6.2. Alphabetical BibliographyANDERSON, T. E., BERSHAD, B. N., LAZOWSKA, E. D., and LEVY, H. M.: "Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism," ACM Trans. on Computer Systems, vol. 10, pp. 53-79, Feb. 1992. ANDREWS, G. R., and SCHNEIDER, F. B.: "Concepts and Notations for Concurrent Programming," Computing Surveys, vol. 15, pp. 3-43, March 1983. AYCOCK, J., and BARKER, K.: "Viruses 101," Proc. Tech. Symp. on Comp. Sci. Education, ACM, pp. 152-156, 2005. BACH, M. J.: The Design of the UNIX Operating System, Upper Saddle River, NJ: Prentice Hall, 1987. BALA, K., KAASHOEK, M. F., and WEIHL, W.: "Software Prefetching and Caching for Translation Lookaside Buffers," Proc. First Symp. on Oper. Syst. Design and Implementation, USENIX, pp. 243-254, 1994. BASILI, V. R., and PERRICONE, B. T.: "Software errors and Complexity: An Empirical Investigation," Commun. of the ACM, vol. 27, pp. 43-52, Jan. 1984. BAYS, C.: "A Comparison of Next-Fit, First-Fit, and Best-Fit," Commun. of the ACM, vol. 20, pp. 191-192, March 1977. BEN-ARI, M: Principles of Concurrent and Distributed Programming, Upper Saddle River, NJ: Prentice Hall, 1990. BIC, L. F., and SHAW, A. C.: Operating System Principles, Upper Saddle River, NJ: Prentice Hall, 2003. BOEHM, H. -J.: "Threads Cannot be Implemented as a Library," Proc. 2004 ACM SIG-PLAN Conf. on Prog. Lang. Design and Impl., ACM, pp. 261-268, 2005. BOVET, D. P., and CESATI, M.: Understanding the Linux Kernel, 2nd Ed., Sebastopol, CA, O'Reilly, 2002. BRINCH HANSEN, P.: Operating System Principles Upper Saddle River, NJ: Prentice Hall, 1973. BRINCH HANSEN, P.: Classic Operating Systems, New York: Springer-Verlag, 2001. BROOKS, F. P., Jr.: The Mythical Man-Month: Essays on Software Engineering, Anniversary Ed., Boston: Addison-Wesley, 1995. CERF, V. G.: "Spam, Spim, and Spit," Commun. of the ACM, vol. 48, pp. 39-43, April 2005. CHEN, H, WAGNER, D., and DEAN, D.: "Setuid Demystified," Proc. 11th USENIX Security Symposium, pp. 171-190, 2002. CHEN, P. M., LEE, E. K., GIBSON, G. A., KATZ, R. H., and PATTERSON, D. A.: "RAID: High Performance Reliable Secondary Storage," Computing Surveys, vol. 26, pp. 145-185, June 1994. CHERITON, D. R.: "An Experiment Using Registers for Fast Message-Based Interprocess Communication," Operating Systems Review, vol. 18, pp. 12-20, Oct. 1984. CHERVENAK, A., VELLANSKI, V., and KURMAS, Z.: "Protecting File Systems: A Survey of Backup Techniques," Proc. 15th Symp. on Mass Storage Systems, IEEE, 1998 CHOU, A., YANG, J. -F., CHELF, B., and HALLEM, S.: "An Empirical Study of Operating System Errors," Proc. 18th Symp. on Oper. Syst. Prin., ACM, pp. 73-88, 2001. COFFMAN, E. G., ELPHICK, M. J., and SHOSHANI, A.: "System Deadlocks," Computing Surveys, vol. 3, pp. 67-78, June 1971. CORBATO', F. J.: "On Building Systems That Will Fail," Commun. of the ACM, vol. 34, pp. 72-81, Sept. 1991. CORBATO', F. J., MERWIN-DAGGETT, M., and DALEY, R. C: "An Experimental Time-Sharing System," Proc. AFIPS Fall Joint Computer Conf., AFIPS, pp. 335-344, 1962. CORBATO', F. J., SALTZER, J. H., and CLINGEN, C. T.: "MULTICSThe First Seven Years," Proc. AFIPS Spring Joint Computer Conf., AFIPS, pp. 571-583, 1972. CORBATO', F. J., and VYSSOTSKY, V. A.: "Introduction and Overview of the MULTICS System," Proc. AFIPS Fall Joint Computer Conf., AFIPS, pp. 185-196, 1965. CORBET, J., RUBINI, A., and KROAH-HARTMAN, G.: Linux Device Drivers, 3rd Ed. Sebastopol, CA: O'Reilly, 2005. COURTOIS, P. J., HEYMANS, F., and PARNAS, D. L.: "Concurrent Control with Readers and Writers," Commun. of the ACM, vol. 10, pp. 667-668, Oct. 1971. DALEY, R. C., and DENNIS, J. B.: "Virtual Memory, Processes, and Sharing in MULTICS," Commun. of the ACM, vol. 11, pp. 306-312, May 1968. DEITEL, H. M., DEITEL, P. J., and CHOFFNES, D. R.: Operating Systems, 3rd Ed., Upper Saddle River, NJ: Prentice-Hall, 2004. DENNING, D.: "The United states vs. Craig Neidorf," Commun. of the ACM, vol. 34, pp. 22-43, March 1991. DENNING, P. J.: "The Working Set Model for Program Behavior," Commun. of the ACM, vol. 11, pp. 323-333, 1968a. DENNING, P. J.: "Thrashing: Its Causes and Prevention," Proc. AFIPS National Computer Conf., AFIPS, pp. 915-922, 1968b. DENNING, P. J.: "Virtual Memory," Computing Surveys, vol. 2, pp. 153-189, Sept. 1970. DENNING, P. J.: "Working Sets Past and Present," IEEE Trans. on Software Engineering, vol. SE-6, pp. 64-84, Jan. 1980. DENNING, P. J.: "The Locality Principle," Commun. of the ACM, vol. 48, pp. 19-24, July 2005. DENNIS, J. B., and VAN HORN, E. C.: "Programming Semantics for Multiprogrammed Computations," Commun. of the ACM, vol. 9, pp. 143-155, March 1966. DIBONA, C., OCKMAN, S., and STONE, M. eds.: Open Sources: Voices from the Open Source Revolution, Sebastopol, CA: O'Reilly, 1999. DIJKSTRA, E. W.: "Co-operating Sequential Processes," in Programming Languages, Genuys, F. (Ed.), London: Academic Press, 1965. DIJKSTRA, E. W.: "The Structure of THE Multiprogramming System," Commun. of the ACM, vol. 11, pp. 341-346, May 1968. DIJKSTRA, E. W.: "My Recollections of Operating System Design," Operating Systems Review, vol. 39, pp. 4-40, April 2005. DODGE, C., IRVINE, C., and NGUYEN, T.: "A Study of Initialization in Linux and OpenBSD," Operating Systems Review, vol. 39, pp. 79-93 April 2005. ENGLER, D., CHEN, D. Y., and CHOU, A.: "Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code," Proc. 18th Symp. on Oper. Syst. Prin., ACM, pp. 57-72, 2001. ENGLER, D. R., KAASHOEK, M. F., and O'TOOLE, J. Jr.: "Exokernel: An Operating System Architecture for Application-Level Resource Management," Proc. 15th Symp. on Oper. Syst. Prin., ACM, pp. 251-266, 1995. FABRY, R. S.: "Capability-Based Addressing," Commun. of the ACM, vol. 17, pp. 403-412, July 1974. FEELEY, M. J., MORGAN, W. E., PIGHIN, F. H., KARLIN, A. R., LEVY, H. M., and THEKKATH, C. A.: "Implementing Global Memory Management in a Workstation CLuster," Proc. 15th Symp. on Oper. Syst. Prin., ACM, pp. 201-212, 1995. FEUSTAL, E. A.: "The Rice Research ComputerA Tagged Architecture," Proc. AFIPS Conf. 1972. FOTHERINGHAM, J.: "Dynamic Storage Allocation in the Atlas Including an Automatic Use of a Backing Store," Commun. of the ACM, vol. 4, pp. 435-436, Oct. 1961. GARFINKEL, S. L., and SHELAT, A.: "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, vol. 1, pp. 17-27, Jan.-Feb. 2003. GEIST, R., and DANIEL, S.: "A Continuum of Disk Scheduling Algorithms," ACM Trans. on Computer Systems, vol. 5, pp. 77-92, Feb. 1987. GHEMAWAT, S., GOBIOFF, H., and LEUNG., S.-T.: "The Google File System," Proc. 19th Symp. on Oper. Syst. Prin., ACM, pp. 29-43, 2003. GRAHAM, R.: "Use of High-Level Languages for System Programming," Project MAC Report TM-13, M.I.T., Sept. 1970. HAFNER, K., and MARKOFF, J.: Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York: Simon and Schuster, 1991. HALPERN, M.: "VIM: Taming Software with Hardware," IEEE Computer, vol. 36, pp. 21-25, Oct. 2003. HARBRON, T. R.: File Systems: Structures and Algorithms, Upper Saddle River, NJ: Prentice Hall, 1988. HARRIS, S., HARPER, A., EAGLE, C., NESS, J., and LESTER, M.: Gray Hat Hacking: The Ethical Hacker's Handbook, New York: McGraw-Hill Osborne Media, 2004. HAUSER, C., JACOBI, C., THEIMER, M., WELCH, B., and WEISER, M.: "Using Threads in Interactive Systems: A Case Study," Proc. 14th Symp. on Oper. Syst. Prin., ACM, pp. 94-105, 1993. HEBBARD, B. et al.: "A Penetration Analysis of the Michigan Terminal System," Operating Systems Review, vol. 14, pp. 7-20, Jan. 1980. HERBORTH, C.: UNIX Advanced: Visual Quickpro Guide, Berkeley, CA: Peachpit Press, 2005 HERDER, J. N.: "Towards a True Microkernel Operating System," M.S. Thesis, Vrije Universiteit, Amsterdam, Feb. 2005. HOARE, C. A.R.: "Monitors, An Operating System Structuring Concept," Commun. of the ACM, vol. 17, pp. 549-557, Oct. 1974; Erratum in Commun. of the ACM, vol. 18, p. 95, Feb. 1975. HOLT, R. C: "Some Deadlock Properties of Computer Systems," Computing Surveys, vol. 4, pp. 179-196, Sept. 1972. HUCK, J., and HAYS, J.: "Architectural Support for Translation Table Management in Large Address Space Machines," Proc. 20th Annual Int'l Symp. on Computer Arch., ACM, pp. 39-50, 1993. HUTCHINSON, N. C., MANLEY, S., FEDERWISCH, M., HARRIS, G., HITZ, D, KLEIMAN, S, and O'MALLEY, S.: "Logical vs. Physical File System Backup," Proc. Third USENIX Symp. on Oper. Syst. Design and Implementation, USENIX, pp. 239-249, 1999. IEEE: Information technologyPortable Operating System Interface (POSIX), Part 1: System Application Program Interface (API) [C Language], New York: IEEE, 1990. JACOB, B., and MUDGE, T.: "Virtual Memory: Issues of Implementation," IEEE Computer, vol. 31, pp. 33-43, June 1998. JOHANSSON, J., and RILEY, S: Protect Your Windows Network: From Perimeter to Data, Boston: Addison-Wesley, 2005. KERNIGHAN, B. W., and RITCHIE, D. M.: The C Programming Language, 2nd Ed., Upper Saddle River, NJ: Prentice Hall, 1988. KLEIN, D. V.: "Foiling the Cracker: A Survey of, and Improvements to, Password Security," Proc. UNIX Security Workshop II, USENIX, Aug. 1990. KLEINROCK, L.: Queueing Systems, vol. 1, New York: John Wiley, 1975. KNUTH, D. E.: The Art of Computer Programming, Volume 1: Fundamental Algorithms, 3rd Ed., Boston: Addison-Wesley, 1997. LAMPSON, B. W.: "A Scheduling Philosophy for Multiprogramming Systems," Commun. of the ACM, vol. 11, pp. 347-360, May 1968. LAMPSON, B. W.: "A Note on the Confinement Problem," Commun. of the ACM, vol. 10, pp. 613-615, Oct. 1973. LAMPSON, B. W.: "Hints for Computer System Design," IEEE Software, vol. 1, pp. 11-28, Jan. 1984. LEDIN, G., Jr.: "Not Teaching Viruses and Worms is Harmful," Commun. of the ACM, vol. 48, p. 144, Jan. 2005. LESCHKE, T.: "Achieving Speed and Flexibility by Separating Management from Protection: Embracing the Exokernel Operating System," Operating Systems Review, vol. 38, pp. 5-19, Oct. 2004. LEVINE, G. N.: "Defining Deadlocks," Operating Systems Review vol. 37, pp. 54-64, Jan. 2003a. LEVINE, G. N.: "Defining Deadlock with Fungible Resources," Operating Systems Review, vol. 37, pp. 5-11, July 2003b. LEVINE, G. N.: "The Classification of Deadlock Prevention and Avoidance is Erroneous," Operating Systems Review, vol. 39, 47-50, April 2005. LEWINE, D.: POSIX Programmer's Guide, Sebastopol, CA: O'Reilly & Associates, 1991. LI, K., and HUDAK, P.: "Memory Coherence in Shared Virtual Memory Systems," ACM Trans. on Computer Systems, vol. 7, pp. 321-359, Nov. 1989. LINDE, R. R.: "Operating System Penetration," Proc. AFIPS National Computer Conf., AFIPS, pp. 361-368, 1975. LIONS, J.: Lions' Commentary on Unix 6th Edition, with Source Code, San Jose, CA: Peer-to-Peer Communications, 1996. MARSH, B. D., SCOTT, M. L., LEBLANC, T. J., and MARKATOS, E. P.: "First-Class User-Level Threads," Proc. 13th Symp. on Oper. Syst. Prin., ACM, pp. 110-121, 1991. MCHUGH, J. A.M., and DEEK, F. P.: "An Incentive System for Reducing Malware Attacks," Commun. of the ACM, vol. 48, pp. 94-99, June 2005. MCKUSICK, M. K., JOY, W. N., LEFFLER, S. J., and FABRY, R. S.: "A Fast File System for UNIX," ACM Trans. on Computer Systems, vol. 2, pp. 181-197, Aug. 1984. MCKUSICK, M. K., and NEVILLE-NEIL, G. V.: The Design and Implementation of the FreeBSD Operating System, Addison-Wesley: Boston, 2005. MILO, D., DOUGLIS, F., PAINDAVEINE, Y, WHEELER, R., and ZHOU, S.: "Process Migration," ACM Computing Surveys, vol. 32, pp. 241-299, July-Sept. 2000. MILOJICIC, D.: "Operating Systems: Now and in the Future," IEEE Concurrency, vol. 7, pp. 12-21, Jan.-March 1999. MOODY, G.: Rebel Code Cambridge, MA: Perseus, 2001. MORRIS, R., and THOMPSON, K.: "Password Security: A Case History," Commun. of the ACM, vol. 22, pp. 594-597, Nov. 1979. MULLENDER, S. J., and TANENBAUM, A. S.: "Immediate Files," SoftwarePractice and Experience, vol. 14, pp. 365-368, April 1984. NAUGHTON, J.: A Brief History of the Future, Woodstock, NY: Overlook Books, 2000. NEMETH, E., SNYDER, G., SEEBASS, S., and HEIN, T. R.: UNIX System Administation, 3rd Ed., Upper Saddle River, NJ, Prentice Hall, 2000. ORGANICK, E. I.: The Multics System, Cambridge, MA: M.I.T. Press, 1972. OSTRAND, T. J., WEYUKER, E. J., and BELL, R. M.: "Where the Bugs Are," Proc. 2004 ACM Symp. on Softw. Testing and Analysis, ACM, 86-96, 2004. PETERSON, G. L.: "Myths about the Mutual Exclusion Problem," Information Processing Letters, vol. 12, pp. 115-116, June 1981. PRECHELT, L.: "An Empirical Comparison of Seven Programming Languages," IEEE Computer, vol. 33, pp. 23-29, Oct. 2000. RAY, D. S., and RAY, E. J.: Visual Quickstart Guide: UNIX, 2nd Ed., Berkeley, CA: Peachpit Press, 2003. ROSENBLUM, M., and OUSTERHOUT, J. K.: "The Design and Implementation of a Log-Structured File System," Proc. 13th Symp. on Oper. Syst. Prin., ACM, pp. 1-15, 1991. RUSSINOVICH, M. E., and SOLOMON, D. A.: Microsoft Windows Internals, 4th Ed., Redmond, WA: Microsoft Press, 2005. SALTZER, J. H.: "Protection and Control of Information Sharing in MULTICS," Commun. of the ACM, vol. 17, pp. 388-402, July 1974. SALTZER, J. H., and SCHROEDER, M. D.: "The Protection of Information in Computer Systems," Proc. IEEE, vol. 63, pp. 1278-1308, Sept. 1975. SALUS, P. H.: A Quarter Century of UNIX, Boston: Addison-Wesley, 1994. SANDHU, R. S.: "Lattice-Based Access Control Models," Computer, vol. 26, pp. 9-19, Nov. 1993. SATYANARAYANAN, M.: "The Evolution of Coda," ACM Trans. on Computer Systems, vol. 20, pp. 85-124, May 2002. SEAWRIGHT, L. H., and MACKINNON, R. A.: "VM/370A Study of Multiplicity and Usefulness," IBM Systems Journal, vol. 18, pp. 4-17, 1979. SILBERSCHATZ, A., GALVIN, P. B., and GAGNE, G.: Operating System Concepts, 7th Ed., New York: John Wiley, 2004. STALLINGS, W.: Operating Systems, 5th Ed., Upper Saddle River, NJ: Prentice Hall, 2005. STEVENS, W. R., and RAGO, S. A.: Advanced Programming in the UNIX Environment, 2nd Ed., Boston: Addison-Wesley, 2005. STOLL, C.: The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, New York: Doubleday, 1989. SWIFT, M. M., ANNAMALAI, M., BERSHAD, B. N., and LEVY, H. M.: "Recovering Device Drivers," Proc. Sixth Symp. on Oper. Syst. Design and Implementation, USENIX, pp. 1-16, 2004. TAI, K. C., and CARVER, R. H.: "VP: A New Operation for Semaphores," Operating Systems Review, vol. 30, pp. 5-11, July 1996. TALLURI, M., and HILL, M. D.: "Surpassing the TLB Performance of Superpages with Less Operating System Support," Proc. Sixth Int'l Conf. on Architectural Support for Progr. Lang. and Operating Systems, ACM, pp. 171-182, 1994. TALLURI, M., HILL, M. D., and KHALIDI, Y. A.: "A New Page Table for 64-bit Address Spaces," Proc. 15th Symp. on Oper. Syst. Prin., ACM, pp. 184-200, 1995. TANENBAUM, A. S.: Modern Operating Systems, 2nd Ed., Upper Saddle River: NJ, Prentice Hall, 2001 TANENBAUM, A. S., VAN RENESSE, R., STAVEREN, H. VAN, SHARP, G.J., MULLENDER, S. J., JANSEN, J., and ROSSUM, G. VAN: "Experiences with the Amoeba Distributed Operating System," Commun. of the ACM, vol. 33, pp. 46-63, Dec. 1990. TANENBAUM, A. S., and VAN STEEN, M. R.: Distributed Systems: Principles and Paradigms, Upper Saddle River, NJ, Prentice Hall, 2002. TEORY, T. J.: "Properties of Disk Scheduling Policies in Multiprogrammed Computer Systems," Proc. AFIPS Fall Joint Computer Conf., AFIPS, pp. 1-11, 1972. THOMPSON, K.: "UNIX Implementation," Bell System Technical Journal, vol. 57, pp. 1931-1946, July-Aug. 1978. TREESE, W.: "The State of Security on the Internet," NetWorker, vol. 8, pp. 13-15, Sept. 2004. TSEGAYE, M., and FOSS, R.: "A Comparison of the Linux and Windows Device Driver Architectures," Operating Systems Review, vol. 38, pp. 8-33, April 2004. UHLIG, R., NAGLE, D., STANLEY, T, MUDGE, T., SECREST, S., and BROWN, R: "Design Tradeoffs for Software-Managed TLBs," ACM Trans. on Computer Systems, vol. 12, pp. 175-205, Aug. 1994. UPPULURI, P., JOSHI, U., and RAY, A.: "Preventing Race Condition Attacks on File Systems," Proc. 2005 ACM Symp. on Applied Computing, ACM, pp. 346-353, 2005. VAHALIA, U.: UNIX InternalsThe New Frontiers, 2nd Ed., Upper Saddle River, NJ: Prentice Hall, 1996. VOGELS, W.: "File System Usage in Windows NT 4.0," Proc. ACM Symp. on Operating System Principles, ACM, pp. 93-109, 1999. WALDSPURGER, C. A., and WEIHL, W. E.: "Lottery Scheduling: Flexible Proportional-Share Resource Management," Proc. First Symp. on Oper. Syst. Design and Implementation, USENIX, pp. 1-11, 1994. WEISS, A.: "Spyware Be Gone," NetWorker, vol. 9, pp. 18-25, March 2005. WILKES, J., GOLDING, R., STAELIN, C, abd SULLIVAN, T.: "The HP AutoRAID Hierarchical Storage System," ACM Trans. on Computer Systems, vol. 14, pp. 108-136, Feb. 1996. WULF, W. A., COHEN, E. S., CORWIN, W. M., JONES, A. K., LEVIN, R., PIERSON, C., and POLLACK, F. J.: "HYDRA: The Kernel of a Multiprocessor Operating System," Commun. of the ACM, vol. 17, pp. 337-345, June 1974. YANG, J., TWOHEY, P., ENGLER, D. and MUSUVATHI, M.: "Using Model Checking to Find Serious File System Errors," Proc. Sixth Symp. on Oper. Syst. Design and Implementation, USENIX, 2004. ZEKAUSKAS, M. J., SAWDON, W. A., and BERSHAD, B. N.: "Software Write Detection for a Distributed Shared Memory," Proc. First Symp. on Oper. Syst. Design and Implementation, USENIX, pp. 87-100, 1994. ZWICKY, E. D.: "Torture-Testing Backup and Archive Programs: Things You Ought to Know but Probably Would Rather Not," Prof. Fifth Conf. on Large Installation Systems Admin., USENIX, pp. 181-190, 1991. |