[Bauman2019] | A. Baumann, J. Appavoo, O. Krieger, and T. Roscoe. 2019.
A fork() in the road.
Workshop on Hot Topics in Operating Systems (HotOS ‘19). |
[BenAri2006] | M. Ben-Ari, Principles of Concurrent and Distributed Programming Second Edition, Addison-Wesley, 2006. |
[Bovet2005] | D.P. Bovet and M. Cesati, Understanding the Linux Kernel, Third Edition, O’Reilly Media, 2005. |
[Breshears2009] | C. Breshears, The Art of Concurrency: A Thread Monkey’s Guide to Writing Parallel Applications O’Reilly Media, 2009. |
[Bryant2015] | R.E. Bryant and D.R. O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition, Pearson, 2015. |
[Butenhof1997] | D.R. Butenhof, Programming with POSIX Threads Addison-Wesley Professional, 1997. |
[Castro2002] | M. Castro and B. Liskov. 2002. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computer Systems 20, 4 (November 2002), 398-461. |
[Chandra2001] | R. Chandra et al., Parallel Programming in OpenMP CA: Morgan Kaufmann, 2001. |
[Comer2015] | D. Comer, Operating System Design: The Xinu Approach, Second Edition, Chapman and Hall/CRC, 2015. |
[Copeland2010] | J. Copeland, T. Flowers, et al., Colossus: The Secrets of Bletchley Park’s Codebreaking Computers, Oxford University Press, 2010. |
[Coulouris2012] | G. Coulouris et al., Distributed Systems: Concepts and Design Fifth Edition, Addison-Wesley, 2012. |
[Downey2008] | A.B. Downey, The Little Book of Semaphores Second Edition, Green Tea Press, 2008. Available at http://greenteapress.com/semaphores. |
[Fall2012] | K.R. Fall and W.R. Stevens, TCP/IP Illustrated, Volume 1: The Protocols Second Edition, Addison-Wesley Professional, 2012. |
[Gove2011] | D. Gove, Multicore Application Programming Addison-Wesley, 2011. |
[Hicks2018] | M. Hicks, Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing, MIT Press, 2018. |
[Kerrisk2010] | M. Kerrisk, The Linux Programming Interface, No Starch Press, 2010. |
[Kirk2013] | D.B. Kirk and W.W. Hwu, Programming Massively Parallel Processors: A Hands-on Approach Second Edition, Morgan Kaufmann, 2013. |
[Kocher2018] | P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. 2019. Spectre attacks: Exploiting speculative execution. 40th IEEE Symposium on Security and Privacy (S&P ‘19). |
[Kurose2016] | J. Kurose and K. Ross, Computer Networking: A Top-Down Approach Seventh Edition, Pearson, 2016. |
[Lamport1978] | L. Lamport. 1978. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM 21, 7 (July 1978), 558-565. |
[Lamport1982] | L. Lamport, R. Shostak, and M. Pease. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4, 3 (July 1982), 382-401. |
[Lamport2001] | L. Lamport. 2001. Paxos made simple. ACM SIGACT News (Distributed Computing Column) 32, 4 (December 2001), 51-58. |
[Lin2009] | C. Lin and L. Snyder, Principles of Parallel Programming Addison-Wesley, 2009. |
[Lipp2018] | M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh, J. Horn, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg. 2018. Meltdown: Reading kernel memory from user space. 27th USENIX Security Symposium (USENIX Security ‘18). |
[Love2010] | R. Love, Linux Kernel Development, Third Edition, Addison-Wesley Professional, 2010. |
[McCool2012] | M. McCool, A.D. Robison, and J. Reinders, Structured Parallel Programming: Patterns for Efficient Computation Morgan Kaufmann, 2012. |
[Nakamoto2008] | S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Available at https://bitcoin.org/bitcoin.pdf. |
[Pacheco2011] | P. Pacheco, An Introduction to Parallel Programming Morgan Kaufmann, 2011. |
[Ratnasamy2001] | S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. 2001. A scalable content-addressable network. SIGCOMM Comput. Commun. Rev. 31, 4 (October 2001), 161-172. |
[Renesse2015] | R. V. Renesse and D. Altınbüken. 2015. Paxos made moderately complex. ACM Computer Surveys, Vol. 47, No. 3 (February 2015). |
[Rowstron2001] | A. Rowstron and P. Druschel. 2001. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware) (November 2001), 329-350. |
[Silberschatz2012] | A. Silberschatz, P.B. Galvin, and G. Gagne, Operating System Concepts, Ninth Edition, Wiley, 2012. |
[Singh2006] | A. Singh, Mac OS X Internals: A Systems Approach, Addison-Wesley Professional, 2006. |
[Stevens2013] | W.R. Stevens and S.A. Rago, Advanced Programming in the UNIX Environment, Pearson, 2013. |
[Stoica2001] | I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. SIGCOMM Comput. Commun. Rev. 31, 4 (October 2001), 149-160. |
[Zhao2004] | B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz. 2004. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22, 1 (January 2004), 41-53. |