Distributed Systems: Concepts and Design
Edition 3

By George Coulouris, Jean Dollimore and Tim Kindberg Addison-Wesley, ©Pearson Education 2001

Home | References | Instructors Guide | Contents | Preface | Authors | Errata | Additional Material |

 

Online reference list

A

Abadi and Gordon 1999

Abadi, M. and Gordon, A. D. (1999). A calculus for cryptographic protocols: The spi calculus. Information and Computation, Vol. 148, No. 1, pp. 1-70, January. http://www.research.microsoft.com/~adg/Publications/spi.ps

Abadi et al. 1998

Abadi, M., Birrell, A.D., Stata, R. and Wobber, E.P (1998). Secure Web tunneling. In Proceedings 7th International World Wide Web Conference, pp. 531-9. Elsevier, In Computer Networks and ISDN Systems, Volume 30, Nos. 1-7. http://research.compaq.com/SRC/personal/birrell/tunnel/

Abrossimov et al. 1989

Abrossimov, V., Rozier, M. and Shapiro, M. (1989). Generic virtual memory management for operating system kernels. Proceedings of 12th ACM Symposium on Operating System Principles, pp. 123-36, December. http://www-sor.inria.fr/publi/GVM_12sosp89.html

Accetta et al. 1986

Accetta, M., Baron, R., Golub, D., Rashid, R., Tevanian, A. and Young, M. (1986). Mach: A new kernel foundation for UNIX development. In Proceedings Summer 1986 USENIX Conference pp. 93-112.

Adjie-Winoto et al. 1999

Adjie-Winoto, W., Schwartz, E., Balakrishnan, H. and Lilley, J. (1999). The design and implementation of an intentional naming system. In Proceedings 17th ACM Symposium on Operating System Principles, published as Operating Systems Review Vol. 34, No. 5, pp. 186-201.

Adve and Hill 1990

Adve, S. and Hill, M. (1990). Weak ordering - a new definition. In Proceedings 17th. Annual Symposium on Computer Architecture, IEEE, pp. 2-14.

Agrawal et al. 1987

Agrawal, D., Bernstein, A., Gupta, P. and Sengupta, S. (1987). Distributed optimistic concurrency control with reduced rollback. Distributed Computing Vol. 2: pp. 45-59. Springer-Verlag.

Ahamad et al. 1992

Ahamad, M., Bazzi, R., John, R., Kohli, P. and Neiger, G. (1992). The Power of Processor Consistency. Technical report GIT-CC-92/34, Georgia Institute of Technology, Atlanta. ftp://ftp.cc.gatech.edu/pub/coc/tech_reports/1992/

Anderson 1993

Anderson, D.P. (1993). Meta-scheduling for distributed continuous media. ACM Transactions on Computer Systems, Vol. 11, No. 3.

Anderson et al. 1990a

Anderson, D.P., Herrtwich, R.G. and Schaefer, C. (1990). SRP - A Resource Reservation Protocol for Guaranteed-Performance Communication in the Internet. Technical report 90-006, International Computer Science Institute, Berkeley, Calif.

Anderson et al. 1990b

Anderson, D.P., Tzou, S., Wahbe, R., Govindan, R. and Andrews, M. (1990). Support for continuous media in the DASH System. Tenth International Conference on Distributed Computing Systems, Paris.

Anderson et al. 1991

Anderson, T., Bershad, B., Lazowska, E. and Levy, H. (1991). Scheduler activations: efficient kernel support for the user-level management of parallelism. In P roceedings 13th ACM Symposium on Operating System Principles, pp. 95-109.

Anderson et al. 1995

Anderson, T., Culler, D., Patterson, D. and the NOW team. (1995). A case for NOW (Networks Of Workstations), IEEE Micro, Vol. 15, No. 1.

Anderson et al. 1996

Anderson, T.E., Dahlin, M. D., Neefe, J. M., Patterson, D. A., Roselli, D. S. and Wang, R. Y. (1996). Serverless Network File Systems. ACM Trans. on Computer Systems 14,1. pp. 41-79. February. http://now.CS.Berkeley.EDU/Papers/Papers/sosp95.ps

ANSA 1989 ANSA (1989). The Advanced Network Systems Architecture (ANSA) Reference Manual. Castle Hill, Cambridge, England: Architecture Project Management.
ANSI 1985 American National Standards Institute (1985). American National Standard for Financial Institution Key Management, Standard X9.17 (revised).
Arnold et al. 1999 Arnold, K., O'Sullivan, B., Scheifler, R.W., Waldo, J. and Wollrath, A. (1999). The Jini Specification, Reading, Mass: Addison-Wesley. http://www.sun.com/jini/specs/index.html
Attiya and Welch1998 Attiya, H., and Welch, J. (1998). Distributed Computing - Fundamentals, Simulations and Advanced Topics, McGraw-Hill.

B

Babaoglu et al. 1998 Babaoglu, O., Davoli, R., Montresor, A. and Segala, R. (1998). System support for partition-aware network applications. In Proceedings 18th InternationalConference on Distributed Computing Systems (ICDCS ' 98), pp. 184-191.  
Bacon 1998 Bacon, J. (1998). Concurrent Systems, second edition. Wokingham, England: Addison-Wesley.  
Baker 1997 Baker, S. (1997). CORBA Distributed Objects Using Orbix, Harlow, England: Addison-Wesley.  
Bal et al. 1990 Bal, H.E., Kaashoek, M.F. and Tanenbaum, A.S. (1990). Experience with distributed programming in Orca. In Proceedings International Conference on Computer Languages '90, IEEE, pp. 79-89.  
Balakrishnan et al. 1995 Balakrishnan, H., Seshan, S. and Katz, R.H. (1995). Improving reliable transport and hand-off performance in cellular wireless networks. In Proceedings ACM Mobile Computing and Networking Conference, ACM, pp. 2-11.  
Balakrishnan et al. 1996 Balakrishnan, H., Padmanabhan, V., Seshan, S. and Katz, R. (1996). A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. Proceedings of the ACM SIGCOMM '96 Conference, pp. 256-69.  
Banerjea and Mah 1991 Banerjea, A. and Mah, B.A. (1991). The real-time channel administration protocol. Second International Workshop on Network and Operating System Support for Digital Audio and Video, Heidelberg.  
Baran 1964 Baran, P. (1964). On Distributed Communications. Research Memorandum RM-3420-PR, Rand Corporation. http://www.rand.org/publications/RM/RM3420/  
Barborak et al. 1993 Barborak, M., Malek, M. and Dahbura, A. (1993). The consensus problem in fault-tolerant computing. ACM Computing Surveys, Vol. 25, No. 2, pp. 171-220.  
Barghouti and Kaiser 1991 Barghouti, N.S. and Kaiser G.E. (1991). Concurrency control in advanced database applications. Computing Surveys, Vol. 23, No. 3, pp. 269-318.  
Bartoli et al. 1993 Bartoli, A., Mullender, S.J. and van der Valk, M. (1993). Wide-address spaces - exploring the design space. ACM Operating Systems Review, Vol. 27, No. 1, pp. 11-17.  
Bates et al. 1996 Bates, J., Bacon, J., Moody, K. and Spiteri, M. (1996). Using events for the scalable federation of heterogeneous components, European SIGOPS Workshop.  
Bell and LaPadula 1975 Bell, D.E. and LaPadula, L.J. (1975). Computer Security Model: Unified Exposition and Multics Interpretation, Mitre Corporation, 1975.  
Bellman 1957 Bellman, R.E. (1957). Dynamic Programming. Princeton, NJ: Princeton University Press.  
Bellovin and Merritt 1990 Bellovin, S.M. and Merritt, M. (1990). Limitations of the Kerberos authentication system. ACM Computer Communications Review, Vol. 20, No. 5, pp. 119-32.  
Berners-Lee 1991 Berners-Lee, T. (1991). World Wide Web Seminar. http://www.w3.org/Talks/General.html  
Berners-Lee 1999 Berners-Lee, T. (1999). Weaving The Web. HarperCollins.  
Bernstein et al. 1980 Bernstein, P.A., Shipman, D.W. and Rothnie, J.B. (1980). Concurrency control in a system for distributed databases (SDD-1). ACM Transactions Database Systems, Vol. 5, No. 1, pp. 18-51.  
Bernstein et al. 1987 Bernstein, P., Hadzilacos, V. and Goodman, N. (1987). Concurrency Control and Recovery in Database Systems. Reading, Mass.: Addison-Wesley.  
Bershad et al. 1990 Bershad, B., Anderson, T., Lazowska, E. and Levy, H. (1990). Lightweight remote procedure call. ACM Transactions Computer Systems, Vol. 8, No. 1, pp. 37-55.  
Bershad et al. 1991 Bershad, B., Anderson, T., Lazowska, E. and Levy, H. (1991). User-level interprocess communication for shared memory multiprocessors. ACM Transactions Computer Systems, Vol. 9, No. 2, pp. 175-198.  
Bershad et al. 1993 Bershad, B., Zekauskas, M. and Sawdon, W. (1993). The Midway distributed shared memory system. In Proceedings IEEE COMPCON Conference, IEEE, pp. 528-37.  
Bershad et al. 1995 Bershad, B., Savage, S., Pardyak, P., Sirer, E., Fiuczynski, M., Becker, D., Chambers, C. and Eggers, S. (1995). Safety and performance in the SPIN operating system. Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 267-84.  
Bhatti and Friedrich 1999 Bhatti, N. and Friedrich, R. (1999). Web Server Support for Tiered Services. Hewlett-Packard Corporation Technical Report HPL-1999-160.  
Birman 1993 Birman, K.P. (1993). The process group approach to reliable distributed computing. Comms. ACM, Vol. 36, No. 12, pp. 36-53.  
Birman 1996 Birman, K.P.(1996). Building Secure and Reliable Network Applications. Greenwich, CT: Manning.  
Birman and Joseph 1987a Birman, K.P. and Joseph, T.A. (1987). Reliable communication in the presence of failures. ACM Transactions Computer Systems, Vol. 5, No. 1, pp. 47-76.  
Birman and Joseph 1987b Birman, K., and Joseph, T. (1987). Exploiting virtual synchrony in distributed systems. In Proceedings 11th ACM Symposium on Operating Systems Principles, pp. 123-38.  
Birman et al. 1991 Birman, K.P., Schiper, A. and Stephenson, P. (1991). Lightweight causal and atomic group multicast. ACM Transactions Computer Systems, Vol. 9, No. 3, pp. 272-314.  
Birrell et al. 1995 Birrell, A., Nelson, G. and Owicki, S. (1993). Network objects. In Proceedings 14th ACM Symposium on Operating Systems Principle s, pp. 217-30.  
Birrell and Needham 1980 Birrell, A.D. and Needham, R.M. (1980). A universal file server. IEEE Transactions Software Engineering, Vol. SE-6, No. 5, pp. 450-3.  
Birrell and Nelson 1984 Birrell, A.D. and Nelson, B.J. (1984). Implementing remote procedure calls. ACM Transactions Computer Systems, Vol. 2, pp. 39-59.  
Birrell et al. 1982 Birrell, A.D., Levin, R., Needham, R.M. and Schroeder, M.D. (1982). Grapevine: an exercise in distributed computing. Comms. ACM, Vol. 25, No. 4, pp. 260-73.  
Bisiani and Forin 1988 Bisiani, R. and Forin, A. (1988). Multilanguage parallel programming of heterogeneous machines. IEEE Transactions Computers, Vol. 37, No. 8, pp. 930-45.  
Bisiani and Ravishankar 1990 Bisiani, R. and Ravishankar, M. (1990). Plus: a distributed shared memory system. In Proceedings 17th International Symposium on Computer Architecture, pp. 115-24.  
Black 1990 Black, D. (1990). Scheduling support for concurrency and parallelism in the Mach operating system, IEEE Computer, Vol. 23, No. 5, pp. 35-43.  
Black and Artsy 1990 Black, A. and Artsy, Y. (1990). Implementing location independent invocation, IEEE Transactions Parallel and Distributed Systems, Vol. 1, No. 1.  
Blair and Stefani 1997 Blair, G.S. and Stefani, J.-B. (1997). Open Distributed Processing and Multimedia. Harlow, England: Addison-Wesley.  
Blakley 1999 Blakley, R. (1999). CORBA Security - An Introduction to Safe Computing with Objects. Reading, Mass.: Addison-Wesley.  
Bolosky et al. 1996 Bolosky, W., Barrera, J., Draves, R., Fitzgerald, R., Gibson, G., Jones, M., Levi, S., Myhrvold, N. and Rashid, R. (1996). The Tiger video fileserver, 6th NOSSDAV Conference, Zushi, Japan, April. http://www.research.microsoft.com/~bolosky/papers/  
Bolosky et al. 1997 Bolosky, W., Fitzgerald, R. and Douceur, J. (1997). Distributed schedule management in the Tiger video fileserver, 16th ACM Symposium on Operating System Principles, pp. 212-23, St. Malo, France, October. http://www.research.microsoft.com/~bolosky/papers/  
Bonnaire et al. 1995 Bonnaire, X., Baggio, A. and Prun, D. (1995). Intrusion free monitoring: an observation engine for message server based applications. In Proceedings of the 10th International Symposium on Computer and Information Sciences (ISCIS X), pp. 541-48.  
Borenstein and Freed 1993 Borenstein, N. and Freed, N., (1993). MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies. September. Internet RFC 1521. http://www.ietf.org/rfc/rfc1521  
Bowman et al. 1990 Bowman, M., Peterson, L. and Yeatts, A. (1990). Univers: an attribute-based name server. Software-Practice and Experience, Vol. 20, No. 4, pp. 403-24.  
Box 1998 Box, D. (1998). Essential COM. Reading, Mass: Addison-Wesley.  
Boykin et al. 1993 Boykin, J., Kirschen, D., Langerman, A. and LoVerso, S. (1993). Programming under Mach. Reading, Mass.: Addison-Wesley.  
Buford 1994 Buford, J.K. (1994). Multimedia Systems. Addison-Wesley.  
Burns and Wellings 1998 Burns, A. and Wellings, A. (1998). Concurrency in Ada, Cambridge University Press.
Burrows et al. 1989 Burrows, M., Abadi, M. and Needham, R. (1989). A logic of authentication. Technical Report 39, Palo Alto, Calif.: Digital Equipment Corporation Systems Research Center.  
Burrows et al. 1990 Burrows, M., Abadi, M. and Needham, R. (1990). A logic of authentication. ACM Transactions Computer Systems, Vol. 8, pp. 18-36.  
Bush 1945 Bush, V. (1945). As we may think. The Atlantic Monthly, July. http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm  

C

Callaghan 1996a Callaghan, B. (1996). WebNFS Client Specification, Internet RFC 2054, October. http://www.ietf.org/rfc/rfc2054
Callaghan 1996b Callaghan, B. (1996). WebNFS Server Specification, Internet RFC 2055, October. http://www.ietf.org/rfc/rfc2055
Callaghan 1999 Callaghan, B. (1999). NFS Illustrated, Reading, Mass.: Addison-Wesley.
Callaghan et al. 1995 Callaghan, B., Pawlowski, B. and Staubach, P. (1995). NFS Version 3 Protocol Specification, Internet RFC 1813, Sun Microsystems, June. http://www.ietf.org/rfc/rfc1813
Campbell 1997 Campbell, R. (1997). Managing AFS: The Andrew File System, Prentice-Hall.
Campbell et al. 1993 Campbell, R., Islam, N., Raila, D. and Madany, P. (1993). Designing and implementing Choices: an object-oriented system in C++. Comms. ACM, Vol. 36, No. 9, pp. 117-26.
Canetti and Rabin 1993 Canetti, R. and Rabin, T. (1993). Fast asynchronous byzantine agreement with optimal resilience.In Proceedings 25th ACM Symposium on Theory of Computing, pp. 42-51.
Carriero and Gelernter 1989 Carriero, N. and Gelernter, D. (1989). Linda in context. Comms. ACM, Vol. 32, No. 4, pp. 444-58.
Carter et al. 1991 Carter, J.B., Bennett, J.K. and Zwaenepoel, W. (1991). Implementation and performance of Munin. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 152-64.
Carter et al. 1998 Carter, J., Ranganathan, A. and Susarla, S. (1998). Khazana, An Infrastructure for Building Distributed Services, In Proceedings of ICDCS '98, Amsterdam, The Netherlands. http://www.cs.utah.edu/khazana/
CCITT 1988a CCITT (1988). Recommendation X.500 : The Directory - Overview of Concepts, Models and Service. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland.
CCITT 1988b CCITT (1988). Recommendation X.509: The Directory - Authentication Framework. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland.
CCITT 1990 CCITT (1990). Recommendation I.150 : B-ISDN ATM Functional Characteristics. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland.
Ceri and Owicki 1982 Ceri, S. and Owicki, S. (1982). On the use of optimistic methods for concurrency control in distributed databases. In Proceedings 6th Berkeley Workshop on Distributed Data Management and Computer Networks, Berkeley,Calif. pp. 117-30.
Ceri and Pelagatti 1985 Ceri, S. and Pelagatti, G. (1985). Distributed Databases - Principles and Systems. McGraw-Hill.
Chandra and Toueg 1996 Chandra, T. and Toueg, S. (1996). Unreliable failure detectors for reliable distributed systems. Journal of the ACM, Apr., pp. 374-82.
Chandy and Lamport 1985 Chandy, K. and Lamport, L. (1985). Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computer Systems, Vol. 3, No. 1, pp. 63-75.
Chang and Maxemchuk 1984 Chang, J. and Maxemchuk, N. (1984). Reliable Broadcast Protocols, ACM Transactions on Computer Systems. Vol. 2. No. 3. pp. 251-75.
Chang and Roberts 1979 Chang, E.G. and Roberts, R. (1979). An improved algorithm for decentralized extrema-finding in circular configurations of processors. Comms. ACM, Vol. 22, No. 5, pp. 281-3.
Charron-Bost 1991 Charron-Bost, B. (1991). Concerning the size of logical clocks in distributed systems. Information Processing Letter s, Vol. 39, July, pp. 11-16.
Chen et al. 1994 Chen, P., Lee, E., Gibson, G., Katz, R. and Patterson, D. (1994). RAID: High-Performance, Reliable Secondary Storage. ACM Computing Surveys, Vol. 26, No. 2, June, pp. 145-188.
Cheng 1998 Cheng, C.K. (1998). A survey of media servers. Hong Kong University CSIS, November, http://www.csis.hku.hk/~ckcheng/papers/video.ps
Cheriton 1984 Cheriton, D.R. (1984). The V kernel: a software base for distributed systems. IEEE Software, Vol. 1 No. 2, pp. 19-42.
Cheriton 1985 Cheriton, D.R. (1985). Preliminary thoughts on problem-oriented shared memory: a decentralized approach to distributed systems. ACM Operating Systems Review, Vol. 19, No. 4, pp. 26-33.
Cheriton 1986 Cheriton, D.R. (1986). VMTP: A protocol for the next generation of communication systems.In Proceedings SIGCOMM '86 Symposium on Communication Architectures and Protocols, ACM, pp. 406-15.
Cheriton and Mann 1989 Cheriton, D. and Mann, T. (1989). Decentralizing a global naming service for improved performance and fault tolerance. ACM Transactions Computer Systems, Vol. 7, No. 2, pp. 147-83.
Cheriton and Skeen 1993 Cheriton, D. and Skeen, D. (1993). Understanding the limitations of causally and totally ordered communication. In Proceedings 14th ACM Symposium on Operating System Principles, Dec., pp. 44-57.
Cheriton and Zwaenepoel 1985 Cheriton, D.R. and Zwaenepoel, W. (1985). Distributed process groups in the V kernel. ACM Transactions Computer Systems, Vol. 3, No. 2, pp. 77-107.
Cheswick and Bellovin 1994 Cheswick, E.R. and Bellovin, S.M. (1994). Firewalls and Internet Security. Reading, Mass.: Addison-Wesley.
Choudhary et al. 1989 Choudhary, A., Kohler, W., Stankovic, J. and Towsley, D. (1989). A modified priority based probe algorithm for distributed deadlock detection and resolution. IEEE Transactions Software Engineering, Vol. 15, No. 1.
Clark 1982 Clark, D.D. (1982). Window and Acknowledgement Strategy in TCP, Internet RFC 813. http://www.ietf.org/rfc/rfc813
Comer 1991 Comer, D.E. (1991). Internetworking with TCP/IP, Volume 1: Principles, Protocols and Architecture. second edition. Englewood Cliffs, NJ: Prentice-Hall.
Comer 1995 Comer, D.E. (1995). The Internet Book. Englewood Cliffs, NJ. Prentice-Hall.
Condict et al. 1994 Condict, M., Bolinger, D., McManus, E., Mitchell, D. and Lewontin, S. (1994). Microkernel modularity with integrated kernel performance. Technical report, OSF Research Institute, Cambridge, Mass, April.
Coulouris et al. 1998 Coulouris, G.F., Dollimore, J. B. and Roberts, M.(1998). Role and task-based access control in the PerDiS groupware platform. Third ACM Workshop on Role-Based Access Control, George Mason University, Washington DC, October 22-23. http://www.perdis.esprit.ec.org/papers/
Cristian 1989 Cristian, F. (1989). Probabilistic clock synchronization. Distributed Computing, Vol. 3, pp. 146-58.
Cristian 1991a Cristian, F. (1991). Understanding fault-tolerant distributed systems. Comms. ACM, Vol. 34, No. 2.
Cristian 1991b Cristian, F. (1991). Reaching agreement on processor group membership in synchronous distributed systems. Distributed Computing, Springer Verlag, Vol. 4, pp 175-87.
Cristian and Fetzer 1994 Cristian, F., and Fetzer, C. (1994). Probabilistic Internal Clock Synchronization. In Proceedings 13th Symposium on Reliable Distributed Systems, IEEE Computer Society Press, October 25-27, pp. 22-31.
Crow et al. 1997 Crow, B., Widjaja, I., Kim, J. and Sakai, P. (1997). IEEE 802.11 Wireless local area networks. IEEE Communications Magazine, Sept. 1997, pp. 116-26.
cryptography.org North American Cryptography Archives. http://cryptography.org/
Curtin and Dolske 1998 Kurtin, M. and Dolski, J. (1998). A brute force search of DES Keyspace. ;login: - the Newsletter of the USENIX Association, May. http://www.interhack.net/pubs/des-key-crack/
Custer 1998 Custer, H. (1998). Inside Windows NT, second edition. Microsoft Press.
Czerwinski et al. 1999 Czerwinski, S., Zhao, B., Hodes, T., Joseph, A. and Katz, R. (1999). An architecture for a secure discovery service. In Proceedings Fifth Annual International Conference on Mobile Computing and Networks.

D

Dasgupta et al. 1991 Dasgupta, P., LeBlanc Jr., R.J. Ahamad, M. and Ramachandran, U. (1991). The Clouds distributed operating system. IEEE Computer, Vol. 24, No. 11, pp. 34-44.
Davidson 1984 Davidson, S.B. (1984). Optimism and consistency in partitioned database systems. ACM Transactions Database Systems, Vol. 9, No. 3, pp. 456-81.
Davidson et al. 1985 Davidson, S.B., Garcia-Molina, H. and Skeen, D. (1985). Consistency in partitioned networks. Computing Surveys, Vol. 17, No.3, pp. 341-70.
DEC 1990 Digital Equipment Corporation. (1990). In Memoriam: J. C. R. Licklider 1915-1990, Technical Report 61, DEC Systems Research Center. http://gatekeeper.dec.com/pub/DEC/SRC/research-reports/abstracts/src-rr-061.html
Delgrossi et al. 1993 Delgrossi, L., Halstrick, C., Hehmann, D., Herrtwich, R.G., Krone, O., Sandvoss, J. and Vogt, C. (1993). Media scaling for audiovisual communication with the Heidelberg transport system. ACM Multimedia ' 93, Anaheim, Calif.
Demers et al. 1989 Demers, A., Keshav, S., Shenker, S. (1989). Analysis and simulation of a fair queueing algorithm. ACM SIGCOMM ' 89.
Denning and Denning 1977 Denning, D. and Denning, P. (1977). Certification of programs for secure information flow. Comms. ACM, Vol. 20, No. 7, pp. 504-13.
Dertouzos 1974 Dertouzos, M.L. (1974). Control robotics - the procedural control of physical processes. IFIP Congress.
Dierks and Allen 1999 Dierks,T. and Allen, C. (1999). The TLS Protocol Version 1.0, Internet RFC 2246. http://www.ietf.org/rfc/rfc2246
Diffie 1988 Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 560-77.
Diffie and Hellman 1976 Diffie, W. and Hellman, M.E. (1976). New directions in cryptography. IEEE Transactions Information Theory, Vol. IT-22, pp. 644-54.
Diffie and Landau 1998 Kahn, D. and Landau, S. (1998). Privacy on the Line. Cambridge, Mass: MIT Press.
Dijkstra 1959 Dijkstra, E.W. (1959). A note on two problems in connection with graphs. Numerische Mathematic, Vol. 1, pp. 269-71.
Dolev and Malki 1996 Dolev, D. and Malki, D. (1996). The Transis approach to high availability cluster communication. Comms. ACM, Vol. 39, No. 4, pp. 64-70.
Dolev and Strong 1983 Dolev, D. and Strong, H. (1983). Authenticated algorithms for byzantine agreement. SIAM Journal of Computing, Vol. 12, No. 4, pp. 656-66.
Dolev et al. 1986 Dolev, D., Halpern, J., and Strong, H. (1986). On the possibility and impossibility of achieving clock synchronization. Journal of Computing Systems Science 32, 2 (Apr.), pp. 230-50.
Dorcey 1995 Dorcey, T. (1995) CU-SeeMe Desktop Video Conferencing Software, Connexions, vol. 9, no. 3 (March).
Douceur and Bolosky 1999 Douceur, J.R. and Bolosky, W. (1999). Improving responsiveness of a stripe-scheduled media server. SPIE Proceedings, Vol. 3654. Multimedia Computing and Networking. pp. 192-203. http://www.research.microsoft.com/~bolosky/papers/thrifty/mmcn99.ps
Douglis and Ousterhout 1991 Douglis, F. and Ousterhout, J. (1991). Transparent process migration: design alternatives and the Sprite implementation, Software - Practice and Experience, Vol. 21, No. 8, pp. 757-89.
Draves 1990 Draves, R. (1990). A revised IPC interface, In Proceedings USENIX Mach Workshop, pp. 101-21, October.
Draves et al. 1989 Draves, R.P., Jones, M.B. and Thompson, M.R. (1989). MIG - the Mach Interface Generator. Technical Report, Dept. of Computer Science, Carnegie-Mellon University.
Druschel and Peterson 1993 Druschel, P. and Peterson, L. (1993). Fbufs: a high-bandwidth cross-domain transfer facility. In Proceedings 14th ACM Symposium on Operating System Principles, pp. 189-202.
Dubois et al. 1988 Dubois, M., Scheurich, C. and Briggs, F.A. (1988). Synchronization, coherence and event ordering in multiprocessors. IEEE Computer, Vol. 21, No. 2, pp. 9-21.
Dwork et al. 1988 Dwork, C., Lynch, N. and Stockmeyer, L. (1988). Consensus in the presence of partial synchrony. Journal of the ACM, Vol. 35, No. 2, pp. 288-323.

E

Eager et al. 1986 Eager, D., Lazowska, E. and Zahorjan, J. (1986). Adaptive load sharing in homogeneous distributed systems. IEEE Transactions on Software Engineering, Vol. SE-12, No. 5, pp. 662-675.
EFF 1998 Electronic Frontier Foundation (1998). Cracking DES, Secrets of Encryption Research, Wiretap Politics & Chip Design. Sebastapol Calif.: O'Reilly & Associates.
Eisler et al. 1997 Eisler, M., Chiu, A, and L. Ling, L. (1997). RPCSEC_GSS Protocol Specification. Sun Microsystems. Internet RFC 2203. September. http://www.ietf.org/rfc/rfc2203
El Abbadi et al. 1985 El Abbadi, A., Skeen, D. and Cristian, C. (1985). An efficient fault-tolerant protocol for replicated data management. In 4th Annual ACM SIGACT/SIGMOD Symposium on Principles of Data Base Systems, Portland, Ore.
Ellis et al. 1991 Ellis, C., Gibbs, S. and Rein, G. (1991). Groupware - some issues and experiences. Comms. ACM, Vol. 34, No. 1, pp. 38-58.
Ellison 1996 Ellison, C. (1996). Establishing identity without certification authorities. In 6th USENIX Security Symposium, San Jose, July 22-25. http://www.clark.net/pub/cme/usenix.html
Ellison et al. 1999 Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. and Ylonen, T. (1999). SPKI Certificate Theory. Internet RFC 2693, September. http://www.ietf.org/rfc/rfc2693

F

Farley 1998 Farley, J. (1998). Java Distributed Computing. Cambridge, Mass: O'Reilly.
Farrow 2000 Farrow, R. (2000). Distributed denial of service attacks - how Amazon, Yahoo, eBay and others were brought down. Network Magazine, April. http://www.networkmagazine.com/ddos_special.htm
Ferrari and Verma 1990 Ferrari, D. and Verma, D. (1990). A scheme for real-time channel establishment in wide-area networks. IEEE Journal on Selected Areas in Communications, Vol. 8, No. 4.
Ferreira et al. 2000 Ferreira, P., Shapiro, M., Blondel, X., Fambon, O., Garcia, J., Kloostermann, S., Richer, N., Roberts, M., Sandakly, F., Coulouris, G., Dollimore, J., Guedes, P., Hagimont, D. and Krakowiak, S. (2000). PerDiS: Design, Implementation, and Use of a PERsistent DIstributed Store. In LNCS 1752: Advances in Distributed Systems. Springer-Verlag Berlin, Heidelberg, New York. pp 427-53. http://www.perdis.esprit.ec.org/papers/
Fidge 1991 Fidge, C. (1991). Logical Time in Distributed Computing Systems. IEEE Computer, Vol. 24, No. 8, pp. 28-33.
Fielding et al. 1999 Fielding, R., Gettys, J., Mogul, J. C., Frystyk, H., Masinter, L., Leach, P. and Berners-Lee T. (1999). Hypertext Transfer Protocol - HTTP/1.1. Internet RFC 2616. http://www.ietf.org/rfc/rfc2616
Fischer 1983 Fischer, M. (1983). The Consensus Problem in Unreliable Distributed Systems (a Brief Survey). In M. Karpinsky, ed., Foundations of Computation Theory, Vol. 158 of Lecture Notes in Computer Science, Springer-Verlag, pp. 127-140. Yale University Technical Report YALEU/DCS/TR-273.
Fischer and Lynch 1982 Fischer, M. and Lynch, N. (1982). A lower bound for the time to assure interactive consistency. Inf. Process. Letters, Vol. 14, No. 4, June, pp. 183-6.
Fischer and Michael 1982 Fischer, M.J. and Michael, A. (1982). Sacrificing Serializability to Attain High Availability of Data in an Unreliable Network. In Proceedings Symposium on Principles of Database Systems, ACM, pp. 70-5.
Fischer et al. 1985 Fischer, M., Lynch, N. and Paterson, M. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM, Vol. 32, No. 2, Apr., pp. 374-82.
Fitzgerald and Rashid 1986 Fitzgerald, R. and Rashid, R.F. (1986). The integration of virtual memory management and interprocess communication in Accent. ACM Transactions Computer Systems, Vol. 4, No. 2, pp. 147-77.
Flanagan 1997 Flanagan, D. (1997). Java in a Nutshell. Cambridge, England: O'Reilly.
Fleisch and Popek 1989 Fleisch, B. and Popek, G. (1989). Mirage: a coherent distributed shared memory design. In Proceedings 12th ACM Symposium on Operating System Principles, December, pp. 211-23.
Floyd 1986 Floyd, R. (1986). Short term file reference patterns in a UNIX environment. Technical Rep. TR 177, Rochester, NY: Dept. of Computer Science, University of Rochester.
Floyd and Johnson 1993 Floyd, S. and Jacobson, V. (1993). The Synchronization of Periodic Routing Messages. ACM Sigcomm '93 Symposium.
Floyd et al. 1997 Floyd, S., Jacobson, V., Liu, C., McCanne, S. and Zhang, L. (1997). A Reliable Multicast Framework for Lightweight Sessions and Application Level Framing. IEEE/ACM Transactions on Networking, Vol. 5, No. 6, pp. 784-803.
Ford and Fulkerson 1962 Ford, L.R. and Fulkerson, D.R. (1962). Flows in Networks. Princeton, NJ: Princeton University Press.
Fox et al. 1997 Fox, A., Gribble, S., Chawathe, Y., Brewer, E. and Gauthier, P. (1997). Cluster-based scalable network services. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 78-91.

G

Garay and Moses 1993 Garay, J., and Moses, Y. (1993). Fully polynomial Byzantine agreement in t +1 rounds. In Proceedings 25th ACM symposium on theory of computing, ACM Press, pp. 31-41, May.
Garcia-Molina 1982 Garcia-Molina, H. (1982). Elections in Distributed Computer Systems. IEEE Transactions on Computers, Vol. C-31, No. 1, pp. 48-59.
Garcia-Molina and Spauster 1991 Garcia-Molina, H. and Spauster, A. (1991). Ordered and Reliable Multicast Communication. ACM Transactions Computer Systems, Vol. 9, No. 3, pp. 242-71.
Garfinkel 1994 Garfinkel, S. (1994). PGP: Pretty Good Privacy, O'Reilly.
Gharachorloo et al. 1990 Gharachorloo, K., Lenoski, D., Laudon, J., Gibbons, P., Gupta, A. and Hennessy, J. (1990). Memory Consistency and Event Ordering in Scalable Shared-Memory Multiprocessors. In Proceedings 17th. Annual International Symposium on Computer Architecture, May, pp. 15-26.
Gibbs and Tsichritzis 1994 Gibbs, S.J. and Tsichritzis, D.C. (1994). Multimedia Programming. Addison-Wesley.
Gifford 1979 Gifford, D.K. (1979). Weighted voting for replicated data. In Proceedings 7th Symposium on Operating Systems Principles, ACM, pp. 150-62.
Glassman et al. 1995 Glassman, S., Manasse, M., Abadi, M., Gauthier, P. and Sobalvarro, P. (1995). The Millicent Protocol for Inexpensive Electronic Commerce. Fourth International WWW Conference, December. http://www.millicent.com/works/details/papers/millicent-w3c4/millicent.html
Gokhale and Schmidt 1996 Gokhale, A. and Schmidt, D. (1996). Measuring the Performance of Communication Middleware on High-Speed Networks. Proceedings of SIGCOMM '96, ACM, pp. 306-17.
Golding and Long 1993 Golding, R. and Long, D. (1993). Modeling replica divergence in a weak-consistency protocol for global-scale distributed databases. Technical report UCSC-CRL-93-09, Computer and Information Sciences Board, University of California, Santa Cruz.
Gong 1989 Gong, L. (1989). A Secure Identity-Based Capability System. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, Calif., May, pp.56-63. http://java.sun.com/people/gong/papers/pubs90.html
Goodman 1989 Goodman, J. (1989). Cache Consistency and Sequential Consistency. Technical Report 61, SCI Committee.
Gordon 1984 Gordon, J. (1984). The Story of Alice and Bob. http://www.conceptlabs.co.uk/alicebob.html
Govindan and Anderson 1991 Govindan, R. and Anderson, D.P. (1991). Scheduling and IPC Mechanisms for Continuous Media. ACM Operating Systems Review, Vol. 25, No. 5, pp. 68-80.
Gray 1978 Gray, J. (1978). Notes on database operating systems. In Operating Systems: an Advanced Course. Lecture Notes in Computer Science, Vol. 60, pp. 394-481, Springer-Verlag.
Guerraoui et al. 1998 Guerraoui, R., Felber, P., Garbinato, B. and Mazouni, K. (1998). System support for object groups. In Proceedings of the ACM Conference on Object Oriented Programming Systems, Languages and Applications (OOPSLA'98).
Gusella and Zatti 1989 Gusella, R. and Zatti, S. (1989). The accuracy of clock synchronization achieved by TEMPO in Berkeley UNIX 4.3BSD. IEEE Transactions Software Engineering, Vol. 15, pp. 847-53.
Guttman 1999 Guttman, E. (1999). Service Loocation Protocol: Automatic Discovery of IP Network Services. IEEE Internet Computing, Vol. 3, No. 4, pp. 71-80.

H

Hadzilacos and Toueg 1994 Hadzilacos, V. and Toueg, S. (1994). A Modular Approach to Fault-tolerant Broadcasts and Related Problems, Technical report, Dept. of Computer Science, University of Toronto.
Härder 1984 Härder, T. (1984). Observations on Optimistic Concurrency Control Schemes. Information Systems, Vol. 9, No. 2, pp. 111-20.
Härder and Reuter 1983 Härder, T. and Reuter, A. (1983). Principles of Transaction-Oriented Database Recovery. Computing Surveys, Vol. 15, No. 4.
Härtig et al. 1997 Härtig, H., Hohmuth, M., Liedtke, J., Schönberg, S., and Wolter, J. (1997). The performance of kernel-based systems. In Proceedings 16th ACM Symposium on Operating System Principles, pp. 66-77.
Hartman and Ousterhout 1995 Hartman, J. and Ousterhout, J. (1995). The Zebra Striped Network File System. ACM Trans. on Computer Systems, Vol. 13, No. 3, August, pp. 274-310.
Hayton et al. 1998 Hayton R., Bacon J. and Moody K. (1998). OASIS: Access Control in an Open, Distributed Environment, In Proceedings IEEE Symposium on Security and Privacy, Oakland, Calif., pp3-14, May. http://www.cl.cam.ac.uk/Research/SRG/opera/publications/index.html
Hedrick 1988 Hedrick, R. (1988). Routing Information Protocol, Internet RFC 1058. http://www.ietf.org/rfc/rfc1058
Henning 1998 Henning, M. (1998). Binding, Migration and Scalability in CORBA, Comms. ACM, October, Vol. 41, No. 10. pp. 62-71.
Henning and Vinoski 1999 Henning, M. and Vinoski, S. (1999). Advanced CORBA Programming with C++. Reading, Mass.: Addison-Wesley.
Herlihy 1986 Herlihy, M. (1986). A Quorum-Consensus Replication Method for Abstract Data Types. ACM Transactions Computer Systems, Vol. 4, No. 1, pp. 32-53.
Herlihy and Wing 1990 Herlihy, M. and Wing, J. (1990). On Linearizability: a correctness condition for concurrent objects. ACM Transactions on programming languages and systems, Vol. 12, No. 3, (July), pp. 463-92.
Herrtwich 1995 Herrtwich, R.G. (1995). Achieving Quality of Service for Multimedia Applications. ERSADS '95, European Research Seminar on Advanced Distributed Systems, l'Alpe d'Huez, France, April.
Hirsch 1997 Hirsch, F.J. (1997). Introducing SSL and Certificates using SSLeay. World Wide Web Journal, Vol. 2, No. 3, Summer. http://www.certco.com/b2b/ssl_change.htm
Howard et al. 1988 Howard, J.H., Kazar, M.L., Menees, S.G, Nichols, D.A., Satyanarayanan, M., Sidebotham, R.N. and West, M.J. (1988). Scale and Performance in a Distributed File System. ACM Transactions Computer Systems, Vol. 6, No. 1, pp. 51-81.
Huang et al. 2000 Huang, A., Ling, B., Barton, J. and Fox, A. (2000). Running the Web backwards: appliance data services. Proceedings 9th international World Wide Web conference. http://www9.org/.
Huitema 1995 Huitema, C. (1995). Routing in the Internet. Englewood Cliffs, NJ: Prentice-Hall.
Huitema 1998 Huitema, C. (1998). IPv6 - the New Internet Protocol. Upper Saddle River, NJ: Prentice-Hall.
Hunter and Crawford 1998 Hunter, J. and Crawford, W. (1998). Java Servlet Programming, O'Reilly.
Hutchinson and Peterson 1991 Hutchinson, N. and Peterson, L. (1991). The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering, Vol. 17, No. 1, pp. 64-76.
Hutto and Ahamad 1990 Hutto, P. and Ahamad, M. (1990). Slow memory: weakening consistency to enhance concurrency in distributed shared memories. In Proceedings 10th International Conference on Distributed Computer Systems, IEEE, pp. 302-11.
Hyman et al. 1991 Hyman, J., Lazar, A.A. and Pacifici, G. (1991). MARS - The MAGNET-II Real-Time Scheduling Algorithm. ACM SlGCOM ' 91, Zurich.

I

IEEE 1985a Institute of Electrical and Electronic Engineers (1985). Local Area Network - CSMA/CD Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.3, IEEE Computer Society.
IEEE 1985b Institute of Electrical and Electronic Engineers (1985). Local Area Network - Token Bus Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.4, IEEE Computer Society.
IEEE 1985c Institute of Electrical and Electronic Engineers (1985). Local Area Network - Token Ring Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.5, IEEE Computer Society.
IEEE 1990 Institute of Electrical and Electronic Engineers (1990). IEEE Standard 802: Overview and Architecture. American National Standard ANSI/IEEE 802, IEEE Computer Society.
IEEE 1994 Institute of Electrical and Electronic Engineers (1994). Local and metropolitan area networks - Part 6: Distributed Queue Dual Bus (DQDB) access method and physical layer specifications. American National Standard ANSI/IEEE 802.6, IEEE Computer Society.
IEEE 1999 Institute of Electrical and Electronic Engineers (1999). Local and metropolitan area networks - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, American National Standard ANSI/IEEE 802.11, IEEE Computer Society.
Iftode et al. 1996 Iftode, L., Singh J. and Li, K. (1996). Scope consistency: a bridge between release consistency and entry consistency.In Proceedings 8th annual ACM symposium on Parallel algorithms and architectures. pp. 277-87.
info.isoc.org Zakon, R.H. Hobbes' Internet Timeline v5.0, http://info.isoc.org/guest/zakon/Internet/History/HIT.html
international pgp The International PGP Home Page, http://www.ifi.uio.no/pgp/
ISO 1992 International Standards Organization (1992). Basic Reference Model of Open Distributed Processing, Part 1: Overview and guide to use. ISO/IEC JTC1/SC212/WG7 CD 10746-1, International Standards Organization, 1992.
ITU/ISO 1997 ITU/ISO (1997). Recommendation X.500 (08/97): Open Systems Interconnection - The Directory: Overview of concepts, models and services. International Telecommunication Union. http://www.itu.int/itudoc/itu-t/rec/x/x500up/index.html

J

java.sun.com I Sun Microsystems. Java Remote Method Invocation. http://java.sun.com/products/jdk/1.3/docs/guide/rmi/spec/rmiTOC.html
java.sun.com II Sun Microsystems. Java Object Serialization Specification. http://java.sun.com/products/jdk/1.2/docs/guide/serialization/spec/serial-title.doc.html
java.sun.com III Sun Microsystems. Servlet Tutorial. http://jserv.java.sun.com/products/java-server/documentation/webserver1.1/servlets/servlet_tutorial.html
java.sun.com IV Jordan, M. and Atkinson, M. (1999). Orthogonal Persistence for the Java Platform - Draft Specification. Sun Microsystems Laboratories. Palo Alto, Ca. http://www.sun.com/research/forest/COM.Sun.Labs.Forest.doc.external_www.papers.html
java.sun.com V Sun Microsystems, Java Security API. http://java.sun.com/security/
java.sun.com VI Sun Microsystems Inc. (1999). JavaSpaces technology. http://java.sun.com/products/javaspaces/
Johnson and Zwaenepoel 1993 Johnson, D. and Zwaenepoel, W. (1993). The Peregrine High-performance RPC System. S oftware-Practice and Experience, Vol. 23, No. 2, pp. 201-21.
Jordan 1996 Jordan, M. (1996). Early Experiences with Persistent Java. In Proceedings first international workshop on persistrence and Java. Glasgow, Scotland. http://www.sun.com/research/forest/COM.Sun.Labs.Forest.doc.external_www.papers.html
Joseph et al. 1997 Joseph, A., Tauber, J. and Kaashoek, M. (1997). Mobile Computing with the Rover Toolkit. IEEE Transactions on Computers: Special issue on Mobile Computing, Vol. 46, No. 3, pp. 337-52.
Jul et al. 1988 Jul, E., Levy, H., Hutchinson, N. and Black, A. (1988). Fine-grained Mobility in the Emerald System. ACM Transactions Computer Systems, Vol. 6, No. 1, pp. 109-33.

K

Kaashoek and Tanenbaum 1991 Kaashoek, F. and Tanenbaum, A. (1991). Group Communication in the Amoeba Distributed Operating System. In Proceedings 11th International Conference on Distributed Computer Systems, pp. 222-30.
Kaashoek et al. 1989 Kaashoek, F., Tanenbaum, A., Flynn Hummel, S. and Bal, H. (1989). An Efficient Reliable Broadcast Protocol. Operating Systems Review, Vol. 23, No. 4, pp. 5-20.
Kaashoek et al. 1997 Kaashoek, M., Engler, D., Ganzer, G., Briceño, H., Hunt, R., Mazières, D., Pinckney, T., Grimm, R., Jannotti, J. and Mackenzie, K. (1997). Application performance and flexibility on exokernel systems. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 52-65.
Kahn 1967 Kahn, D. (1967). The Codebreakers: The Story of Secret Writing. New York: Macmillan.
Kahn 1983 Kahn, D. (1983). Kahn on Codes. New York: Macmillan.
Kahn 1991 Kahn, D, (1991). Seizing the Enigma. Boston: Houghton Mifflin.
Kehne et al. 1992 Kehne, A., Schonwalder, J. and Langendorfer, H. (1992). A Nonce-based Protocol for Multiple Authentications. ACM Operating Systems Review, Vol. 26, No. 4, pp. 84-9.
Keith and Wittle 1993 Keith, B.E. and Wittle, M. (1993). LADDIS: The Next Generation in NFS File Server Benchmarking, Summer USENIX Conference Proceedings. USENIX Association, Berkeley, CA, June.
Keleher et al. 1992 Keleher, P., Cox, A. and Zwaenepoel, W. (1992). Lazy consistency for software distributed shared memory. In Proceedings 19th Annual International Symposium on Computer Architecture. pp. 13-21, May 1992.
Kessler and Livny 1989 Kessler, R.E. and Livny, M. (1989). An Analysis of Distributed Shared Memory Algorithms, In Proceedings 9th International Conference Distributed Computing Systems. IEEE, pp. 98-104.
Kille 1992 Kille, S. (1992). Implementing X.400 and X.500: The PP and QUIPU Systems. Artech House.
Kindberg 1995 Kindberg, T. (1995). A Sequencing Service for Group Communication (abstract), In Proceedings 14th annual ACM Symposium on Principles of Distributed Computing, p. 260. Technical Report No. 698, Queen Mary and Westfield College Dept. of CS, 1995. ftp://ftp.dcs.qmw.ac.uk/pub/distrib/publications/TR698-Sequencing-Service.ps.gz
Kindberg et al. 1996 Kindberg, T., Coulouris, G., Dollimore, J. and Heikkinen, J. (1996). Sharing objects over the Internet: the Mushroom approach. In Proceedings IEEE Global Internet 1996, London, Nov., pp. 67-71.
Kistler and Satyanarayanan 1992 Kistler, J.J. and Satyanarayanan, M. (1992). Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, Vol. 10, No. 1, pp. 3-25.
Kleinrock 1961 Kleinrock, L. (1961). Information Flow in Large Communication Networks, MIT, RLE Quarterly Progress Report, July.
Kleinrock 1997 Kleinrock, L. (1997). Nomadicity: anytime, anywhere in a disconnected world. Mobile Networks and Applications, Vol. 1, No. 4, pp. 351-7.
Kohl and Neuman 1993 Kohl, J. and Neuman, C. (1993). The Kerberos Network Authentication Service (V5), Internet RFC 1510, September. http://www.ietf.org/rfc/rfc1510
Konstantas et al. 1997 Konstantas, D., Orlarey, Y., Gibbs, S. and Carbonel, O. (1997). Distributed Music Rehearsal. In Proceedings International Computer Music Conference 97. http://cuiwww.unige.ch/OSG/publications/TR97/TR97Contents.html
Kopetz and Verissimo 1993 Kopetz, H. and Verissimo, P. (1993). Real Time and Dependability Concepts. in Mullender ed, Distributed Systems, second edition, Addison-Wesley.
Kopetz et al. 1989 Kopetz, H. Damm, A., Koza, C., Mulazzani, M., Schwabl, W. Senft, C and Zainlinger, R. (1989). Distributed Fault-Tolerant Real-Time Systems - The MARS Approach. IEEE Micro, Vol. 9, No. 1.
Kshemkalyani and Singhal 1991 Kshemkalyani, A. and Singhal, M. (1991). Invariant-Based Verification of a Distributed Deadlock Detection Algorithm. IEEE Transactions on Software Engineering, Vol. 17, No. 8. August.
Kshemkalyani and Singhal 1994 Kshemkalyani, A. and Singhal, M. (1994). On Characterisation and Corrrectness of Distributed Deadlock detection, Journal of Parallel and Distributed Computing, Vol. 22, pp. 44-59.
Kung and Robinson 1981 Kung, H.T. and Robinson, J.T. (1981). Optimistic methods for concurrency control. ACM Transactions on Database Systems, Vol. 6, No. 2, pp. 213-26.
Kurose and Ross 2000 Kurose, J.F. and Ross, K.W. (2000). Computer Networking: A Top-Down Approach Featuring the Internet, Addison Wesley Longman. http://gaia.cs.umass.edu/kurose/Contents.htm

L

Ladin et al. 1992 Ladin, R., Liskov, B., Shrira, L. and Ghemawat, S. (1992). Providing Availability Using Lazy Replication. ACM Transactions on Computer Systems, Vol. 10, No. 4, pp. 360-91.
Lai 1992 Lai, X. (1992). On the Design and Security of Block Ciphers, ETH Series in Information Processing, Vol. 1, Konstanz: Hartung-Gorre Verlag.
Lai and Massey 1990 Lai, X. and Massey, J. (1990). A proposal for a new Block Encryption Standard. Advances in Cryptology-Eurocrypt '90 In Proceedings, Springer-Verlag, pp. 389-404.
Lamport 1978 Lamport, L. (1978). Time, clocks and the ordering of events in a distributed system. Comms. ACM, Vol. 21, No. 7, pp. 558-65.
Lamport 1979 Lamport, L. (1979). How to Make a Multiprocessor Computer that Correctly Executes Multiprocess Programs. IEEE Transactions Computers, Vol. C-28, No. 9, pp. 690-1.
Lamport 1986 Lamport, L. (1986). On interprocess communication, parts I and II. Distributed Computing, Vol. 1, No. 2, pp. 77-101.
Lamport et al. 1982 Lamport, L., Shostak, R. and Pease, M. (1982). Byzantine Generals Problem. ACM Transactions Programming Languages and Systems, Vol. 4, No. 3, pp. 382-401.
Lampson 1971 Lampson, B. (1971). Protection. In Proceedings 5th Princeton Conference on Information Sciences and Systems, Princeton, p. 437. Reprinted in ACM Operating Systems Review. Vol. 8, No. 1, January, p. 18. http://www.research.microsoft.com/lampson/Publications.html
Lampson 1981a Lampson, B.W. (1981). Atomic Transactions. In Distributed systems: Architecture and Implementation. Lecture Notes in Computer Science 105, pp. 254-9. Berlin: Springer-Verlag.
Lampson 1986 Lampson, B.W. (1986). Designing a Global Name Service.In Proceedings 5th ACM Symposium Principles of Distributed Computing, pp. 1-10, August.
Lampson et al. 1992 Lampson, B.W., Abadi, M., Burrows, M. and Wobber, E. (1992). Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems, Vol. 10, No. 4, pp. 265-310.
Lea et al. 1993 Lea, R., Jacquemot, C. and Pillevesse, E. (1993). COOL: system support for distributed programming. Comms. ACM, Vol. 36, No. 9, pp. 37-46.
Leach et al. 1983 Leach, P.J., Levine, P.H., Douros, B.P., Hamilton, J.A., Nelson, D.L. and Stumpf, B.L. (1983). The architecture of an integrated local network. IEEE J. Selected Areas in Communications, Vol. SAC-1, No. 5, pp. 842-56.
Lee and Thekkath 1996 Lee, E.K. and Thekkath, C.A. (1996). Petal: Distributed Virtual Disks, In Proc. 7th Intl. Conf. on Architectural Support for Prog. Langs. and Operating Systems, October, pp. 84-96. ftp://ftp.digital.com/pub/DEC/SRC/publications/eklee/petal-paper.pdf
Lee et al. 1996 Lee C., Rajkumar, R. and Mercer C. (1996). Experiences with Processor Reservation and Dynamic QOS in Real-Time Mach. In Proceedings Multimedia Japan '96.
Leffler et al. 1989 Leffler, S., McKusick, M., Karels, M. and Quartermain J. (1989). The Design and Implementation of the 4.3 BSD UNIX Operating System. Reading, Mass: Addison-Wesley.
Leiner 1997 Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G. and Wolff, S. (1997). A Brief History of the Internet, Comms. ACM, Vol. 40, No. 1, Feb., pp. 102-108. http://www.isoc.org/internet/history/brief.html
Leland et al. 1993 Leland, W. E., Taqqu, M.S., Willinger, W. and Wilson, D.V. (1993). On the Self-Similar Nature of Ethernet Traffic. ACM SIGCOMM ' 93, San Francisco.
Lenoski et al. 1992 Lenoski, D., Laudon, J., Gharachorloo, K., Weber, W.D., Gupta, A., Hennessy, J., Horowitz, M. and Lam, M.S. (1992). The Stanford Dash multiprocessor. IEEE Computer, Vol. 25, No. 3, pp. 63-79.
Leslie et al. 1996 Leslie, I., McAuley, D., Black, R., Roscoe, T., Barham, P., Evers, D., Fairbairns, R. and Hyden, E. (1996). The design and implementation of an operating system to support distributed multimedia applications, ACM Journal of Selected Areas in Communication, Vol. 14, No. 7, pp. 1280-97.
Li and Hudak 1989 Li, K. and Hudak, P. (1989). Memory Coherence in Shared Virtual Memory Systems. ACM Transactions on Computer Systems, Vol. 7, No. 4, pp. 321-59.
Liedtke 1996 Liedtke, J. (1996). Towards real microkernels, Comms. ACM, Vol. 39, No. 9, pp. 70-7.
Linux AFS The Linux AFS FAQ. http://www.umlug.umd.edu/linuxafs
Lipton and Sandberg 1988 Lipton, R. and Sandberg, J. (1988). PRAM: A scalable shared memory. Technical Report CS-TR-180-88, Princeton University.
Liskov 1988 Liskov, B. (1988). Distributed programming in Argus. Comms. ACM, Vol, 31, No. 3, pp. 300-12.
Liskov 1993 Liskov, B. (1993). Practical uses of synchronized clocks in distributed systems, Distributed Computing,Vol. 6, No. 4, pp. 211-19.
Liskov and Scheifler 1982 Liskov, B. and Scheifler, R.W. (1982). Guardians and actions: linguistic support for robust, distributed programs. ACM Transactions Programming Languages and Systems, Vol. 5, No. 3, pp. 381-404.
Liskov and Shrira 1988 Liskov, B. and Shrira, L. (1988). Promises: Linguistic Support for Efficient Asynchronous Procedure Calls in Distributed Systems. In Proceedings SIGPLAN '88 Conference Programming Language Design and Implementation. Atlanta.
Liskov et al. 1991 Liskov, B., Ghemawat, S., Gruber, R., Johnson, P., Shrira, L., Williams, M. (1991). Replication in the Harp File System. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 226-38.
Liu and Albitz 1998 Liu, C. and Albitz, P. (1998). DNS and BIND, third edition. O'Reilly.
Liu and Layland 1973 Liu, C.L. and Layland, J.W. (1973). Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM, Vol. 20, No. 1.
Loepere 1991 Loepere, K. (1991). Mach 3 Kernel Principles. Open Software Foundation and Carnegie-Mellon University.
Lundelius and Lynch 1984 Lundelius, J. and Lynch, N. (1984). An Upper and Lower Bound for Clock Synchronization. Information and Control 62, 2/3 (Aug./Sep.), pp. 190-204.
Lynch 1996 Lynch, N. (1996). Distributed Algorithms, Morgan Kaufmann.

M

Ma 1992 Ma, C. (1992). Designing a Universal Name Service. Technical Report 270, University of Cambridge.
Macklem 1994 Macklem, R. (1994). Not Quite NFS: Soft Cache Consistency for NFS. Proceedings of the Winter '94 USENIX Conference, San Francisco, Ca., January, pp. 261-278. http://docs.freebsd.org/44doc/papers/nqnfs.html
Maekawa 1985 Maekawa, M. (1985). A Algorithm for Mutual Exclusion in Decentralized Systems. ACM Transactions on Computer System s, Vol. 3, No. 2, pp. 145-159.
Maffeis 1995 Maffeis, S. (1995). Adding group communication and fault tolerance to CORBA. In Proceedings of the 1995 USENIX conference on object-oriented technologies.
Malkin 1993 Malkin, G. (1993). RIP Version 2 - Carrying Additional Information, Internet RFC 1388. http://www.ietf.org/rfc/rfc1388
Marsh et al. 1991 Marsh, B., Scott, M., LeBlanc, T. and Markatos, E. (1991). First-class User-level Threads. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 110-21.
Marzullo and Neiger 1991 Marzullo, K., and Neiger, G. (1991). Detection of global state predicates, In Proceedings 5th International Workshop on Distributed Algorithms, Toug, S., Spirakis, P. and Kirousis, L., eds, Springer-Verlag, pp. 254-72.
Mattern 1989 Mattern, F. (1989). Virtual Time and Global States in Distributed Systems, In Proceedings Workshop on Parallel and Distributed Algorithm s. Cosnard, M. et al. (eds), Amsterdam: North-Holland, pp. 215-26.
mbone MBone Software Archives. ftp://ftp.sunet.se/pub/network/merit-research/mbone/output.html
McGraw and Felden 1999 McGraw, G. and Felden, E. (1999). Securing Java. John Wiley & Sons. http://www.securingjava.com/
Melliar-Smith et al. 1990 Melliar-Smith, P., Moser, L. and Agrawala, V. (1990). Broadcast Protocols for Distributed Systems. IEEE Transactions on Parallel and Distributed Systems, Vol. 1, No. 1, pp. 17-25.
Menezes 1993 Menezes, A. (1993). Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers. http://www.cacr.math.uwaterloo.ca/hac/
Menezes et al. 1997 Menezes, A., van Oorschot, O. and Vanstone, S. (1997). Handbook of Applied Cryptography. CRC Press. http://www.cacr.math.uwaterloo.ca/hac/
Metcalfe and Boggs 1976 Metcalfe, R.M. and Boggs, D.R. (1976). Ethernet: distributed packet switching for local computer networks. Comms. ACM, Vol. 19, pp. 395-403.
mice.ed.ac.uk Handley, M.. The sdr Session Directory. http://mice.ed.ac.uk/mice/archive/sdr.html
Mills 1995 Mills, D. (1995). Improved Algorithms for Synchronizing Computer Network Clocks, IEEE Transactions Networks, June, pp. 245-54.
Milojicic et al. 1999 Milojicic, J., Douglis, F. and Wheeler, R. (1999). Mobility, Processes, Computers and Agents, Reading: Addison-Wesley.
Minnich and Farber 1989 Minnich, R. and Farber, D. (1989). The Mether System: a Distributed Shared Memory for SunOS 4.0. In Proceedings Summer 1989 Usenix Conference.
Mitchell and Dion 1982 Mitchell, J.G. and Dion, J. (1982). A comparison of two network-based file servers. Comms. ACM, Vol. 25, No. 4, pp. 233-45.
Mitchell et al. 1992 Mitchell, C.J., Piper, F. and Wild, P. (1992). Digital Signatures. In Contemporary Cryptology. Simmons, G.J. ed., New York: IEEE Press.
Mogul 1994 Mogul, J.D. (1994). Recovery in Spritely NFS, Computing Systems, Vol.7, No. 2.
Mok 1985 Mok, A.K. (1985). SARTOR - A Design Environment for Real-Time Systems. Ninth IEEE COMP-SAC.
Morin 1997 Morin, R. (ed.) (1997). MkLinux: Microkernel Linux for the Power Macintosh. Prime Time Freeware.
Morris et al. 1986 Morris, J., Satyanarayanan, M., Conner, M.H., Howard, J.H., Rosenthal, D.S. and Smith, F.D. (1986). Andrew: a distributed personal computing environment. Comms. ACM, Vol. 29, No. 3, pp. 184-201.
Mosberger 1993 Mosberger, D. (1993). Memory Consistency Models. Technical Report 93/1 1, University of Arizona.
Moser et al. 1994 Moser, L., Amir, Y., Melliar-Smith, P. and Agarwal, D. (1994). Extended Virtual Synchrony. In Proceedings 14th International Conference on Distributed Computing Systems, IEEE Computer Society Press, pp. 56-65.
Moser et al. 1996 Moser, L., Melliar-Smith, P., Agarwal, D., Budhia, R., and Lingley-Papadopoulos, C. (1996). Totem: a Fault-Tolerant Multicast Group Communication System. Comms. ACM, Vol. 39, No. 4, pp. 54-63.
Moser et al. 1998 Moser, L., Melliar-Smith, P. and Narasimhan, P. (1998). Consistent object replication in the Eternal system. Theory and practice of object systems, Vol. 4, No. 2.
Moss 1985 Moss, E. (1985). Nested Transactions, An Approach to Reliable Distributed Computing. MIT Press.
multimedia index Gibbs, S. and Szentivanyi, S., Index to Multimedia Information Sources. http://dutiem.twi.tudelft.nl/projects/MultimediaInfo/
Myers and Liskov 1997 Myers, A.C. and Liskov, B. (1997). A Decentralized Model for Information Flow Control, ACM Operating Systems Review, Vol. 31, No. 5, pp. 129-42, December.

N

Nagle 1984 Nagle, J. (1984). Congestion Control in TCP/IP Internetworks, Computer Communications Review, Vol. 14, pp. 11-17, October.
Nagle 1987 Nagle, J. (1987). On Packet Switches with Infinite Storage. IEEE Transactions on Communications, Vol. 35, No. 4.
National Bureau of Standards 1977 National Bureau of Standards (1977). Data Encryption Standard (DES). Federal Information Processing Standards No. 46, Washington DC: US National Bureau of Standards.
Needham 1993 Needham, R. (1993). Names. In Distributed Systems, an Advanced Course. (Mullender, S., ed.), second Edition. Wokingham, England: ACM Press/Addison-Wesley. pp. 315-26.
Needham and Schroeder 1978 Needham, R.M. and Schroeder, M.D. (1978). Using encryption for authentication in large networks of computers. Comms. ACM, Vol. 21, pp. 993-9.
Nelson et al. 1988 Nelson, M.N., Welch, B.B. and Ousterhout, J.K. (1988). Caching in the Sprite Network File System, ACM Transactions on Computer Systems, Vol. 6, No. 1, pp. 134-154.
Netscape 1996 Netscape Corporation (1996). SSL 3.0 Specification. http://home.netscape.com/eng/ssl3/index.html
Neuman et al. 1999 Neuman, B.C., Tung, B. and Wray, J. (1999). Public Key Cryptography for Initial Authentication in Kerberos, Internet Draft ietf-cat-kerberos-pk-init-09, July. http://web.mit.edu/kerberos/www/papers.html
Neumann and Ts'o 1994 Neuman, B.C. and Ts'o, T. (1994). An Authentication Service for Computer Networks, IEEE Communications, vol. 32, no. 9, pp. 33-38. Sept. http://nii.isi.edu/publications/kerberos-neuman-tso.html
Nielson et al. 1997 Nielsen, H., Gettys, J., Baird-Smith, A., Prud'hommeaux, E., Lie, H. and Lilley, C. (1997). Network Performance Effects of HTTP/1.1, CSS1, and PNG. Proceedings SIGCOMM '97.
NIST 1995 National Institute for Standards and Technology (1995). Secure Hash Standard. NIST FIPS PUP 180-1, US Department of Commerce. http://www.itl.nist.gov/fipspubs/fip180-1.htm
NIST 1999 National Institute for Standards and Technology (1999). AES - a Crypto Algorithm for the Twenty-first Century, US Department of Commerce. http://www.nist.gov/aes
now.cs.berkeley.edu The Berkeley NOW project home page. http://now.cs.berkeley.edu

O

Oaks and Wong 1999 Oaks, S. and Wong, H. (1999). Jave Threads (second edition), O'Reilly.
OMG 1997a Object Management Group. (1997). Concurrency Control Service Specification, Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/97-12-14.pdf
OMG 1997b Object Management Group (1997). Naming Service Specification. Framingham, Mass: OMG. ftp://www.omg.org/pub/docs/formal/97-12-10.pdf
OMG 1997c Object Management Group (1997). Event Service Specification. Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/97-12-11.pdf
OMG 1997d Object Management Group (1997). The CORBA IDL Specification. Framingham, Mass: OMG. http://www.omg.org/corba/cichpter.html
OMG 1997e Object Management Group, (1997). Object Transaction Service Specification. Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/97-12-17.pdf
OMG 1998a Object Management Group (1998). CORBA/IIOP 2.3.1 Specification. Framingham, Mass: OMG. http://www.omg.org/pub/docs/formal/99-10-07.pdf
OMG 1998b Object Management Group (1998). CORBA Security Service Specification. Framingham, Mass: OMG. http://www.omg.org/docs/ptc/98-01-02.pdf
OMG 1998c Object Management Group (1998). Notification service Specification. Framingham, Mass: OMG. Technical report telecom/98-06-15. f tp://www.omg.org/pub/docs/telecom/98-06-15.pdf
OMG 1998d Object Management Group (1998). CORBA Messaging. Framingham, Mass:OMG. http://www.omg.org/docs/ptc/98-05-06.pdf
OMG 1998e Object Management Group(1998). Objects by Value. Framingham, Mass: OMG. http://www.omg.org/docs/ptc/98-01-18.pdf
Omidyar and Aldridge 1993 Omidyar, C.G. and Aldridge, A. (1993). Introduction to SDH/SONET. IEEE Communications Magazine, Vol. 31, pp. 30-3, Sept.
Oppen and Dalal 1983 Oppen, D. C. and Dalal Y.K. (1983). The Clearinghouse: a decentralized agent for locating named objects in a distributed environment. ACM Trans. on Office Systems, Vol. 1, pp. 230-53.
Orfali et al. 1996 Orfali, R., Harkey, D. and Edwards, J. (1996). The Essential Distributed Objects Survival Guide. New York: Wiley.
Organick 1972 Organick, E.I. (1972). The MULTICS System: An Examination of its Structure. Cambridge, Mass: MIT Press.
Orman et al. 1993 Orman, H., Menze, E., O'Malley, S. and Peterson, L. (1993). A fast and general implementation of Mach IPC in a Network. In Proceedings Third USENIX Mach Conference, April.
OSF 1997 Introduction to OSF DCE. The Open Group.http://www.opengroup.org
Ousterhout et al. 1985 Ousterhout, J., Da Costa, H., Harrison, D., Kunze, J., Kupfer, M. and Thompson, J. (1985). A Trace-driven analysis of the UNIX 4.2 BSD file system. In 10th ACM Symposium Operating System Principles.
Ousterhout et al. 1988 Ousterhout, J., Cherenson, A., Douglis, F., Nelson, M. and Welch, B. (1988). The Sprite Network Operating System. IEEE Computer, Vol. 21, No. 2, pp. 23-36.

P

Parker 1992 Parker, B. (1992). The PPP AppleTalk Control Protocol (ATCP). Internet RFC 1378. http://www.ietf.org/rfc/rfc1378
Parringtom et al. 1995 G. D. Parrington, S. K. Shrivastava, Wheater, S.M. and Little, M. C. (1995). The Design and Implementation of Arjuna, USENIX Computing Systems Journal, Vol 8, No 3.
Partridge 1992 Partridge, C. (1992). A Proposed Flow Specificatio n. Internet RFC 1363. http://www.ietf.org/rfc/rfc1363
Patterson et al. 1988 Patterson, D., Gibson, G and Katz, R. (1988). A Case for Redundant Arrays of Interactive Disks, ACM International Conf. on Management of Data (SIGMOD), pp. 109-116, May.
Pease et al. 1980 Pease, M., Shostak, R. and Lamport, L.(1980). Reaching agreement in the presence of faults. Journal of the ACM, Vol. 27, No. 2, April, pp. 228-34.
Pedone and Schiper 1999 Pedone, F. and Schiper, A. (1999). Generic Broadcast. In Proceedings of the 13th International Symposium on Distributed Computing (DISC '99), September. http://lsewww.epfl.ch/Documents/acrobat/PS99c.pdf
Petersen et al. 1997 Petersen, K., Spreitzer, M., Terry, D., Theimer, M. and Demers, A. (1997). Flexible update propagation for weakly consistent replication. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 288-301.
Peterson 1988 Peterson, L. (1988). The Profile Naming Service. ACM Transactions Computer Systems, Vol. 6, No. 4, pp. 341-64.
Peterson et al. 1989 Peterson, L.L., Buchholz, N.C. and Schlichting, R.D. (1989). Preserving and Using Context Information in Interprocess Commun ication. ACM Transactions on Computer Systems, Vol. 7, No. 3, pp. 217-46.
Pike et al. 1993 Pike, R., Presotto, D., Thompson, K., Trickey, H. and Winterbottom, P. (1993). The Use of Name Spaces in Plan 9. Operating Systems Review, Vol. 27, No. 2, April 1993, pp. 72-76. http://plan9.bell-labs.com/sys/doc/names.pdf
Popek and Walker 1985 Popek, G. and Walker, B. (eds.). (1985). The LOCUS Distributed System Architecture. Cambridge Mass: MIT Press.
Postel 1981a Postel, J. (1981). Internet Protocol. Internet RFC 791. http://www.ietf.org/rfc/rfc791
Postel 1981b Postel, J. (1981). Transmission Control Protocol. Internet RFC 793. http://www.ietf.org/rfc/rfc793
Powell 1991 Powell, D. (ed.) (1991). Delta-4: a Generic Architecture for Dependable Distributed Computing. Berlin and New York: Springer-Verlag.
Preneel et al. 1998 Preneel, B., Rijmen, V. and Bosselaers, A. (1998). Recent developments in the design of conventional cryptographic algorithms, In Computer Security and Industrial Cryptography, State of the Art and Evolution, Lecture Notes in Computer Science, No. 1528, Springer-Verlag, pp. 106-131. http://www.esat.kuleuven.ac.be/~cosicart/pdf/AB-9800.pdf
privacy.nb.ca International Cryptography Freedom. http://privacy.nb.ca/cryptography/crypto-free.htm

R

Radia et al. 1993 Radia, S., Nelson, M. and Powell, M. (1993). The Spring Naming Service. Technical Report 93-16, Sun Microsystems Laboratories, Inc.
Rashid 1985 Rashid, R.F. (1985). Network operating systems. In Local Area Networks: An Advanced Course, Lecture Notes in Computer Science, 184, Springer-Verlag, pp. 314-40.
Rashid 1986 Rashid, R.F. (1986). From RIG to Accent to Mach: the evolution of a network operating system. In Proceedings of the ACM/IEEE Computer Society Fall Joint Conference, ACM, November.
Rashid and Robertson 1981 Rashid, R. and Robertson, G. (1981). Accent: a communications oriented network operating system kernel. ACM Operating Systems Review, Vol. 15, No. 5, pp. 64-75.
Rashid et al. 1988 Rashid, R., Tevanian Jr, A., Young, M., Golub, D., Baron, R., Black, D., Bolosky, W.J. and Chew, J. (1988). Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures. IEEE Transactions Computers, Vol. 37, No. 8, pp. 896-907.
Raynal 1988 Raynal, M. (1988). Distributed Algorithms and Protocols. Wiley.
Raynal 1992 Raynal, M. (1992). About Logical Clocks for Distributed Systems. ACM Operating Systems Review, Vol. 26, No. 1, pp. 41-8.
Raynal and Singhal 1996 Raynal, M. and Singhal, M. (1996). Capturing Causality in Distributed Systems. IEEE Computer, February, pp. 49-56.
Redmond 1997 Redmond, F.E. (1997). DCOM: Microsoft Distributed Component Model. IDG Books Worldwide.
Reed 1983 Reed, D.P. (1983). Implementing atomic actions on decentralized data. ACM Transactions on Computer Systems, Vol. 1, No. 1, pp. 3-23.
Ricart and Agrawala 1981 Ricart, G. and Agrawala, A.K. (1981). An optimal algorithm for mutual exclusion in computer networks. Comms. ACM, Vol. 24, No. 1, pp. 9-17.
Richardson et al. 1998 Richardson, T., Stafford-Fraser,Q., Wood, K.R. and Hopper, A. (1998). Virtual Network Computing, IEEE Internet Computing. Vol. 2, No.1, Jan/Feb, pp. 33-8. http://www.uk.research.att.com/vnc/docs.html
Ritchie 1984 Ritchie, D. (1984). A Stream Input Output System. AT&T Bell Laboratories Technical Journal, Vol. 63, No. 8, pt. 2, pp. 1897-910.
Rivest 1992 Rivest, R. (1992). The MD5 Message-Digest Algorithm. Internet RFC 1321. http://www.ietf.org/rfc/rfc1321
Rivest et al. 1978 Rivest, R.L., Shamir, A. and Adelman, L. (1978). A method of obtaining digital signatures and public key cryptosystems. Comms. ACM, Vol. 21, No. 2, pp. 120-6.
Rodrigues et al. 1998 Rodrigues, L., Guerraoui, R., and Schiper, A. (1998). Scalable Atomic Multicast. In Proceedings IEEE IC3N '98. Technical Report 98/257. École polytechnique fédérale de Lausanne. http://lsewww.epfl.ch
Rose 1992 Rose, M. T. (1992). T he Little Black Book: Mail Bonding with OSI Directory Services. Englewood Cliffs, NJ: Prentice-Hall.
Rosenblum and Ousterhout 1992 Rosenblum, M. and Ousterhout, J. (1992). The Design and Implementation of a Log-Structured File System, ACM Transactions on Computer Systems, Vol. 10, No. 1, February, pp. 26-52. http://www.cs.berkeley.edu/projects/sprite/papers/lfsSOSP91.ps
Rosenblum and Wolf 1997 Rosenblum, D.S. and Wolf, A.L. (1997). A Design Framework for Internet-Scale Event Observation and Notification. In Proceedings sixth European Software Engineering Conference/ ACM SIGSOFT Fifth Symposium on the Foundations of Software Engineering, Zurich, Switzerland.
Rowley 1998 Rowley, A. (1998). A Security Architecture for Groupware, Doctoral Thesis, Queen Mary and Westfield College, University of London. http://www.dcs.qmw.ac.uk/research/distrib/refs.html
Rozier et al. 1988 Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien, M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard, P. and Neuhauser, W. (1988). Chorus Distributed Operating Systems. Computing Systems Journal, Vol. 1, No. 4, pp. 305-70.
Rozier et al. 1990 Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien, M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard, P. and Neuhauser, W. (1990). Overview of the Chorus Distributed Operating System. Technical Report CS/TR-90-25.1, Chorus Systèmes, France.

S

Saltzer et al. 1984 Saltzer, J.H., Reed, D.P. and Clarke, D. (1984). End-to-End Arguments in System Design, ACM Transactions on Computer Systems Vol.2, No.4, pp. 277-88. http://web.mit.edu/Saltzer/www/publications/
Sandberg 1987 Sandberg, R. (1987). The Sun Network File System: Design, Implementation and Experience. Technical Report. Mountain View Calif.: Sun Microsystems.
Sandberg et al. 1985 Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D. and Lyon, B. (1985). The Design and Implementation of the Sun Network File System. In Proceedings Usenix Conference, Portland, Ore.
Sandhu et al. 1996 Sandhu, R., Coyne, E., Felstein, H. and Youman, C. (1996). Role-Based Access Control Models, IEEE Computer, Vol. 29, No. 2, February. http://www.list.gmu.edu/journal.htm
Sane et al. 1990 Sane, A., MacGregor, K. and Campbell, R. (1990). Distributed Virtual Memory Consistency Protocols: Design and Performance. Second IEEE Workshop on Experimental Distributed Systems, pp. 91-6, October.
Sansom et al. 1986 Sansom, R.D., Julin, D.P. and Rashid, R.F. (1986). Extending a capability based system into a network environment. Technical Report CMU-CS-86-116, Carnegie-Mellon University.
Santifaller 1991 Santifaller. M. (1991). TCP/IP and NFS, Internetworking in a Unix Environment. Reading, Mass: Addison-Wesley.
Satyanarayanan 1981 Satyanarayanan, M. (1981). A study of file sizes and functional lifetimes. In Proceedings 8th ACM Symposium on Operating System Principles, Asilomar, Calif.
Satyanarayanan 1989a Satyanarayanan, M. (1989). Distributed File Systems. In Distributed Systems, an Advanced Course. (Mullender, S. ed.), second edition, Wokingham: ACM Press/Addison-Wesley. pp 353-83.
Satyanarayanan 1989b Satyanarayanan, M. (1989). Integrating Security in a Large Distributed System. ACM Transactions on Computer Systems, Vol. 7, No. 3, pp. 247-80.
Satyanarayanan et al. 1990 Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M.E., Siegel, E.H. and Steere, D.C. (1990). Coda: A Highly Available File System for a Distributed Workstation Environment. IEEE Transactions on Computers, Vol. 39, No. 4, pp. 447-59.
Saunders 1987 Saunders, B. (1987). The Information Structure of Distributed Mutual Exclusion Algorithms. ACM Transactions on Computer Systems, Vol. 3, No. 2, pp. 145-59.
Scheifler and Gettys 1986 Scheifler, R.W. and Gettys, J. (1986). The X window system. ACM Transactions on Computer Graphics, Vol. 5, No. 2, pp. 76-109.
Schiper and Raynal 1996 Schiper, A. and Raynal, M. (1996). From Group Communication to Transactions in Distributed Systems. Comms. ACM, Vol. 39, No. 4, pp. 84-7.
Schiper and Sandoz 1993 Schiper, A. and Sandoz, A. (1993). Uniform reliable multicast in a virtually synchronous environment. Proceedings 13th International Conference on Distributed Computing Systems, IEEE Computer Society Press, pp. 561-8.
Schlageter 1982 Schlageter, G. (1982). Problems of Optimistic Concurrency Control in Distributed Database Systems. SigMOD Record. Vol. 13, No. 3, pp. 62-6.
Schmidt 1998 Schmidt, D. (1998). Evaluating architectures for multithreaded object request brokers, Comms. ACM, Vol. 44, No. 10, pp. 54-60.
Schneider 1990 Schneider, F.B. (1990). Implementing Fault-tolerant Services Using the State Machine Approach: A Tutorial. ACM Computing Surveys, Vol. 22, No. 4, pp. 300-19.
Schneider 1996 Schneider, S. (1996). Security properties and CSP. In IEEE Symposium, on Security and Privacy, pp. 174-187.
Schneier 1996 Schneier, B. (1996). Applied Cryptography, second edition. New York: John Wiley.
Schroeder and Burrows 1990 Schroeder, M. and Burrows, M. (1990). The Performance of Firefly RPC. ACM Transactions on Computer Systems, Vol. 8, No. 1. pp. 1-17.
Schulzrinne et al. 1996 Schulzrinne, H., Casner, S., Frederick, D. and Jacobson, V. (1996). RTP:A Transport Protocol for Real-Time Applications, Internet RFC 1889, January. http://www.ietf.org/rfc/rfc1889
Seetharaman 1998 Seetharaman, K. (ed.) (1998). Special Issue: The CORBA Connection, Comms. ACM, October, Vol. 41, No. 10.
session directory User Guide to sd (Session Directory). http://irb.cs.uni-magdeburg.de/~elkner/Mbone/tools/user-sd.html
Shannon 1949 Shannon, C.E. (1949). Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715.
Shepler 1999 Shepler, S. (1999). NFS Version 4 Design Considerations, Internet RFC 2624, Sun Microsystems, June http://www.ietf.org/rfc/rfc2624
Shoch and Hupp 1980 Shoch, J.F. and Hupp, J.A. (1980). Measured performance of an Ethernet local network. Comms. ACM, Vol. 23, No. 12, pp. 711-21.
Shoch and Hupp 1982 Shoch, J.F. and Hupp, J.A. (1982). The `Worm' programs - early experience with a distributed computation. Comms. ACM, Vol. 25, No. 3, pp. 172-80.
Shoch et al. 1982 Shoch, J.F., Dalal, Y.K. and Redell, D.D. (1982). The evolution of the Ethernet local area network. IEEE Computer, Vol. 15, No. 8, pp. 10-28.
Shoch et al. 1985 Shoch, J.F., Dalal, Y.K., Redell, D.D. and Crane, R.C. (1985). The Ethernet. In Local Area Networks: an Advanced Course, Lecture Notes in Computer Science. No. 184, Springer-Verlag, pp. 1-33.
Shrivastava et al. 1991 Shrivastava, S., Dixon, G.N. and Parrington, G.D. (1991). An Overview of the Arjuna Distributed Programming System. IEEE Software, January. pp. 66-73.
Singh 1999 Singh, S. (1999). The Code Book. London: Fourth Estate.
Sinha and Natarajan 1985 Sinha, M. and Natarajan, N. (1985). A Priority Based Distributed Deadlock Detection Algorithm. IEEE Transactions on Software Engineering. Vol. 11, No. 1, pp. 67-80.
Spafford 1989 Spafford, E.H. (1989). The Internet Worm: Crisis and Aftermath. Comms. ACM, Vol. 32, No. 6, pp. 678-87.
Spasojevic and Satyanarayanan 1996 Spasojevic, M. and Satyanarayanan, M. (1996). An Empirical Study of a Wide-Area Distributed File System, ACM Transactions on Computer Systems, Vol. 14, No. 2, May, pp. 200-222.
Spector 1982 Spector, A.Z. (1982). Performing remote operations efficiently on a local computer network. Comms. ACM, Vol. 25, No. 4, pp. 246-60.
Spurgeon 2000 Spurgeon, C.E. (2000). Ethernet: The Definitive Guide. O'Reilly.
Srikanth and Toueg 1987 Srikanth, T. and Toueg, S. (1987). Optimal Clock Synchronization. Journal ACM. 34, 3 (July), pp. 626-45.
Srinivasan 1995a Srinivasan, R. (1995). RPC: Remote Procedure Call Protocol Specification Version 2. Sun Microsystems. Internet RFC 1831. August. http://www.ietf.org/rfc/rfc1831
Srinivasan 1995b Srinivasa, R. (1995). XDR: External Data Representation Standard. Sun Microsystems. RFC 1832. Network Working Group. August. http://www.ietf.org/rfc/rfc1832
Srinivasan and Mogul 1989 Srinivasan, V. and Mogul, J.D. (1989). Spritely NFS: Experiments with Cache-Consistency Protocols, 12th ACM Symposium on Operating System Principles, Litchfield Park, Az., December, pp. 45-57.
Stallings 1998a Stallings, W. (1998). High Speed Networks - TCP/IP and ATM Design Principles. Upper Saddle River, NJ: Prentice-Hall.
Stallings 1998b Stallings, W. (1998). Operating Systems, third edition. Prentice-Hall International.
Stallings 1999 Stallings, W. (1999). Cryptography and Network Security - Principles and Practice, second edition, Upper Saddle River, NJ: Prentice-Hall.
Steiner et al. 1988 Steiner, J., Neuman, C. and Schiller, J. (1988). Kerberos: an authentication service for open network systems. In Proceedings Usenix Winter Conference, Berkeley: Calif.
Stelling et al. 1998 Stelling, P., Foster, I., Kesselman, C., Lee, C. and von Laszewski, G. (1998). A Fault Detection Service for Wide Area Distributed Computations, Proceedings 7th IEEE Symposium on High Performance Distributed Computing, pp. 268-78.
Stoll 1989 Stoll, C. (1989). The Cuckoo's Egg: Tracking a Spy Through a Maze of Computer Espionage. New York: Doubleday.
Stone 1993 Stone, H. (1993). High-performance Computer Architecture, third edition. Addison-Wesley.
Sun 1989 Sun Microsystems Inc. (1989). NFS: Network File System Protocol Specification. Internet RFC 1094. http://www.ietf.org/rfc/rfc1094
Sun and Ellis 1998 Sun, C. and Ellis, C. (1998). Operational transformation in real-time group editors: issues, algorithms, and achievements. Proceedings Conference on Computer Supported Cooperative Work Systems, ACM Press, pp. 59-68.

T

Tanenbaum 1992 Tanenbaum, A.S. (1992). Modern Operating Systems. Englewood Cliffs, NJ: Prentice-Hall.
Tanenbaum 1996 Tanenbaum, A.S. (1996). Computer Networks, third edition. Prentice-Hall International.
Tanenbaum and van Renesse 1985 Tanenbaum, A. and van Renesse, R. (1985). Distributed Operating Systems, Computing Surveys, ACM, Vol. 17, No. 4, pp. 419-70.
Tanenbaum et al. 1990 Tanenbaum, A.S., van Renesse, R., van Staveren, H., Sharp, G., Mullender, S., Jansen, J. and van Rossum, G. (1990). Experiences with the Amoeba Distributed Operating System. Comms. ACM, Vol. 33, No. 12, pp. 46-63.
Terry et al. 1995 Terry, D., Theimer, M., Petersen, K., Demers, A, Spreitzer, M. and Hauser, C. (1995). Managing update conflicts in Bayou, a weakly connected replicated storage system. Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 172-183.
TFCC IEEE Task Force on Cluster Computing. http://www.rdt.monash.edu.au/~rajkumar/tfcc/
Thayer 1998 Thayer, R. (1998). IP Security Document Roadmap, Internet RFC 2411, November. http://www.ietf.org/rfc/rfc2411
Thekkath et al. 1997 Thekkath, C.A., Mann, T. and Lee, E.K. (1997). Frangipani: A Scalable Distributed File System, In Proc. 16th ACM Symposium on Operating System Principles, St. Malo, France, October, pp. 224-237. ftp://ftp.digital.com/pub/DEC/SRC/publications/thekkath/frangipani-sosp.ps
Tokuda et al. 1990 Tokuda, H., Nakajima, T. and Rao, P. (1990). Real-time Mach: towards a predictable real-time system. In Proceedings USENIX Mach Workshop, pp. 73-82, October.
Topolcic 1990 Topolcic, C. (ed.) (1990). Experimental Internet Stream Protocol, Version 2. Internet RFC 1190. http://www.ietf.org/rfc/rfc1190
Tzou and Anderson 1991 Tzou, S.-Y. and Anderson, D. (1991). The performance of message-passing using restricted virtual memory remapping. Software-Practice and Experience, Vol. 21, pp. 251-67.

V

van Renesse et al. 1989 van Renesse, R., van Staveran, H. and Tanenbaum, A. (1989). The Performance of the Amoeba Distributed Operating System. Software - Practice and Experience, Vol. 19, No. 3, pp. 223-34.
van Renesse et al. 1995 van Renesse, R., Birman, K., Friedman, R., Hayden, M. and Karr, D. (1995). A Framework for Protocol Composition in Horus. Proceedings PODC 1995, pp. 80-9.
van Renesse et al. 1996 van Renesse, R., Birman, K. and Maffeis, S. (1996). Horus: a Flexible Group Communication System. Comms. ACM, Vol. 39, No. 4, pp. 54-63.
van Steen et al. 1998 van Steen, M., Hauck, F., Homburg, P. and Tanenbaum, A. (1998). Locating objects in wide-area systems. IEEE Communication, Vol. 36, No. 1, pp. 104-109.
Vinoski 1998 Vinoski, S. (1998). New Features for CORBA 3.0, Comms. ACM, October 1998, Vol. 41, No. 10. pp. 44-52.
Vogt et al. 1993 Vogt, C., Herrtwich R.G. and Nagarajan, R. (1993). HeiRAT - The Heidelberg Resource Administration Technique: Design Philosophy and Goals. Kommunikation in verteilten Systemen, Munich, Informatik aktuell, Springer.
Volpano and Smith 1999 Volpano, D. and Smith, G. (1999). Language Issues in Mobile Program Security. To appear in Lecture Notes in Computer Science, Springer. http://www.cs.nps.navy.mil/research/languages/papers/atsc/
von Eicken et al. 1995 von Eicken, T., Basu, A., Buch, V. and Vogels, V. (1995). U-Net: a user-level network interface for parallel and distributed programming. Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 40-53.

W

Wahl et al. 1997 Wahl, M., Howes, T. and Kille, S. (1997). The Lightweight Directory Access Protocol (v3). Internet RFC 2251. http://www.ietf.org/rfc/rfc2251
Waldo 1999 Waldo, J. (1999). The Jini Architecture for Network-centric Computing. Comms. ACM. Vol. 42, No. 7, pp. 76-82.
Waldo et al. 1994 Waldo, J, Wyant, G., Wollrath, A. and Kendall, S. (1994). A Note on Distributed Computing. In Arnold et al. 1999, pp. 307-26. http://www.sun.com/research/techrep/1994/abstract-29.html
Waldspurger et al. 1992 Waldspurger, C., Hogg, T., Huberman, B., Kephart, J. and Stornetta, W. (1992). Spawn: A Distributed Computational Economy. Transactions on Software Engineering, Vol. 18, No. 2, pp. 103-17.
Want et al. 1992 Want, R., Hopper, A., Falcao, V and Gibbons, V. (1992). The Active Badge Location System. ACM Transactions on Information Systems, Vol. 10, No.1, January, pp. 91-102. ftp.uk.research.att.com:/pub/docs/att/tr.92.1.pdf
web.mit.edu I Kerberos: The Network Authentication Protocol. http://web.mit.edu/kerberos/www/
web.mit.edu II The Three Myths of Firewalls. http://web.mit.edu/kerberos/www/firewalls.html
Weikum 1991 Weikum, G. (1991). Principles and Realization Strategies of Multilevel Transaction Management. ACM Transactions Database Systems, Vol. 16, No. 1, pp. 132-40.
Weiser 1993 Weiser, M. (1993). Some computer science issues in ubiquitous computing. Comms. ACM, Vol. 36, No. 7, pp. 74-84.
Wheeler and Needham 1994 Wheeler, D.J. and Needham, R.M. (1994). TEA, a Tiny Encryption Algorithm. Technical Report 355, Two Cryptographic Notes, Computer Laboratory, University of Cambridge, December, pp. 1-3. http://www.ftp.cl.cam.ac.uk/ftp/papers/
Wheeler and Needham 1997 Wheeler, D.J. and Needham, R.M. (1997). Tea Extensions, October 1994, pp. 1-3. http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-xtea.ps.gz
Wiesmann et al. 2000 Wiesmann, M., Pedone, F., Schiper, A., Kemme, B. and Alonso, G. (2000). Understanding replication in databases and distributed systems. In Proceedings 20th International Conference on Distributed Computing Systems (ICDCS'2000), Taipei, Republic of China, IEEE.
Wobber et al. 1994 Wobber, E., Abadi, M., Burrows, M. and Lampson, B. (1994). Authentication in the Taos operating system. ACM Transactions Computer Systems. 12, 1 (Feb.), pp. 3-32. http://www.research.microsoft.com/lampson/Publications.html
Wuu and Bernstein 1984 Wuu, G.T. and Bernstein, A.J. (1984). Efficient Solutions to the Replicated Log and Dictionary Problems. ACM Proceedings Third Annual Symposium Principles of Distributed Computing, pp. 233-42.
www.bluetooth.com The Official Bluetooth SIG Website. http://www.bluetooth.com/
www.bxa.doc.gov Bureau of Export Administration, US Department of Commerce, Commercial Encryption Export Controls. http://www.bxa.doc.gov/Encryption/
www.cdk3.net Coulouris, G., Dollimore, J. and Kindberg, T. (Eds), Distributed Systems, Concepts and Design: Supporting material. www.cdk3.net
www.citrix.com Citrix Corporation. Server-based Computing White Paper. http://www.citrix.com/products/server_based_computing/
www.cooltown.hp.com Hewlett-Packard Corporation, CoolTown nomadic computing project pages. www.cooltown.hp.com.
www.cren.net Corporation for Research and Educational Networking, CERN Certificate Authority. http://www.cren.net/ca/
www.cuseeme.com CU-SeeMe Networks Inc, Home page. http://www.cuseeme.com/
www.doi.org International DOI Foundation, Pages on digital object identifiers. http://www.doi.org/
www.handle.net Handle system, Home page. http://www.handle.net/
www.iana.org Internet Assigned Numbers Authority, IANA Home Page. http://www.iana.org/
www.ietf.org Internet Engineering Task Force, Internet RFC Index Page. http://www.ietf.org/rfc/
www.isoc.org Robert Hobbes Zakon. Hobbes' Internet Timeline. http://www.isoc.org/internet/history/
www.microsoft.com Microsoft Corporation, NetShow Theater Server Web Page. http://www.microsoft.com/Theater/
www.microsoft.com I Microsoft Corporation, Active Directory Services. http://www.microsoft.com/windows2000/library/technologies/activeDirectory/
www.microsoft.com II Microsoft Corporation, Windows 2000 Kerberos Authentication, White Paper, http://www.microsoft.com/windows2000/library/howitworks/
www.microsoft.com III Microsoft Corporation, NetMeeting home page. http://www.microsoft.com/windows/NetMeeting/
www.mids.org Matrix Information and Directory Services Inc. Internet Performance. http://www.mids.org/topics/
www.millicent.com Compaq Corporation, Millicent MicroCommerce system. http://www.millicent.com/
www.omg.org Object Management Group, Index to CORBA services. OMG: Framingham, Mass. http://www.omg.org/corba/library/csindx.html
www.opengroup.org Open Group, Portal to the World of DCE. http://www.opengroup.org/tech/dce/
www.openssl.org OpenSSL Project, OpenSSL: The Open Source toolkit for SSL/TLS. http://www.openssl.org/
www.pgp.com PGP Home. http://www.pgp.com/
www.reed.com Read, D.P. (2000). The End of the End-to-End Argument. http://www.reed.com/Papers/endofendtoend.html
www.rsasecurity.com RSA Security Inc., Home page. http://www.rsasecurity.com/
www.rsasecurity.com I RSA Corporation (1997). DES Challenge. http://www.rsasecurity.com/rsalabs/challenges/
www.rsasecurity.com II RSA Corporation (1999). RSA Factoring Challenge. http://www.rsasecurity.com/rsalabs/challenges/factoring/
www.rtj.org Real-Time for Java TM Experts Group. http://www.rtj.org/
www.spec.org SPEC SFS97 Benchmark. http://www.spec.org/osg/sfs97/
www.upnp.com Universal Plug and Play home page. http://www.upnp.com/
www.verisign.com Verisign Inc., Home page. http://www.verisign.com/
www.w3.org I World Wide Web Consortium, Home page. http://www.w3.org/
www.w3.org II World Wide Web Consortium, Pages on the HyperText Markup Language. http://www.w3.org/MarkUp/
www.w3.org III World Wide Web Consortium, Pages on Naming and Addressing. http://www.w3.org/Addressing/
www.w3.org IV World Wide Web Consortium, Pages on the HyperText Transfer Protocol. http://www.w3.org/Protocols/
www.w3.org V World Wide Web Consortium, Pages on the Resource Description Framework and other metadata schemes. www.w3.org/Metadata.
www.w3.org VI World Wide Web Consortium, Pages on the Extensible Markup Language. http://www.w3.org/XML/
www.w3.org VII World Wide Web Consortium, Pages on the Extensible Stylesheet Language. http://www.w3.org/Style/XSL/
www.wapforum.org WAP Forum, White Papers and Specifications. http://www.wapforum.org/what/technical.htm
www.wlana.com The IEEE 802.11 Wireless LAN Standard. http://www.wlana.com/intro/standard/
Wyckoff et al. 1998 Wyckoff, P., McLaughry, S., Lehman, T. and Ford, D. (1998). T Spaces. IBM Systems Journal, Vol. 37, No. 3.

Z

Zhang et al. 1993 Zhang, L., Deering, S.E., Estrin, D., Shenker, S. and Zappala, D. (1993). RSVP - A New Resource Reservation Protocol. IEEE Network Magazine, Vol. 9, No. 5.
Zimmermann 1995 Zimmermann, P.R. (1995). The Official PGP User's Guide, Cambridge, Mass.: MIT Press.

Home | References | Instructors Guide | Contents | Preface | Authors | Errata | Additional Material |