revision 2.0,1 The HomeRF Technical Committee, July 2002. |
|
Szalay and Gray 2001 |
Szalay, A. and Gray, J. (2001) The World-Wide Telescope. Science, Vol. 293, No. 5537, pp. 2037-2040. |
Szalay and Gray 2004 |
Szalay, A. and Gray, J. (2004). Scientific Data Federation: The World-Wide Telescope. In Foster, I. and Kesselman, C. (eds.), The Grid 2. San Francisco, CA: Morgan Kauffman. |
Szyperski 2002 |
Szyperski, C. (2002). Component Software: Beyond Object-Oriented Programming, 2nd edn. Reading, MA: Addison-Wesley. |
Tanenbaum 2003 |
Tanenbaum, A.S. (2003). Computer Networks, 4th edn. Upper Saddle River, NJ: Prentice-Hall International. |
Tanenbaum 2007 |
Tanenbaum, A.S. (2007). Modern Operating Systems, 3rd edn. Englewood Cliffs, NJ: Prentice-Hall. |
Tanenbaum and van Renesse 1985 |
Tanenbaum, A. and van Renesse, R. (1985). Distributed operating system. Computing Surveys, ACM, Vol. 17, No. 4, pp. 419-70. |
Tanenbaum et al. 1990 |
Tanenbaum, A.S., van Renesse, R., van Staveren, H., Sharp, G., Mullender, S., Jansen, J. and van Rossum, G. (1990). Experiences with the Amoeba distributed operating system. Comms. ACM, Vol. 33, No. 12, pp. 46-63. |
Taufer, M., Crowley, M., Karanicolas, J., Cicotti, P., Chien, A. and Brooks, L. (2003). Moving Towards Desktop Grid Solutions for Large Scale Modelling in Computational Chemistry. University of California, San Diego. |
|
Terry et al. 1995 |
Terry, D., Theimer, M., Petersen, K., Demers, A., Spreitzer, M. and Hauser, C. (1995). Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 172-183. |
TFCC |
IEEE Task Force on Cluster Computing. http://www.ieeetfcc.org/welcome.html. |
Thayer, R. (1998). IP Security Document Roadmap, Internet RFC 2411, November. |
|
Thaler, D., Handley, M. and Estrin, D. (2000). The Internet Multicast Address Allocation Architecture. Internet RFC 2908. |
|
Thekkath et al. 1997 |
Thekkath, C.A., Mann, T. and Lee, E.K. (1997). Frangipani: A scalable distributed file system. In Proc. of the 16th ACM Symposium on Operating System Principles, S.t Malo, France, October, pp. 224-237. |
Tokuda et al. 1990 |
Tokuda, H., Nakajima, T. and Rao, P. (1990). Real-time Mach: towards a predictable real-time system. In Proceedings USENIX Mach Workshop, pp. 73-82. |
Topolcic, C. (ed.) (1990). Experimental Internet Stream Protocol, Version 2. Internet RFC 1190. |
|
Tsoumakos and Roussopoulos et al. 2006 |
Tsoumakos, D. and Roussopoulos, N. (2006). Analysis and comparison of P2P search methods. In Proceedings of the 1st international Conference on Scalable information Systems (InfoScale ’06), Hong Kong, p 25. |
Tzou and Anderson 1991 |
Tzou, S.-Y. and Anderson, D. (1991). The performance of message-passing using restricted virtual memory remapping. Software-Practice and Experience, Vol. 21, pp. 251-67. |
van Renesse, R., van Staveran, H. and Tanenbaum, A. (1989). The performance of the Amoeba distributed operating system. Software – Practice and Experience, Vol. 19, No. 3, pp. 223-34. |
|
van Renesse et al. 1995 |
van Renesse, R., Birman, K., Friedman, R., Hayden, M. and Karr, D. (1995). A framework for protocol composition in Horus. In Proceedings PODC 1995, pp. 80-9. |
van Renesse et al. 1996 |
van Renesse, R., Birman, K. and Maffeis, S. (1996). Horus: a flexible group communication system. Comms. ACM, Vol. 39, No. 4, pp. 54-63. |
van Renesse et al. 1998 |
van Renesse, R., Birman, K., Hayden, M., Vaysburd, A. and Karr, D. (1998). Building adaptive systems using Ensemble. Software–Practice and Experience, Vol. 28, No. 9, pp. 963–979. |
van Steen et al. 1998 |
van Steen, M., Hauck, F., Homburg, P. and Tanenbaum, A. (1998). Locating objects in wide-area systems. IEEE Communication, Vol. 36, No. 1, pp. 104-109. |
Vinoski 1998 |
Vinoski, S. (1998). New Features for CORBA 3.0. Comms. ACM, 8, Vol. 41, No. 1, pp. 44-52. |
Vinoski 2002 |
Vinoski, S. (2002). Putting the ‘Web’ into Web Services. IEEE Internet Computing. Vol. 6, No. 4, pp. 90–92. |
Vogels 2003 |
Vogels, W. (2003). Web Services are not Distributed objects. IEEE Internet Computing, Vol. 7, No, 6, pp. 59–66. |
Vogt et al. 1993 |
Vogt, C., Herrtwich, R.G. and Nagarajan, R. (1993). HeiRAT – The Heidelberg Resource Administration Technique: Design Philosophy and Goals. Kommunikation in verteilten Systemen, Munich, Informatik aktuell, Springer. |
Volpano and Smith 1999 |
Volpano, D. and Smith, G. (1999). Language issues in mobile program security. In Mobile Agents and Security. Vol. 1419 in Lecture Notes in Computer Science, Springer-Verlag, pp. 25–43. |
von Eicken et al. 1995 |
von Eicken, T., Basu, A., Buch, V. and Vogels, V. (1995). U-Net: A user-level network interface for parallel and distributed programming. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 40-53. |
Wahl, M., Howes, T. and Kille, S. (1997). The Lightweight Directory Access Protocol (v3). Internet RFC 2251. |
|
Waldo 1999 |
Waldo, J. (1999). The Jini architecture for network-centric computing. Comms. ACM. Vol. 42, No. 7, pp. 76-82. |
Waldo et al. 1994 |
Waldo, J., Wyant, G., Wollrath, A. and Kendall, S. (1994). A note on distributed computing. In Arnold et al. 1999, pp. 307-26. |
Waldspurger et al. 1992 |
Waldspurger, C., Hogg, T., Huberman, B., Kephart, J. and Stornetta, W. (1992). Spawn: A distributed computational economy. IEEE Transactions on Software Engineering, Vol. 18, No. 2, pp. 103-17. |
Wang et al. 2001 |
Wang, N., Schmidt, D. C. and O’Ryan, C. (2001). Overview of the CORBA component model. In Heineman, G. T. and Councill, W.T. (eds), Component-Based Software Engineering: Putting the Pieces Together, Addison-Wesley Longman Publishing Co., Boston, MA: Addison-Wesley, pp. 557–571. |
Want 2004 |
Want, R. (2004). Enabling ubiquitous sensing with RFID. IEEE Computer, Vol. 37, No. 4, pp. 84–86. |
Want and Pering 2003 |
Want, R. and Pering, T. (2003). New horizons for mobile computing In Proceedings of the First IEEE International Conference on Pervasive Computing and Communication (PerCom’03), Dallas-Fort Worth, TX, March, pp. 3-8. |
Want et al. 1992 |
Want, R., Hopper, A., Falcao, V. and Gibbons, V. (1992). The Active Badge location system. ACM Transactions on Information Systems, Vol. 10, No.1, pp. 91-102. ftp.uk.research.att.com:/pub/docs/att/tr.92.1.pdf |
Want et al. 2002 |
Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M. and Light, J. (2002). The personal server: Changing the way we think about ubiquitous computing. In Proceedings of the Fourth International Conference on Ubiquitous Computing (Ubicomp 2002), Goteborg, Sweden, Sep.–Oct., pp.194–209. |
Weatherspoon and Kubiatowicz 2002 |
Weatherspoon, H. and Kubiatowicz, J.D. (2002). Erasure coding vs. replication: A quantitative comparison. 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), Cambridge, MA, March, pp. 328–38. |
Kerberos: The Network Authentication Protocol. |
|
The Three Myths of Firewalls. |
|
Wegner 1987 |
Wegner, P. (1987). Dimensions of object-based language design.SIGPLAN Notices, Vol. 22, No. 12, pp. 168-182. |
Weikum 1991 |
Weikum, G. (1991). Principles and realization strategies of multilevel transaction management. ACM Transactionson Database Systems, Vol. 16, No. 1, pp. 132-40. |
Weiser 1991 |
Weiser, M. (1991). The computer for the 21st century. Scientific American, Vol. 265, No. 3, pp. 94-104. |
Weiser 1993 |
Weiser, M. (1993). Some computer science issues in ubiquitous computing. Comms. ACM, Vol. 36, No. 7, pp. 74-84. |
Wellner 1991 |
Wellner, P.D. (1991). The DigitalDesk calculator – tangible manipulation on a desk-top display. In Proceedings of the 4th annual ACM symposium on User Interface Software and Technology, Hilton Head, SC. November, pp. 27-33. |
Wheeler and Needham 1994 |
Wheeler, D.J. and Needham, R.M. (1994). TEA, a Tiny Encryption Algorithm. Technical Report 355, Two Cryptographic Notes, Computer Laboratory, University of Cambridge, December, pp. 1-3. |
Wheeler and Needham 1997 |
Wheeler, D.J. and Needham, R.M. (1997). Tea Extensions. October 1994, pp. 1-3. |
Whitaker et al. 2002 |
Whitaker, A., Shaw, M. and Gribble, D.G. (2002). Denali: Lightweight virtual machines for distributed and networked applications . Technical Report 02-02-01, University of Washington. |
Wiesmann et al. 2000 |
Wiesmann, M., Pedone, F., Schiper, A., Kemme, B. and Alonso, G. (2000). Understanding replication in databases and distributed systems. In Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS ‘2000), Taipei, Republic of China,p. 464. |
Williams 1998 |
Williams, P. (1998). JetSend: An appliance communication protocol. In Proceedings IEEE International Workshop on Networked Appliances, (IEEE IWNA ’98), Kyoto, Japan, November pp. 51-53. |
Winer, D. (1999). The XML-RPC specification. |
|
Wobber et al. 1994 |
Wobber, E., Abadi, M., Burrows, M. and Lampson, B. (1994). Authentication in the Taos operating system. ACM Transactions Computer Systems. Vol. 12, No. 1, pp. 3-32. |
Wright et al. 2002 |
Wright, M., Adler, M., Levine, B.N. and Shields, C. (2002). An analysis of the degradation of anonymous protocols. In Proceedings of the Network and Distributed Security Symposium (NDSS ’02), February. |
The Web Services Description Language for Java Toolkit (WSDL4J. |
|
Wulf et al. 1974 |
Wulf, W., Cohen, E., Corwin, W., Jones, A., Levin, R., Pierson, C. and Pollack, F. (1974). HYDRA: The kernel of a multiprocessor operating system. Comms. ACM, Vol. 17, No. 6, pp. 337-345. |
Wuu and Bernstein 1984 |
Wuu, G.T. and Bernstein, A.J. (1984). Efficient solutions to the replicated log and dictionary problems. In Proceedings of the Third Annual Symposium on Principles of Distributed Computing, pp. 233–42. |
Adventiq Ltd. Home page featuring their KVM-over-IP technology. |
|
Akamai. Home page featuring their KVM-over-IP technology. |
|
Apple Computer. Bonjour Protocol Specifications. |
|
Apple Computer (2004). iChat video conferencing for the rest of us. |
|
The Beowulf Project. Resource centre. |
|
The Official BitTorrent Website. |
|
The Official Bluetooth SIG Website. |
|
The scalable, reliable and high-performance online game platform, GoGrid. |
|
Bureau of Export Administration, US Department of Commerce. Commercial Encryption Export Controls. |
|
Coulouris, G., Dollimore, J. and Kindberg, T. (eds), Distributed Systems, Concepts and Design: Supporting material. |
|
Citrix Corporation. Server-based Computing White Paper. |
|
Conviva. Home page. |
|
Coral Content Distribution Network. Home page. |
|
Corporation for Research and Educational Networkin., CREN Certificate Authority. |
|
Crypto++® Library 5.2.1. |
|
Distributed Aircraft Maintenance Environment (DAME). |
|
Dean, J. Designs, Lessons and Advice from Building Large Distributed Systems. |
|
CU-SeeMe Networks Inc. Home page. |
|
Blitz open source project. Home page. |
|
International DOI Foundation. Pages on digital object identifiers. |
|
Dropbox file hosting service. Home page. |
|
Delay Tolerant Networking Research Group. Home page. |
|
Global Crossing. IP Network Performance – monthly history. |
|
Goobexploreo, the world’s largest online library of aerial and satellite imagery. |
|
The Globus Project.Latest stable version of the Globus Toolkit. |
|
Google. Google Apps. |
|
Google. Google Maps. |
|
Google. Google Corporate Information. |
|
Google. Google Corporate Information. Design Principles. |
|
Handle system. Home page. |
|
The GridMPI Project. Home page. |
|
Internet Assigned Numbers Authority. IPv4 Multicast Address Space Registry. |
|
Internet Assigned Numbers Authority. Home page. |
|
IBM. WebSphere Application Server home page. |
|
Internet Engineering Task Force. Internet RFC Index page. |
|
Iona Technologies. Orbix. |
|
InterPlaNetary Internet Project. Home page. |
|
Ipoque GmbH. Internet Study 2008/2009. |
|
Robert Hobbes Zakon. Hobbes’ Internet Timeline. |
|
JSON external data representation. Home page. |
|
Microsoft Corporation. Active Directory Services. |
|
Microsoft Corporation. Kerberos Authentication in Windows Server 2003, White Paper. |
|
Microsoft Corporation. NetMeeting home page. |
|
Microsoft Corporation. Azure home page. |
|
Netscape Corporation SSL 3.0 Specification. |
|
www.mpi-forum.org | Message Passing Interface (MPI) Forum. Home page. |
NEES Grid, Building the National Virtual Collaboratory for Earthquake Engineering. |
|
www.netscape.com | Netscape. Home page |
Near Field Communication (NFC). Forum home page. |
|
Web Services reliable messaging. WS-Reliable messaging. Vn 1.1. Oasis standard. |
|
Object Management Group. Index to CORBA services. |
|
Open Group. Portal to the World of DCE. |
|
Open Mobile Alliance. Home page. |
|
OpenSSL Project. OpenSSL: The Open Source toolkit for SSL/TLS. |
|
Open Street Map. Home Page. |
|
The OSGI Alliance. Home Page. |
|
The OW2 Consortium. Home Page. |
|
PARC Forum. Presentation to Marissa Mayer, VP Google. |
|
PGP. Home page. |
|
Apama from Progress Software. Home page. |
|
Prototype JavaScript Framework. Home page. |
|
RealVNC Ltd. Home page. |
|
IBM Redbooks.WebSphere MQ V6 Fundamentals. |
|
Read, D.P. (2000). The End of the End-to-End Argument. |
|
Gryphon Project. Home page. |
|
RSA Corporation (1997). DES Challenge. |
|
RSA Corporation (2004). RSA Factoring Challenge. |
|
Real-Time for Java TM Experts Group. |
|
Network Security Library. |
|
Software Engineering Instute, Carnegie Mellon. Home page of the Ultra Large Systems (ULS) Initiative. |
|
SPEC SFS97 Benchmark. |
|
SpringSource Community. Spring Framework. |
|
Universal Plug and Play. Home page. |
|
CDNetworks Inc. Home page. |
|
USCMS, The Compact Muon Solenoid. |
|
Verisign Inc. Home page. |
|
World Wide Web Consortium. Home page. |
|
World Wide Web Consortium. Pages on the HyperText Markup Language. |
|
World Wide Web Consortium. Pages on Naming and Addressing. |
|
World Wide Web Consortium. Pages on the HyperText Transfer Protocol. |
|
World Wide Web Consortium. Pages on the Resource Description Framework and other metadata schemes. |
|
World Wide Web Consortium. Pages on the Extensible Markup Language. |
|
World Wide Web Consortium. Pages on the Extensible Stylesheet Language. |
|
XML Schemas. W3C Recommendation. (2001). |
|
World Wide Web Consortium. Pages on SOAP. |
|
World Wide Web Consortium. Pages on Canonical XML, Version 1.0. W3C Recommendation. |
|
World Wide Web Consortium. Pages on Web Services Description Language (WSDL). |
|
World Wide Web Consortium. Pages on XML Signature Syntax and Processing. |
|
World Wide Web Consortium. Pages on XML key management specification (XKMS). |
|
World Wide Web Consortium. Pages on XML Encryption Syntax and Processing. |
|
World Wide Web Consortium. Pages on Web Services Choreography Requirements. W3C Working Draft. |
|
Burdett, D. and Kavantsas, N. (2004). WS Choreography Model Overview, W3C Working Draft. |
|
World Wide Web Consortium. Pages on Web Services Choreography Description Language Version 1.0. |
|
World Wide Web Consortium. Pages on Web Services Choreography Interface (WSCI ). |
|
World Wide Web Consortium. Pages on Device Independence. |
|
World Wide Web Consortium. Pages on the Semantic Web. |
|
World Wide Web Consortium. Pages on the XML Binary Charaterization Working Group. |
|
World Wide Web Consortium. Pages on the SOAP Message Transmission Optimization Protocol recommendations. |
|
World Wide Web Consortium. Pages on the WS-Addressing Working Group. |
|
World Wide Web Consortium. Pages on the Geolocation API Specification.. |
|
WAP Forum. White Papers and Specifications. |
|
The IEEE 802.11 Wireless LAN Standard. |
|
Crossbow Technology Inc. Pages on wireless sensor networks. (Replaced by another article, since the above pages are no longer on the Crossbow website.) |
|
Xen open source community. Home page. |
|
IETF Zeroconf Working Group. Home page. |
|
Wyckoff et al. 1998 |
Wyckoff, P., McLaughry, S., Lehman, T. and Ford, D. (1998). T Spaces. IBM Systems Journal, Vol. 37, No. 3. |
Xu and Liskov 1989 |
Xu, A. and Liskov, B. (1989). The design for a fault-tolerant, distributed implementation of Linda. In Proceedings of the 19th International Symposium on Fault-Tolerant Computing, Chicago, IL, June, pp. 199-206. |
Zakon, R.H. Hobbes’ Internet Timeline v7.0. |
|
Zhang and Kindberg 2002 |
Zhang, K. and Kindberg, T. (2002). An authorization infrastructure for nomadic computing. Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, Monterey, CA, June, pp. 107-113. |
Zhang et al. 1993 |
Zhang, L., Deering, S.E., Estrin, D., Shenker, S. and Zappala, D. (1993). RSVP – A New Resource Reservation Protocol. IEEE Network Magazine, Vol. 9, No. 5. |
Zhang et al. 2005a |
Zhang, H., Goel, A., and Govindan, R. (2005). Improving lookup latency in distributed hash table systems using random sampling. IEEE/ACM Trans. Netw, 13, 5 (Oct. 2005), 1121-1134. |
Zhang et al. 2005b |
Zhang, X., Liu, J., Li, B. and Yum, T.-S. (2005). CoolStreaming/ DONet: A data-driven overlay network for live media streaming. In Proceedings of IEEE INFOCOM ’05, Miami, FL, USA, March, pp. 2102-2011. |
Zhao et al. 2004 |
Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D. and Kubiatowicz, J.D. (2004). Tapestry: A resilient global-scale overlay for service deployment, IEEE Journal on Selected Areas in Communications, Vol. 22, No. 1, pp. 41–53. |
Zimmermann 1995 |
Zimmermann, P.R. (1995). The Official PGP User’s Guide. MIT Press. |