References

L

Previous |

Next

Ladin, R., Liskov, B., Shrira, L., and Ghemawat, S. (1992). Providing high availability using lazy replication. ACM Transactions on Computer Systems, 10(4):360-391.

Lai, X. (1992). On the Design and Security of Block Ciphers. ETH Series in Information Processing, Vol.1. Konstanz Hartung-Gorre Verlag.

Lamb, J. and Lew, P. (1996).Lotus Notes Network Design : For Notes Release 3 and 4. Computer Communications. McGraw-Hill.

Lamport, L. (1978a). The implementation of reliable distributed multiprocess systems. Computer Networks 2, (1978):95-115.

Lamport, L. (1978b). Time, Clocks and the Ordering of Events in a Distributed System. CACM, 21(7):558-565.

Lamport, L. (1979). How to make a multiprocessor computer that correctly executes multiprocess programs. IEEE Transacs. on Computers, 28(9):690-691.

Lamport, L. (1981). Password identification with insecure communications. Communications of the ACM, 24(11):770-772.

Lamport, L. (1984). Using Time Instead of Timeout for Fault-Tolerant Distributed Systems. ACM Transactions on Prog. Lang. and Systems, 6(2).

Lamport, L. (1994). The temporal logic of actions. ACM Transactions on Programming Language and Systems, 16(3).

Lamport, L. and Melliar-Smith, P. (1985). Synchronizing Clocks in the Presence of Faults. Journal of the ACM, 32(1):52-78.

Lamport, L., Shostak, R., and Pease, M. (1982). The byzantine generals problem. ACM Transactions on Prog. Lang. and Systems, 4(3).

Lampson, B. (1974). Protection. Operating Systems Review, 8(1):18-24.

Lampson, B. (1981). Atomic transactions. In Distributed Systems - Architecture and Implementation: An Advanced Course, volume 105 of Lecture Notes in Computer Science, chapter 11, pages 246-265. Springer-Verlag.

Lampson, B. (1993). Authentication in distributed systems. In Mullender, S., editor, Distributed Systems, 2nd Edition, ACM-Press, chapter 21. Addison-Wesley.

Lampson, B., Abadi, M., and Wobber, E. (1992). Authentication in distributed systems: Theory and practice. ACM Trans. on Computer Systems, 10(4):265-310.

Langsford, A. (1994). Osi management model and standards. In Sloman, M., editor, Network and Distributed Syst. Management, chapter 4. Addison-Wesley.

Laplante, P. (1997). Real-time systems design and analysis: an engineer's handbook, 2nd Edition. IEEE Press.

Laprie, J. (1987). Dependability: A Unifying Concept for Reliable Computing and Fault-Tolerance. In Resilient Computing Systems, volume 2. Collins and Wiley.

Laprie, J.-C. (1992). Dependability: A unifying concept for reliable, safe, secure computing. In IFIP Congress, volume 1, pages 585-593.

Laprie, J.-C., editor (1998). Dependability Handbook, volume Report Nr.98-346 of Laboratory for Dependability Engineering. LAAS.

Lauer, H. and Satterwaite, E. (1979). The impact of mesa on systems design. In Procs. of the 4th IEEE Int'l Conf. on Software Engineering, pages 174-182.

Le Lann, G. and Rivière, N. (1993). Real-time communications over broadcast networks: the CSMA-DCR and the DOD-CSMA-CD protocols. Technical Report 1863, INRIA.

Lea, D. (1997). Concurrent Programming in Java. Design Principles and Patterns. Addison-Wesley.

Lee, P. and Anderson, T. (1990). Fault-Tolerant: Principles and Practice, Second Edition. Springer-Verlag.

Lehoczky, J.(1998). Scheduling communication networks carrying real-time traffic. In Procs. of RTSS'98, the 19th IEEE Real-Time Systems Symp.

Leiner, B., Cerf, V., Clark, D., Kahn, R., Kleinrock, L., Lynch, D., Postel, J., Roberts, L., and Wol , S. (1997). The past and future history of the internet. Communications of the ACM, 40(2):102-108.

Leinwand, A. and Conroy, K. (1996). Network Management: a Practical Perspective. UNIX and Open Systems. Addison-Wesley.

Leslie, I., McAuley, D., Black, R., Roscoe, T., Barham, P., Evers, D., Fairbairns, R., and Hyden, E. (1996). The design and implementation of an operating system to support distributed multimedia applications. IEEE Journal on Selected Areas in Communication, 14(7).

Leung, J. and J., W. (1982). On the complexity of fixed-priority scheduling of periodic, real-time tasks. Performance Evaluation, 2(4):237-250.

Levine, P. (1987). The apollo domain distributed file system. In Theory and Practice of Distributed Operating Systems. Springer Verlag, NATO ASI Series.

Lewis, L. and Dreo, G. (1993). Extending trouble ticket systems to fault diagnostics. IEEE Network, 7(6):44-51.

Li, K. and Hudak, P. (1989). Memory coherence in shared virtual memory systems. ACM Transactions on Computer Systems, 7(4):321-359.

Lin, J. and Paul, S. (1996). RMTP: a reliable multicast transport protocol. In Proceedings of the IEEE INFOCOM'96, pages 1414-1424.

Linn, J. (1993). Privacy enhancement for internet electronic mail: Part I-message encipherment and authentication procedures. Technical Report RFC1421, IETF.

Linn, J. (1996). Generic security service application programming interface (GSS- API), version 2. Technical Report Internet Draft, IETF.

Liskov, B. (1985). The ARGUS language and system. In Distributed Systems, Methods and Tools for Specification, volume 190 of  LNCS. Springer-Verlag.

Liskov, B., Castro, M., Shrira, L., and Adya, A. (1999). Providing persistent objects in distributed systems. In Proceedings of the ECOOP'99 - Object Oriented Programming, number 1628 in Lecture Notes in Computer Science, pages 230-257, Lisbon, Portugal. Springer-Verlag.

Liskov, B., Ghemawat, S., Gruber, R., Johnson, P., and Shrira, L. (1992). Efficient recovery in harp. In Proceedings of the Second IEEE Workshop on the Management of Replicated Data, pages 104-106, Monterey, California.

Liskov, B., Scheifler, R., Walker, E., and Weihl, W. (1987). Orphan detection. In Digest of Papers, The 17th IEEE International Symposium on Fault-Tolerant Computing, Pittsburgh-USA.

Liu, C. and Layland, J. (1973). Scheduling algorithms for multiprogramming in a hard real-time environment. Journal of the ACM, 20(1):46-61.

Lockhart Jr., H. (1994). OSF DCE. McGraw-Hill.

Lowe, G. (1995). An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133.

Lundelius, J. and Lynch, N. (1984a). A New Fault-Tolerant Algorithm for Clock Syncronization. In Proceedings of the 3rd ACM SIGACT-SIGOPS Symp. on Principles of Distrib. Computing, pages 75-88, Vancouver-Canada.

Lundelius, J. and Lynch, N. (1984b). An upper and lower bound for clock synchronization. Information and Control, 62:190-204.

Lupu, E. and Sloman, M. (1997). Towards a role based framework for distributed systems management. Journal of Network and Syst. Manag't, 5(1).

Lynch, N. (1996). Data link protocols. In Distributed Algorithms, pages 691-732. Morgan-Kaufmann.

Lyu, M., editor (1995). Software Fault Tolerance. Wiley.

Previous |

Next