References

R

Previous |

Next

Radestock, M. and Eisenbach, S. (1996). Agent-based configuration management. In Proceedings of the Seventh IFIP/IEEE International Workshop on Distributed Systems: Operation and Management.

Rajkumar, R., Gagliardi, M., and Sha, L. (1995). The real-time publisher/ subscriber interprocess communication model for distributed real-time systems: Design and implementation. In Proceedings of RTAS'95, the IEEE Real-Time Technology and Applications Symposium.

Ramamritham, K. (1995). The origin of tcs. In Proceedings of the First ACM International Workshop on Active and Real-Time Database Systems, pages 50-62, Skovde,Sweden. Springer-Verlag.

Ramamritham, K. (1996a). Dynamic priority scheduling. In Joseph, M., editor, Real- Time Systems. Prentice Hall.

Ramamritham, K. (1996b). Real-time databases. International Journal of Distributed and Parallel Databases, 1(2):199-226.

Ramamritham, K., Stankovic, J., and Zhao, W. (1989). Distributed sheduling of tasks with deadlines and resource requirements. IEEE Transactions on Computers, 38(8):1110-1123.

Ramanathan, P., Kandlur, D., and Shin, K. (1990). Hardware-Assisted Software Clock Synchronization for Homogeneous Distributed Systems. IEEE Trans. Computers, C-39(4):514-524.

RAND (1955). A Million Random Digits with 100,000 Normal Deviates. Free Press Publishers.

Randell, B. (1975). System structure for software fault tolerance. IEEE Transactions on Software Engineering, SE-1(2).

Raynal, M., Schiper, A., and Toueg, S. (1991). The causal ordering abstraction and a simple way to implement it.Information Processing Letters, 39(6):343-350.

Redmond, K. and Smith, T. (1980). Project Whirlwind - The History of a Pioneer Computer. Digital Press.

Reiter, M. (1996). Distributing trust with the rampart toolkit. Communications of the ACM, 39(4).

Rennels, D. (1984). Fault-tolerant computing - concepts and examples. IEEE Transactions on Computers, 33(12):1116-1129.

Ricart, G. and Agrawala, A. (1981). An optimal algorithm for mutual exclusion in computer networks. Communications of the ACM, 24(1):9-17.

Ricciulli, L. and Shacham, N. (1997). Modelling correlated alarms in network management systems. In Procs. of the Conference on Communication Networks and Distributed Syst. Modeling and Simulation, CNDS'97, pages 9-16.

Rivest, R. (1992). The MD5 message digest algorithm. Technical Report RFC 1321, IETF.

Rivest, R. and Shamir, A. (1984). How to expose an eavesdropper. Communications of the ACM, 27(4):393-395.

Rivest, R., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2).

Rodrigues, L., Fonseca, H., and Veríssimo, P. (1996). Totally ordered multicast in large-scale systems. In Proceedings of the 16th IEEE International Conference on Distributed Computing Systems, pages 503-510, Hong Kong.

Rodrigues, L., Guerraoui, R., and Schiper, A. (1998a). Scalable atomic multicast. In Proc. of the Seventh IEEE International Conf. on Computer Communications and Networks (IC3N'98), pages 840-847, Lafayette, USA.

Rodrigues, L., Guimarães, M., and Rufino, J. (1998b). Fault-tolerant clocks synchronization in can. In Proc. of the 19th IEEE Real-Time Systems Symp.

Rodrigues, L. and Raynal, M. (2000). Atomic broadcast in asynchronous crash-recovery distributed systems. In Proceedings of the 20th IEEE International Conference on Distributed Computing Systems (ICDCS'20), pages 288-295, Taipe, Taiwan.

Rodrigues, L., Siegel, E., and Veríssimo, P. (1994). A Replication-Transparent Remote Invocation Protocol. In Proceedings of the 13th IEEE Symposium on Reliable Distributed Systems, Dana Point, California.

Rodrigues, L. and Veríssimo, P. (1995). Causal separators for large-scale multicast communication. In Proceedings of the 15th IEEE International Conference on Distributed Computing Systems, pages 83-91, Vancouver, British Columbia, Canada.

Rodrigues, L. and Veríssimo, P. (2000). Topology-aware algorithms for large-scale communication. In Krakowiak, S. and Shrivastava, S., editors, Advances in Distributed Systems, LNCS 1752, chapter 6, pages 127-156. Springer-Verlag.

Rodrigues, L., Veríssimo, P., and Rufino, J. (1993). A low-level processor group membership protocol for LANs. In Proc. of the 13th IEEE International Conference on Distributed Computing Systems, pages 541-550, Pittsburgh, USA.

Rodrigues, L. and Veríssimo, P. (1992). xAMp: a Multi-primitive Group Communications Service. In Proceedings of the 11th IEEE Symposium on Reliable Distributed Systems, Houston, Texas.

Rom, R. (1988). A reconfiguration algorithm for a double-loop token-ring local area network. IEEE Transactions on Computers, 37(2).

Romão, A. (1994). Tools for DNS debugging. Technical Report RFC 1713, USc Inf. S. Inst.

RTS Journal (1997). The challenge of global time in large-scale distributed real-time systems, Schmid,U., ed. Special Issue of the Journal of Real-Time Systems, 12(1-3).

Rufino, J., Veríssimo, P., and Arroz, G. (1999). A Columbus' egg idea for CAN media redundancy. In Digest of Papers, The 29th IEEE International Symposium on Fault-Tolerant Computing Systems, Madison, Wisconsin - USA.

Rufino, J., Veríssimo, P., Arroz, G., Almeida, C., and Rodrigues, L. (1998). Fault- tolerant broadcasts in CAN. In Digest of Papers, The 28th IEEE Int'l Symp. on Fault-Tolerant Computing Systems, Munich, Germany.

Rufino, J. and Veríssimo, P. (1992). A study on the inaccessibility characteristics of ISO 8802/4 Token-Bus LANs. In Proceedings of the IEEE INFOCOM'92 Conference on Computer Communications, Florence, Italy. also INESC AR 16-92.

Ryan, P., Schneider, S., Roscoe, B., Goldsmith, M., and Lowe, G. (2000). The Modelling and Analysis of Security Protocols. Addison-Wesley.

Previous |

Next