References

B

Previous |

Next

Babaoglu, m. (1987). On the reliability of consensus-based fault-tolerant distributed computing systems. ACM Transactions on Computer Systems, 5(3):394-416.

Babaoglu, m., Baker, M., Davoli, R., and Giachini, L.-A. (1994). RELACS: A communications infrastructure for constructing reliable applications in large-scale distributed systems. In Procs. of the 28th Hawaii Int'l Confer. on System Sciences.

Babaoglu, m. and Marzullo, K. (1993). Consistent global states of distributed systems: Fundamental concepts and mechanisms. In Mullender, S., editor, Distributed Systems (2nd edition), chapter 4. Addison-Wesley.

Babaoglu, O., Bartoli, A., and Dini, G. (2000). Programming partition-aware network applications. In Krakowiak, S. and Shrivastava, S., editors, Recent Advances in Distributed Systems, volume 1752 of LNCS, chapter 8. Springer-Verlag.

Babaoglu, O., Drummond, R., and Stephenson, P. (1986). The impact of communication network properties on reliable broadcast protocols. IEEE Transactions on Software Engineering, (6):212-217.

Baker, S. (1997). Corba Distributed Objects : Using Orbix. Number ISBN: 0201924757. Addison-Wesley.

Bal, H. and Tanenbaum, A. (1988). Distributed programming with shared data. In Procs. of the IEEE Conf. on Computer Languages, pages 82-91.

Baldi, M., Gai, S., and Picco, G.-P. (1997). Exploiting code mobility in decentralized and exible network management (ma'97). In Proceedings of the 1st International Workshop on Mobile Agents 97, pages 13-26, Berlin, Germany. Springer, Lecture Notes on Computer Science vol. 1219.

Banker, K. and Mellquist, P. (1995). Snmp++: A portable object-oriented approach to network management programming. ConneXions, 9(3):35-41.

Barabanov, M. and Yodaiken, V. (1997). Real-time linux. Linux Journal.

Barbacci, M., Weinstock, C., Doubleday, D.,Gardner, M., and Lichota, R. (1993). Durra: A structure description language for developing distributed applications. Sofware Engineering Journal, 8(2):83-94.

Barborak, M., Malek, M., and Dahbura, A. (1993). The consensus problem in fault- tolerant computing. ACM Computing Surveys, 25(2):171-220.

Barrett, P., Bond, P., Hilborne, A., Rodrigues, L., Seaton, D., Speirs, N., and Veríssimo, P. (1990). The Delta-4 Extra performance architecture (XPA). In Digest of Papers, The 20th IEEE International Symposium on Fault-Tolerant Computing, Newcastle- UK. also as INESC AR/21-90.

Bartlett, J., Gray, J., and Horst, B. (1987). Fault tolerance in Tandem computer sys- tems. In Avizienis, A., Kopetz, H., and Laprie, J., editors, Dependable Computing and Fault-Tolerant Systems, volume 1, pages 55-76. Springer-Verlag.

Bauer, A., Bowden, R., Browne, J., Duggan, J., and Lyons, G. (1991). Shop Floor Control Systems. Chapman Hall, London.

Becker, L., Pereira, C., Dias, O., Teixeira, I., and Teixeira, J. (2000). Mosys a methodology for automatic object identification from system specification. In Procs. of ISORC 2000, the 3rd IEEE Int'l Symp. on Object-Oriented Real-Time Distributed Computing, pages 198-201, Newport Beach, USA.

Beekmann, D. (1989). CIM-OSA: Computer integrated manufacturing - open system architecture. Int'l Journal Computed Integrated Manufacturing.

Beertema, P. (1993). Common dns data file configuration errors. Technical Report RFC 1537, USc Inf. S. Inst.

Bell, D. and LaPadula, L. (1973). Secure computer systems: Mathematical foundations and model. Technical report, MITRE Corp.

Bellissard, L., Atallah, S., Boyer, F., and Riveill, M. (1996). Distributed application configuration. In Proceedings of the 16th IEEE International Conference on Distributed Computing Systems, pages 579-585, Hong-Kong.

Bellovin, S. and Merritt, M. (1992). Encrypted key exchange: Password-based proto- cols secure against dictionary attacks. In Proceedings of the 1992 IEEE Computer Society Conference onResearch in Security and Privacy, pages 72-84.

Ben-Ari, M. (1990). Principles of Concurrent and Distributed Programming. Prentice Hall.

Berndtsson, M. and Hansson, J. (1995). Issues in active real-time databases. In Proceedings of the First ACM International Workshop on Active and Real-Time Database Systems, pages 142-157, Skovde, Sweden.

Berners-Lee, T. and Cailliau, R. (1990). Worldwideweb: Proposal for a hypertext project. Technical report.

Bernstein, P., Hadzilacos, V., and Goodman, N. (1987). Concurrency Control and Recovery in Database Systems. Addison-Wesley.

Bershad, B. and Zekauskas, M. (1991). Midway: Shared memory paralel programming with entry consistency for distributed memory multiprocessors. Technical Report CMU-CS-91-170, Carnegie-Mellon University.

Bhide, A., Elnozahy, E., and Morgan, S. (1991). A highly available network file server. In Proceedings of the USENIX Winter Conference, pages 199-205.

Biba, K. (1977). Integrity considerations for secure computer systems. Technical Report 76-372, U.S. Air Force Electronic Systems Division.

Birman, K., editor (1996). Building Secure andReliable Network Applications. Number ISBN 1-884777-29-5. Manning Publications Co.

Birman, K. and Joseph, T. (1987). Reliable Communication in the Presence of Failures. ACM, Transactions on Computer Systems, 5(1).

Birman, K., Schiper, A., and Stephenson, P. (1991a). Lightweight causal and atomic group multicast. ACM Transactions on Computer Systems, 9(3).

Birman, K., Schiper, A., and Stephenson, P. (1991b). Lightweight Causal and Atomic Group Multicast. ACM Transacs. on Computer Systems, 9(3):272-314.

Birman, K. and van Renesse, R., editors (1994). Reliable Distributed Computing With the ISIS Toolkit. Number ISBN 0-8186-5342-6. IEEE CS Press.

Birrell, A. and Nelson, B. (1984). Implementing remote procedure calls. ACM Transactions on Computer Systems, 2(1).

Bloom, J. and Dunlap, K. (1986). Experiences implementing bind, a distributed name server for the darpa internet. In USENIX Summer, pages 172-181.

Bodilsen, S. (1994). Scheduling theory and ada 9x. Embedded Systems Programming, pages 32-52.

Boehm, B. (1988). A spiral model of software development and enhancement. IEEE Computer, pages 61-72.

Boly, J., Bosselaers, A., Cramer, R., Michelsen, R., Mjolsnes, S., Muller, F., Peder- sen, T., Pfitzmannn, B., de Rooji, P., Schoenmakers, B., Schunter, M., Vallée, L., and Waidner, M. (1994). The esprit project cafe - high security digital payment system. In Proceedings of the Third ESORICS, European Symposium on Research in Computer Security, pages 217-230. Springer-Verlag, Vol.875.

Boorstin, D. (1983). The Discoverers. Gradiva/Random House.

Bowen, N., Antognini, J., Regan, R., and Matsakis, N. (1997a). Availability in parallel systems: automatic process restart. IBM Systems Journal, 36(2):284-300.

Bowen, N., Elko, D., Isenberg, J., and Wang, G. (1997b). A locking facility for parallel systems. IBM Systems Journal, 36(2):202-220.

Bozga, M., Daws, C., Maler, O., Olivero, A., Tripakis, S., and Yovine, S. (1998). Kronos: a model-checking tool for real-time systems. In Proceedings of CAV'98, the 10th IEEE Conference Computer-Aided Verification.

Bradley, D., Dawson, D., Burd, N., and Loader, A., editors (1991). Mechatronics, Electronics in Products and Processes. Chapman and Hall.

Brands, S. (1995). Electronic cash on the internet. In Proceedings of the Internet Society 1995 Symposium on Network and Distributed Systems Security, pages 64-84. IEEE Computer Society Press.

Brewer, E., Gauthier, P., Goldberg, I., and Wagner, D. (1995). Basic aws in internet security and commerce. Technical report, Dpt. of CS, Berkeley University.

Brites, A., Simões, P., Leitão, P., Monteiro, E., and Fernandes, F. (1994). A high-level notation for the specification of network management applications. In Proceedings of the INET'94/JENC5, pages 5611-8.

Budhiraja, N., Marzullo, K., Schneider, F., and Toueg, S. (1993). The primary-backup approach. In Mullender, S., editor, Distributed Systems, 2nd Edition, ACM-Press, chapter 8. Addison-Wesley.

Burns, A. and Welling, A. (1996). Advanced fixed priority scheduling. In Joseph, M., editor, Real-Time Systems. Prentice-Hall.

Burns, A. and Wellings, A. (1995). Hard Real-Time HOOD: A Structured Design Method for Hard Real-Time Ada Systems. Elsevier.

Burns, A. and Wellings, A. (1996). Real-Time Systems and Programming Languages. International Computer Science Series. Addison-Wesley.

Buttazzo, G., editor (1997). Hard Real-Time Computing Systems, Predictable Scheduling Algorithms and Applications. Kluwer Academic Publishers.

Previous |

Next