References

A

Next

Abadi, M. and Needham, R. (1994). Prudent engineering practice for cryptographic protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.

Abdelzaher, T. and Shin, K. (1998). End-host architecture for qos-adaptive communication. In Procs. of the 4th IEEE Real-Time Technology and Applications Symposium, Denver, USA.

Abrams, M. (1998). World Wide Web, Beyond the Basics. Prentice Hall.

Abrams, M., Jajodia, S., and Podell, H., editors (1995). Information Security. IEEE CS Press.

ADA 83 (1983). Ans reference manual for the ada programming language. Technical Report Mil/Std 1815A-1983, American National Standards Institute.

Agnew, B., Hofmeister, C., and Purtilo, J. (1994). Planning for change. IEEE/ IOP/BCS Distributed Systems Engineering Journal, 1(5):313-322.

Agrawal, D. and El-Abbadi, A. (1990). Efficient techniques for replicated data management. In Proceedings of the IEEE Workshop on the Management of Replicated Data, pages 48-52, Houston, USA.

Agrawal, D. and El-Abbadi, A. (1991). An efficient and fault-tolerant solution for distributed mutual exclusion. ACM Transaction on Computer Systems.

Aguilera, M., Chen, W., and Toueg, W. (1998). Failure detection and consensus in the crash-recovery model. In Proc. 12th Int. Symposium on DIStributed Computing (formerly WDAG), pages 231-245, Andros, Greece. Sringer-Verlar LNCS 1499.

Ahamad, M. and Ammar, M. (1991). Multidemensional voting. ACM Transactions on Computer Systems, 9(4):339-431.

Ahamad, M., Hutto, P., and John, R. (1991). Implementing and programming causal distributed shared memory. InProceedings of the 11th IEEE International Confer- ence on Distributed Computing Systems, pages 274-281, Arlington, Texas, USA.

Aidarous, S. and Plevyak, T. (1998). Telecommunications Network Management - Technologies and Implementations. IEEE Press.

Almeida, C. and Veríssimo, P. (1996). Timing failure detection and real-time group communication in quasi-synchronous systems. In Proceedings of the 8th Euromicro Workshop on Real-Time Systems, L'Aquila, Italy.

Alpern, B. and Schneider, F. (1987). Recognizing safety and liveness. Distributed Computing, (2):117-126.

Alvisi, L., Elnozahy, E., Rao, S., Husain, S., and DeMel, A. (1999). An analysis of communication induced checkpointing. In Digest of Papers, The 29th IEEE International Symposium on Fault-Tolerant Computing, Madison - USA.

Alvisi, L. and Marzullo, K. (1993). Non-blocking and orphan-free message logging protocols. In Digest of Papers, The 23rd IEEE International Symposium on Fault-Tolerant Computing, pages 145-154, Toulouse, France.

Ames, S., Gasser Jr., M., and Schell, R. (1983). Security kernel design and implementation: An introduction. Computer, 16(7):14-22.

Amir, Y., Dolev, D., Kramer, S., and Malki, D. (1992). Membership algorithms for multicast communication groups. In Proceedings of the 6th International Workshop on Distributed Algorithms, pages 292-312, Haifa, Israel.

Amir, Y., Dolev, D., Kramer, S., and Malki, D. (1993a). Transis: A communication sub-system for high-availability. InDigest of Papers, The 22nd IEEE Int. Symp. on Fault-Tolerant Computing Systems, pages 76-84.

Amir, Y., Moser, L., Melliar-Smith, P., Agarwal, D., and Ciarfella, P. (1993b). Fast message ordering and membership using a logical token-passing ring. In Proceedings of the 13th International Conference on Distributed Computing Systems, pages 551-560, Pittsburgh, Pennsylvania, USA.

Ananda, A., Tay, B., and Koh, E. (1992). A survey of asynchronous remote procedure calls. Operating Systems Review, 266(2):92.

Anderson, J. (1972). Computer security technology planning study. Technical Report ESD-TR-73-51, Hanscom AFB.

Anderson, R. and Needham, R. (1995). Robustness principles for public key protocols. In Proceedings of the Advances in Cryptology- CRYPTO'95. Springer-Verlag.

ANSA (1987). ANSA Reference Manual, Release 00.03. Advanced Networked Systems Architecture, ESPRIT technical week edition.

ANSA (1990). ANSAware Release 3.0 Reference Manual. APM Ltd, Cambridge.

ANSI X9.9 (1986). American National Standard for Financial Institution Message Authentication (Wholesale).

Arlat, J., Aguera, M., Crouzet, Y., Fabre, J., Martins, E., and Powell, D. (1990). Fault injection for dependability validation: a methodology and some applications. IEEE Trans. on SW Engineering, Special Issue of Experimental Computer Science.

ASN.1 (1990). Information Technology - Open Systems Interconnection - Specification of Abstract Notation One (ASN.1). ISO/IEC.

Audsley, N. (1993). Flexible Scheduling of Hard Real-Time Systems. PhD thesis, University of York, UK.

Aurrecoechea, C., Campbell, A., and Hauw, L. (1998). A survey of QoS architectures. Multimedia Sys. Journal, Special Issue on QoS Arch., 6(3):138-151.

Next