George Coulouris, Jean Dollimore and Tim Kindberg

Distributed Systems
Concepts and Design

Fourth Edition

HomeReferencesInstructors GuideErrataAdditional materialContents and PrefaceAuthors









































































This reference list provides clickable links to those documents that exist only on the Web. The links go to the document itself or to an index page containing a link to the document. References to Internet RFCs include a link to the document at the Internet Engineering Task Force web site.

We have not provided links to items that are published in the literature because of their tendancy to decay. The published items are best retrieved by pasting title or author details into the excellent Citeseer publications database or search engines such as Google or Google Scholar.

Abadi and Gordon 1999

Abadi, M. and Gordon, A.D. (1999). A calculus for cryptographic protocols: The spi calculus. Information and Computation, Vol. 148, No. 1, pp. 1-70, January.

Abadi et al. 1998

Abadi, M., Birrell, A.D., Stata, R. and Wobber, E.P. (1998). Secure Web tunneling. In Proceedings 7th International World Wide Web Conference, pp. 531-9. Elsevier, in Computer Networks and ISDN Systems, Volume 30, Nos 1-7.

Abrossimov et al. 1989

Abrossimov, V., Rozier, M. and Shapiro, M. (1989). Generic virtual memory management for operating system kernels. Proceedings of 12th ACM Symposium on Operating System Principles, pp. 123-36, December.

Accetta et al. 1986

Accetta, M., Baron, R., Golub, D., Rashid, R., Tevanian, A. and Young, M. (1986). Mach: A new kernel foundation for UNIX development. In Proceedings Summer 1986 USENIX Conference, pp. 93-112.

Adjie-Winoto et al. 1999

Adjie-Winoto, W., Schwartz, E., Balakrishnan, H. and Lilley, J. (1999). The design and implementation of an intentional naming system. In Proceedings 17th ACM Symposium on Operating System Principles, published as Operating Systems Review, Vol. 34, No. 5, pp. 186-201.

Adve and Hill 1990

Adve, S. and Hill, M. (1990). Weak ordering - a new definition. In Proceedings 17th. Annual Symposium on Computer Architecture, IEEE, pp. 2-14.

Agrawal et al. 1987

Agrawal, D., Bernstein, A., Gupta, P. and Sengupta, S. (1987). Distributed optimistic concurrency control with reduced rollback. Distributed Computing, Vol. 2: pp. 45-59. Springer-Verlag.

Ahamad et al. 1992

Ahamad, M., Bazzi, R., John, R., Kohli, P. and Neiger, G. (1992). The Power of Processor Consistency. Technical report GIT-CC-92/34, Georgia Institute of Technology, Atlanta.

Al-Muhtadi et al. 2002

Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D. and Yi, S. (2002). Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July, pp. 74-83.

Alonso et al. 2004

Alonso, G., Casata, C., Kuno, H. and Machiraju, V. (2004) Web Services, Concepts, Architectures and Application s. Berlin, Heidelberg: Springer-Verlag.

Anderson 1993

Anderson, D.P. (1993). Meta-scheduling for distributed continuous media. ACM Transactions on Computer Systems, Vol. 11, No. 3.

Anderson 1996

Anderson, R. J. (1996). The Eternity Service. In Proceedings of Pragocrypt '96.

Anderson 2001

Anderson, R.J. (2001). Security Engineering. John Wiley & Sons.

Anderson et al. 1990a

Anderson, D.P., Herrtwich, R.G. and Schaefer, C. (1990). SRP - A Resource Reservation Protocol for Guaranteed-Performance Communication in the Internet. Technical report 90-006, International Computer Science Institute, Berkeley, CA.

Anderson et al. 1990b

Anderson, D.P., Tzou, S., Wahbe, R., Govindan, R. and Andrews, M. (1990). Support for continuous media in the DASH System. Tenth International Conference on Distributed Computing Systems, Paris.

Anderson et al. 1991

Anderson, T., Bershad, B., Lazowska, E. and Levy, H. (1991). Scheduler activations: efficient kernel support for the user-level management of parallelism. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 95-109.

Anderson et al. 1995

Anderson, T., Culler, D., Patterson, D. and the NOW team. (1995). A case for NOW (Networks Of Workstations), IEEE Micro, Vol. 15, No. 1.

Anderson et al. 1996

Anderson, T.E., Dahlin, M.D., Neefe, J.M., Patterson, D.A., Roselli, D.S. and Wang, R.Y. (1996). Serverless Network File Systems. ACM Trans. on Computer Systems, Vol. 14, No. 1, pp. 41-79. February.

Anderson et al. 2002

Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M. and Werthimer, D. (2002). SETI@home: An experiment in public-resource computing. Communications of the ACM, Nov. 2002, Vol. 45, No. 11, pp. 56-61.

Anderson et al. 2004

Anderson, R., Chan, H. and Perrig, A. (2004). Key Infection: Smart Trust for Smart Dust. Proceedings of IEEE 12th International Conference on Network Protocols (ICNP 2004), Berlin, Germany, October, pp. 206-215.

ANSA 1989

ANSA (1989). The Advanced Network Systems Architecture (ANSA) Reference Manual. Castle Hill, Cambridge, England: Architecture Project Management.

ANSI 1985

American National Standards Institute (1985). American National Standard for Financial Institution Key Management, Standard X9.17 (revised).

Apache 2004

The Apache foundation (2004). Apache Tomcat.

Apple Computer 2004

Apple Computer (2004). iChat AV Video conferencing for the rest of us.

Armand et al. 1989

Armand, F., Gien, M., Herrman, F. and Rozier, M. (1989). Distributing UNIX brings it back to its original virtues. Proc.Workshop on Experiences with Building Distributed and Multiprocessor Systems, pp. 153-174, October.

Arnold et al. 1999

Arnold, K., O'Sullivan, B., Scheifler, R.W., Waldo, J. and Wollrath, A. (1999). The Jini Specification, Reading, MA: Addison-Wesley.

Amazon Web Service FAQs.

Attiya and Welch1998

Attiya, H. and Welch, J. (1998). Distributed Computing - Fundamentals, Simulations and Advanced Topics. McGraw-Hill.

Babaoglu et al. 1998

Babaoglu, O., Davoli, R., Montresor, A. and Segala, R. (1998). System support for partition-aware network applications. In Proceedings 18th InternationalConference on Distributed Computing Systems (ICDCS ' 98), pp. 184-191.

Bacon 2002

Bacon, J. (2002). Concurrent Systems, third edition. Harlow, England: Addison-Wesley.

Baghwan et al. 2003

Bhagwan, R., Savage, S. and Voelker, G. (2003). Understanding availability. In Proc. 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CA, Feb. 2003.

Baker 1997

Baker, S. (1997). CORBA Distributed Objects Using Orbix. Harlow, England: Addison-Wesley.

Bal et al. 1990

Bal, H.E., Kaashoek, M.F. and Tanenbaum, A.S. (1990). Experience with distributed programming in Orca. In Proceedings International Conference on Computer Languages '90, IEEE, pp. 79-89.

Balakrishnan et al. 1995

Balakrishnan, H., Seshan, S. and Katz, R.H. (1995). Improving reliable transport and hand-off performance in cellular wireless networks. In Proceedings ACM Mobile Computing and Networking Conference, ACM, pp. 2-11.

Balakrishnan et al. 1996

Balakrishnan, H., Padmanabhan, V., Seshan, S. and Katz, R. (1996). A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. Proceedings of the ACM SIGCOMM '96 Conference, pp. 256-69.

Balan et al. 2003

Balan, R.K., Satyanarayanan, M., Park, S., Okoshi, T. (2003). Tactics-Based Remote Execution for Mobile Computing. Proceedings First USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA, May, pp. 273-286.

Balazinska et al. 2002

Balazinska, M., Balakrishnan, H. and Karger, D. (2002). INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery. Proceedings Pervasive 2002 - International Conference on Pervasive Computing, Zurich, Switzerland, August, pp. 195-210.

Balfanz et al. 2002

Balfanz, D., Smetters, D.K., Stewart, P. and Wong, H.C. (2002). Talking to strangers: authentication in ad-hoc wireless networks. Proceedings Network and Distributed System Security Symposium, San Diego, CA, USA, February.

Banerjea and Mah 1991

Banerjea, A. and Mah, B.A. (1991). The real-time channel administration protocol. Second International Workshop on Network and Operating System Support for Digital Audio and Video, Heidelberg.

Baran 1964

Baran, P. (1964). On Distributed Communications . Research Memorandum RM-3420-PR, Rand Corporation.

Barborak et al. 1993

Barborak, M., Malek, M. and Dahbura, A. (1993). The consensus problem in fault-tolerant computing. ACM Computing Surveys, Vol. 25, No. 2, pp. 171-220.

Barghouti and Kaiser 1991

Barghouti, N.S. and Kaiser, G.E. (1991). Concurrency control in advanced database applications. Computing Surveys, Vol. 23, No. 3, pp. 269-318.

Barham et al. 2003

Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I. and Warfield, A. (2003). Xen and the art of virtualization. Proceedings nineteenth ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA, October, pp. 164-177.

Barr and Asanovic 2003

Barr, K. and Asanovic, K. (2003). Energy Aware Lossless Data Compression. Proceedings First USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA, May, pp. 231-244.

Bartoli et al. 1993

Bartoli, A., Mullender, S.J. and van der Valk, M. (1993). Wide-address spaces - exploring the design space. ACM Operating Systems Review, Vol. 27, No. 1, pp. 11-17.

Barton et al. 2002

Barton, J., Kindberg, T. and Sadalgi, S. (2002). Physical Registration: Configuring Electronic Directories using Handheld Devices. IEEE Wireless Communications, Vol. 9, No. 1, February, pp. 30-38.

Bates et al. 1996

Bates, J., Bacon, J., Moody, K. and Spiteri, M. (1996). Using events for the scalable federation of heterogeneous component s, European SIGOPS Workshop.

Bell and LaPadula 1975

Bell, D.E. and LaPadula, L.J. (1975). Computer Security Model: Unified Exposition and Multics Interpretation. Mitre Corporation, 1975.

Bellman 1957

Bellman, R.E. (1957). Dynamic Programming . Princeton, NJ: Princeton University Press.

Bellovin and Merritt 1990

Bellovin, S.M. and Merritt, M. (1990). Limitations of the Kerberos authentication system. ACM Computer Communications Review, Vol. 20, No. 5, pp. 119-32.

Bellwood et al. 2003

Bellwood, T., Clément, L. and von Riegen, C. (eds) (2003). UDDI Version 3.0.1. Oasis Corporation.

Beresford and Stajano 2003

Beresford, A. and Stajano, F. (2003). Location Privacy in Pervasive Computing. IEEE Pervasive Computing, Vol. 2, No. 1, Jan.-Mar., pp. 46-55.

Berners-Lee 1991

Berners-Lee, T. (1991). World Wide Web Seminar.

Berners-Lee 1999

Berners-Lee, T. (1999). Weaving The Web. HarperCollins.

Berners-Lee et al. 2005

Berners Lee, T., Fielding, R. and Masinter, L. (2005). Uniform Resource Identifiers (URI): Generic Syntax, August. Internet RFC 3986.

Bernstein et al. 1980

Bernstein, P.A., Shipman, D.W. and Rothnie, J.B. (1980). Concurrency control in a system for distributed databases (SDD-1). ACM Transactions Database Systems, Vol. 5, No. 1, pp. 18-51.

Bernstein et al. 1987

Bernstein, P., Hadzilacos, V. and Goodman, N. (1987). Concurrency Control and Recovery in Database Systems. Reading, MA: Addison-Wesley. Text available online at:

Bershad et al. 1990

Bershad, B., Anderson, T., Lazowska, E. and Levy, H. (1990). Lightweight remote procedure call. ACM Transactions Computer Systems, Vol. 8, No. 1, pp. 37-55.

Bershad et al. 1991

Bershad, B., Anderson, T., Lazowska, E. and Levy, H. (1991). User-level interprocess communication for shared memory multiprocessors. ACM Transactions Computer Systems, Vol. 9, No. 2, pp. 175-198.

Bershad et al. 1993

Bershad, B., Zekauskas, M. and Sawdon, W. (1993). The Midway distributed shared memory system. In Proceedings IEEE COMPCON Conference, IEEE, pp. 528-37.

Bershad et al. 1995

Bershad, B., Savage, S., Pardyak, P., Sirer, E., Fiuczynski, M., Becker, D., Chambers, C. and Eggers, S. (1995). Safety and performance in the SPIN operating system. Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 267-84.

Bhatti and Friedrich 1999

Bhatti, N. and Friedrich, R. (1999). Web Server Support for Tiered Services. Hewlett-Packard Corporation Technical Report HPL-1999-160.

Birman 1993

Birman, K.P. ( 1993 ). The process group approach to reliable distributed computing. Comms. ACM, Vol. 36, No. 12, pp. 36-53.

Birman 1996

Birman, K.P. (1996). Building Secure and Reliable Network Applications. Greenwich, CT: Manning.

Birman 2004

Birman, K.P. (2004). Like it or not, Web Services are Distributed Objects! Comm. of the ACM. Vol. 47, No. 12, pp. 60-62. December.

Birman and Joseph 1987a

Birman, K.P. and Joseph, T.A. (1987). Reliable communication in the presence of failures. ACM Transactions Computer Systems, Vol. 5, No. 1, pp. 47-76.

Birman and Joseph 1987b

Birman, K. and Joseph, T. (1987). Exploiting virtual synchrony in distributed systems. In Proceedings 11th ACM Symposium on Operating Systems Principles, pp. 123-38.

Birman et al. 1991

Birman, K.P., Schiper, A. and Stephenson, P. (1991). Ligh tweight causal and atomic group multicast. ACM Transactions Computer Systems, Vol. 9, No. 3, pp. 272-314.

Birrell and Needham 1980

Birrell, A.D. and Needham, R.M. (1980). A universal file server. IEEE Transactions Software Engineering, Vol. SE-6, No. 5, pp. 450-3.

Birrell and Nelson 1984

Birrell, A.D. and Nelson, B.J. (1984). Implementing remote procedure calls. ACM Transactions Computer Systems, Vol. 2, pp. 39-59.

Birrell et al. 1982

Birrell, A.D., Levin, R., Needham, R.M. and Schroeder, M.D. (1982). Grapevine: an exercise in distributed computing. Comms. ACM, Vol. 25, No. 4, pp. 260-73.

Birrell et al. 1995

Birrell, A., Nelson, G. and Owicki, S. (1993). Network objects. In Proceedings 14th ACM Symposium on Operating Systems Principle s, pp. 217-30.

Bishop and Warren 2003

Bishop, P. and Warren, N. (2003). JavaSpaces in Practice. Pearson Education.

Bisiani and Forin 1988

Bisiani, R. and Forin, A. (1988). Multilanguage parallel programming of heterogeneous machines. IEEE Transactions Computers, Vol. 37, No. 8, pp. 930-45.

Bisiani and Ravishankar 1990

Bisiani, R. and Ravishankar, M. (1990). Plus: a distributed shared memory system. In Proceedings 17th International Symposium on Computer Architecture, pp. 115-24.

Black 1990

Black, D. (1990). Scheduling s upport for concurrency and parallelism in the Mach operating system, IEEE Computer, Vol. 23, No. 5, pp. 35-43.

Black and Artsy 1990

Black, A. and Artsy, Y. (1990). Implementing location independent invocation, IEEE Transactions Parallel and Distributed Systems, Vol. 1, No. 1.

Blair and Stefani 1997

Blair, G.S. and Stefani, J.-B. (1997). Open Distributed Processing and Multimedia. Harlow, England: Addison-Wesley.

Blakley 1999

Blakley, R. (1999). CORBA Security - An Introduction to Safe Computing with Objects. Reading, MA: Addison-Wesley.

Bolosky et al. 1996

Bolosky, W., Barrera, J., Draves, R., Fitzgerald, R., Gibson, G., Jones, M., Levi, S., Myhrvold, N. and Rashid, R. (1996). The Tiger video fileserver, 6th NOSSDAV Conference, Zushi, Japan, April.

Bolosky et al. 1997

Bolosky, W., Fitzgerald, R. and Douceur, J. (1997). Distributed schedule management in the Tiger video fileserver, 16th ACM Symposium on Operating System Principles, pp. 212-23, St Malo, France, October.

Bolosky et al. 2000

Bolosky, W.J., Douceur, J.R., Ely, D. and Theimer, M. (2000). Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs, in Proceedings of the International Conference on Measurement and Modeling of Computer Systems, 2000, pp. 34-43.

Bonnaire et al. 1995

Bonnaire, X., Baggio, A. and Prun, D. (1995). Intrusion free monitoring: an observation engine for message server based applications. In Proceedings of the 10th International Symposium on Computer and Information Sciences (ISCIS X), pp. 541-48.

Borisov et al. 2001

Borisov, N., Goldberg, I. and Wagner, D. (2001) Intercepting mobile communications: The insecurity of 802.11. In Proceedings of MOBICOM 2001

Bowman et al. 1990

Bowman, M., Peterson, L. and Yeatts, A. (1990). Univers: an attribute-based name server. Software-Practice and Experience, Vol. 20, No. 4, pp. 403-24.

Box 1998

Box, D. (1998). Essential COM. Reading, MA: Addison-Wesley.

Box and Curbera 2004

Box, D. and Curbera, F. (2004). Web Services Addressing (WS-Addressing ), BEA Systems, IBM and Microsoft. August.

Boykin et al. 1993

Boykin, J., Kirschen, D., Langerman, A. and LoVerso, S. (1993). Programming under Mach. Reading, MA: Addison-Wesley.

Bray and Sturman 2002

Bray, J. and Sturman. C.F. (2002). Bluetooth: Connect Without Cables, 2nd edn, Prentice Hall.

Buford 1994

Buford, J.K. (1994). Multimedia Systems. Addison-Wesley.

Burns and Wellings 1998

Burns, A. and Wellings, A. (1998). Concurrency in Ada, Cambridge University Press.

Burrows et al. 1989

Burrows, M., Abadi, M. and Needham, R. (1989). A logic of authentication. Technical Report 39, Palo Alto, CA: Digital Equipment Corporation Systems Research Center.

Burrows et al. 1990

Burrows, M., Abadi, M. and Needham, R. (1990). A logic of authentication. ACM Transactions Computer Systems, Vol. 8, pp. 18-36.

Bush 1945

Bush, V. (1945). As we may think. The Atlantic Monthly, July.

Callaghan 1996a

Callaghan, B. (1996). WebNFS Client Specification, Internet RFC 2054, October.

Callaghan 1996b

Callaghan, B. (1996). WebNFS Server Specification, Internet RFC 2055, October.

Callaghan 1999

Callaghan, B. (1999). NFS Illustrated, Reading, MA: Addison-Wesley.

Callaghan et al. 1995

Callaghan, B., Pawlowski, B. and Staubach, P. (1995). NFS Version 3 Protocol Specification, Internet RFC 1813, Sun Microsystems, June.

Campbell 1997

Campbell, R. (1997). Managing AFS: The Andrew File System, Prentice-Hall.

Campbell et al. 1993

Campbell, R., Islam, N., Raila, D. and Madany, P. (1993). Designing and implementing Choices: an object-oriented system in C++. Comms. ACM, Vol. 36, No. 9, pp. 117-26.

Canetti and Rabin 1993

Canetti, R. and Rabin, T. (1993). Fast asynchronous byzantine agreement with optimal resilience. In Proceedings 25th ACM Symposium on Theory of Computing, pp. 42-51.

Carriero and Gelernter 1989

Carriero, N. and Gelernter, D. (1989). Linda in context. Comms. ACM, Vol. 32, No. 4, pp. 444-58.

Carter et al. 1991

Carter, J.B., Bennett, J.K. and Zwaenepoel, W. (1991). Implementation and performance of Munin. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 152-64.

Carter et al. 1998

Carter, J., Ranganathan, A. and Susarla, S. (1998). Khazana, An Infrastructure for Building Distributed Services. In Proceedings of ICDCS '98. Amsterdam, The Netherlands.

Castro and Liskov 2000

Castro, M. and Liskov, B. (2000). Proactive Recovery in a Byzantine-Fault-Tolerant System, Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI '00), San Diego, USA, October 2000.

Castro et al. 2002

Castro, M., Druschel, P., Hu, Y.C. and Rowstron, A. (2002). Topology-aware routing in structured peer-to-peer overlay networks. Technical Report MSR-TR-2002-82, Microsoft Research, 2002.

Castro et al. 2003

Castro, M., Costa, M. and Rowstron, A. (2003). Performance and dependability of structured peer-to-peer overlays. Technical Report MSR-TR-2003-94, Microsoft Research, 2003.

CCITT 1988a

CCITT (1988). Recommendation X.500 : The Directory - Overview of Concepts, Models and Service. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland.

CCITT 1988b

CCITT (1988). Recommendation X.509: The Directory - Authentication Framework. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland.

CCITT 1990

CCITT (1990). Recommendation I.150 : B-ISDN ATM Functional Characteristics. International Telecommunications Union, Place des Nations, 1211 Geneva, Switzerland.

Ceri and Owicki 1982

Ceri, S. and Owicki, S. (1982). On the use of optimistic methods for concurrency control in distributed databases. In Proceedings 6th Berkeley Workshop on Distributed Data Management and Computer Networks, Berkeley, CA. pp. 117-30.

Ceri and Pelagatti 1985

Ceri, S. and Pelagatti, G. (1985). Distributed Databases - Principles and Systems. McGraw-Hill.

Chalmers et al. 2004

Chalmers, D., Dulay, N. and Sloman, M. (2004). Meta Data to Support Context Aware Mobile Applications. Proceedings IEEE Intl. Conference on Mobile Data Management (MDM2004), Berkeley, CA, USA, January, pp. 199-210.

Chandra and Toueg 1996

Chandra, T. and Toueg, S. (1996). Unreliable failure detectors for reliable distributed systems. Journal of the ACM, Apr., pp. 374-82.

Chandy and Lamport 1985

Chandy, K. and Lamport, L. (1985). Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computer Systems, Vol. 3, No. 1, pp. 63-75.

Chang and Maxemchuk 1984

Chang, J. and Maxemchuk, N. (1984). Reliable Broadcast Protocols, ACM Transactions on Computer Systems. Vol. 2. No. 3. pp. 251-75.

Chang and Roberts 1979

Chang, E.G. and Roberts, R. (1979). An improved algorithm for decentralized extrema-finding in circular configurations of processors. Comms. ACM, Vol. 22, No. 5, pp. 281-3.

Charron-Bost 1991

Charron-Bost, B. (1991). Concerning the size of logical clocks in distributed systems. Information Processing Letter s, Vol. 39, July, pp. 11-16.

Chaum 1981

Chaum, D. (1981). Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Comms. ACM, Vol. 24, No. 2, February, pp. 84-88.

Chen et al. 1994

Chen, P., Lee, E., Gibson, G., Katz, R. and Patterson, D. (1994). RAID: High-Performance, Reliable Secondary Storage. ACM Computing Surveys, Vol. 26, No. 2, June, pp. 145-188.

Cheng 1998

Cheng, C.K. (1998). A survey of media servers. Hong Kong University CSIS, November.

Cheriton 1984

Cheriton, D.R. (1984). The V kernel: a software base for distributed systems. IEEE Software, Vol. 1 No. 2, pp. 19-42.

Cheriton 1985

Cheriton, D.R. (1985). Preliminary thoughts on problem-oriented shared memory: a decentralized approach to distributed systems. ACM Operating Systems Review, Vol. 19, No. 4, pp. 26-33.

Cheriton 1986

Cheriton, D.R. (1986). VMTP: A protocol for the next generation of communication systems.In Proceedings SIGCOMM '86 Symposium on Communication Architectures and Protocols, ACM, pp. 406-15.

Cheriton and Mann 1989

Cheriton, D. and Mann, T. (1989). Decentralizing a global naming service for improved performance and fault tolerance. ACM Transactions Computer Systems, Vol. 7, No. 2, pp. 147-83.

Cheriton and Skeen 1993

Cheriton, D. and Skeen, D. (1993). Understanding the limitations of causally and totally ordered communication. In Proceedings 14th ACM Symposium on Operating System Principles, Dec., pp. 44-57.

Cheriton and Zwaenepoel 1985

Cheriton, D.R. and Zwaenepoel, W. (1985). Distributed process groups in the V kernel. ACM Transactions Computer Systems, Vol. 3, No. 2, pp. 77-107.

Cheswick and Bellovin 1994

Cheswick, E.R. and Bellovin, S.M. (1994). Firewalls and Internet Security. Reading, MA: Addison-Wesley.

Chien 2004

Chien, A. (2004). Massively Distributed Computing: Virtual Screening on a Desktop Grid. In Foster, I. and Kesselman, C. (eds), The Grid 2. San Francisco, CA: Morgan Kauffman.

Choudhary et al. 1989

Choudhary, A., Kohler, W., Stankovic, J. and Towsley, D. (1989). A modified priority based probe algorithm for distributed deadlock detection and resolution. IEEE Transactions Software Engineering, Vol. 15, No. 1.

Chu et al. 2000

Chu,Y.-H., Rao, S.G. and Zhang, H. (2000). A case for end system multicast. In Proc. of ACM Sigmetrics, June 2000, pp. 1-12.

Clark 1982

Clark, D.D. (1982). Window and Acknowledgement Strategy in TCP, Internet RFC 813.

Clark 1988

Clark, D.D. (1988). The Design Philosophy of the DARPA Internet Protocols. ACM SIGCOMM Computer Communication Review, Vol. 18, No. 4, August, pp. 106-114.

Clarke et al. 2000

Clarke, I., Sandberg, O., Wiley, B. and Hong, T. (2000). Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000.

Cohen 2003

Cohen, B. (2003). Incentives Build Robustness in BitTorrent, May 2003, Internet publication.

Comer 2000a

Comer, D.E. ( 2000 ). Internetworking with TCP/IP, Volume 1: Principles, Protocols and Architecture, 4th edn. Upper Saddle River, NJ: Prentice-Hall.

Comer 2000b

Comer, D.E. (2000). The Internet Book, 3rd edn. Upper Saddle River, NJ: Prentice-Hall.

Condict et al. 1994

Condict, M., Bolinger, D., McManus, E., Mitchell, D. and Lewontin, S. (1994). Microkernel modularity with integrated kernel performance. Technical report, OSF Research Institute, Cambridge, MA, April.

Coulouris et al. 1998

Coulouris, G.F., Dollimore, J. and Roberts, M. (1998). Role and task-based access control in the PerDiS groupware platform. Third ACM Workshop on Role-Based Access Control, George Mason University, Washington DC, October 22-23.

Cristian 1989

Cristian, F. (1989). Probabilistic clock synchronization. Distributed Computing, Vol. 3, pp. 146-58.

Cristian 1991a

Cristian, F. (1991). Understanding fault-tolerant distributed systems. Comms. ACM, Vol. 34, No. 2.

Cristian 1991b

Cristian, F. (1991). Reaching agreement on processor group membership in synchronous distributed systems. Distributed Computing, Springer Verlag, Vol. 4, pp. 175-87.

Cristian and Fetzer 1994

Cristian, F. and Fetzer, C. (1994). Probabilistic Internal Clock Synchronization. In Proceedings 13th Symposium on Reliable Distributed Systems, IEEE Computer Society Press, October 25-27, pp. 22-31.

Crow et al. 1997

Crow, B., Widjaja, I., Kim, J. and Sakai, P. (1997). IEEE 802.11 Wireless local area networks. IEEE Communications Magazine, Sept. 1997, pp. 116-26.

North American Cryptography Archives.

Culler et al. 2001

Culler, D.E., Hill, J., Buonadonna, P., Szewczyk, R. and Woo, A. (2001). A Network-Centric Approach to Embedded Software for Tiny Devices. Proceedings of the First International Workshop on Embedded Software, Tahoe City, CA, USA, October, pp. 114-130.

Culler et al. 2004

Culler, D., Estrin, D. and Srivastava, M. (2004). Overview of Sensor Networks. IEEE Computer, Vol. 37, no. 8, August, pp. 41-49.

Curtin and Dolske 1998

Kurtin, M. and Dolski, J. (1998). A brute force search of DES Keyspace. ;login: - the Newsletter of the USENIX Association, May.

Custer 1998

Custer, H. (1998). Inside Windows NT, second edition. Microsoft Press.

Czerwinski et al. 1999

Czerwinski, S., Zhao, B., Hodes, T., Joseph, A. and Katz, R. (1999). An architecture for a secure discovery service. In Proceedings Fifth Annual International Conference on Mobile Computing and Networks.

Dabek et al. 2001

Dabek, F., Kaashoek, M.F., Karger, D., Morris, R. and Stoica, I. (2001). Wide-area cooperative storage with CFS. In Proc. of the ACM Symposium on Operating System Principles, October 2001.

Dabek et al. 2003

Dabek, F., Zhao, B., Druschel, P. and Kubiatowicz, J. (2003). Ion Stoica, Towards a Common API for Structured Peer-to-Peer Overlays, In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CA, February 2003.

Daemen and Rijmen 2000

Daemen, J. and Rijmen, V. (2000). The Block Cipher Rijndael, Smart Card Research and Applications, LNCS 1820, J.-J. Quisquater and B. Schneier, (eds). Springer-Verlag, 2000, pp. 288-296.

Daemen and Rijmen 2002

Daemen, J. and Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard, Springer-Verlag.

Dasgupta et al. 1991

Dasgupta, P., LeBlanc Jr, R.J., Ahamad, M. and Ramachandran, U. (1991). The Clouds distributed operating system. IEEE Computer, Vol. 24, No. 11, pp. 34-44.

Davidson 1984

Davidson, S.B. ( 1984 ). Optimism and consistency in partitioned database systems. ACM Transactions Database Systems, Vol. 9, No. 3, pp. 456-81.

Davidson et al. 1985

Davidson, S.B., Garcia-Molina, H. and Skeen, D. (1985). Consistency in partitioned networks. Computing Surveys, Vol. 17, No. 3, pp. 341-70.

Davies et al. 1998

Davies, N., Friday, A., Wade, S. and Blair, G. (1998). L2imbo: a distributed systems platform for mobile computing. Mobile Networks and Applications, Vol. 3, No. 2, August, pp. 143-156.

de Ipiña et al. 2002

de Ipiña, D.L., Mendonça, P. and Hopper, A. (2002). TRIP: a Low-Cost Vision-Based Location System for Ubiquitous Computing. Personal and Ubiquitous Computing, Vol. 6, No. 3, May, pp. 206-219.

Debaty and Caswell 2001

Debaty, P. and Caswell, D. (2001). Uniform Web Presence Architecture for People, Places, and Things. IEEE Personal Communications, Vol. 8, No. 4, August, pp. 6-11.

DEC 1990

Digital Equipment Corporation (1990). In Memoriam: J. C. R. Licklider 1915-1990, Technical Report 61, DEC Systems Research Center.

Delgrossi et al. 1993

Delgrossi, L., Halstrick, C., Hehmann, D., Herrtwich, R.G., Krone, O., Sandvoss, J. and Vogt, C. (1993). Media scaling for audiovisual communication with the Heidelberg transport system. ACM Multimedia ' 93, Anaheim, CA.

Demers et al. 1989

Demers, A., Keshav, S. and Shenker, S. (1989). Analysis and simulation of a fair queueing algorithm. ACM SIGCOMM ' 89.

Denning and Denning 1977

Denning, D. and Denning, P. (1977). Certification of programs for secure information flow. Comms. ACM, Vol. 20, No. 7, pp. 504-13.

Dertouzos 1974

Dertouzos, M.L. (1974). Control robotics - the procedural control of physical processes. IFIP Congress.

Dierks and Allen 1999

Dierks, T. and Allen, C. (1999). The TLS Protocol Version 1.0, Internet RFC 2246.

Diffie 1988

Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 560-77.

Diffie and Hellman 1976

Diffie, W. and Hellman, M.E. (1976). New directions in cryptography. IEEE Transactions Information Theory, Vol. IT-22, pp. 644-54.

Diffie and Landau 1998

Diffie, W. and Landau, S. (1998). Privacy on the Line. Cambridge, MA: MIT Press.

Dijkstra 1959

Dijkstra, E.W. (1959). A note on two problems in connection with graphs. Numerische Mathematic, Vol. 1, pp. 269-71.

Dingledine et al. 2000

Dingledine, R., Freedman, M.J. and Molnar, D. (2000). The Free Haven project: Distributed anonymous storage service. In Proc. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000.

Dolev and Malki 1996

Dolev, D. and Malki, D. (1996). The Transis approach to high availability cluster communication. Comms. ACM, Vol. 39, No. 4, pp. 64-70.

Dolev and Strong 1983

Dolev, D. and Strong, H. (1983). Authenticated algorithms for byzantine agreement. SIAM Journal of Computing, Vol. 12, No. 4, pp. 656-66.

Dolev et al. 1986

Dolev, D., Halpern, J., and Strong, H. (1986). On the possibility and impossibility of achieving clock synchronization. Journal of Computing Systems Science, 32, 2 (Apr.), pp. 230-50.

Dorcey 1995

Dorcey, T. (1995). CU-SeeMe Desktop Video Conferencing Software, Connexions, vol. 9, no. 3 (March).

Douceur and Bolosky 1999

Douceur, J.R. and Bolosky, W. (1999). Improving responsiveness of a stripe-scheduled media server. SPIE Proceedings, Vol. 3654. Multimedia Computing and Networking. pp. 192-203.

Douglis and Ousterhout 1991

Douglis, F. and Ousterhout, J. (1991). Transparent process migration: design alternatives and the Sprite implementation, Software - Practice and Experience, Vol. 21, No. 8, pp. 757-89.

Draves 1990

Draves, R. (1990). A revised IPC interface, In Proceedings USENIX Mach Workshop, pp. 101-21, October.

Draves et al. 1989

Draves, R.P., Jones, M.B. and Thompson, M.R. (1989). MIG - the Mach Interface Generator. Technical Report, Dept. of Computer Science, Carnegie-Mellon University.

Druschel and Peterson 1993

Druschel, P. and Peterson, L. (1993). Fbufs: a high-bandwidth cross-domain transfer facility. In Proceedings 14th ACM Symposium on Operating System Principles, pp. 189-202.

Druschel and Rowstron 2001

Druschel, P. and Rowstron, A. (2001). PAST: A large-scale, persistent peeer-to-peer storage utility. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HotOS-VIII). Schloss Elmau, Germany, May 2001.

Dubois et al. 1988

Dubois, M., Scheurich, C. and Briggs, F.A. (1988). Synchronization, coherence and event ordering in multiprocessors. IEEE Computer, Vol. 21, No. 2, pp. 9-21.

Dwork et al. 1988

Dwork, C., Lynch, N. and Stockmeyer, L. (1988). Consensus in the presence of partial synchrony. Journal of the ACM, Vol. 35, No. 2, pp. 288-323.

Eager et al. 1986

Eager, D., Lazowska, E. and Zahorjan, J. (1986). Adaptive load sharing in homogeneous distributed systems. IEEE Transactions on Software Engineering, Vol. SE-12, No. 5, pp. 662-675.

Edney and Arbaugh 2003

Edney, J. and Arbaugh, W. (2003). Real 802.11 Security: Wi-Fi Protected. Pearson Education.

Edwards and Grinter 2001

Edwards, W.K. and Grinter, R. (2001). At Home with Ubiquitous Computing: Seven Challenges. Proceedings Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, USA, Sep.-Oct., Springer-Verlag, pp. 256-272.

Edwards et al. 2002

Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F. and Izadi, S. (2002). Challenge: Recombinant Computing and the Speakeasy Approach. P roceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MobiCom 2002), Atlanta, GA. September, pp. 279-286.

EFF 1998

Electronic Frontier Foundation (1998). Cracking DES, Secrets of Encryption Research, Wiretap Politics & Chip Design. Sebastapol, CA: O'Reilly & Associates.

Egevang and Francis 1994

Egevang, K. and Francis, P. (1994), The IP Network Address Translator (NAT), Internet RFC 1631, May.

Eisler et al. 1997

Eisler, M., Chiu, A. and Ling, L. (1997). RPCSEC_GSS Protocol Specification. Sun Microsystems. Internet RFC 2203. September.

El Abbadi et al. 1985

El Abbadi, A., Skeen, D. and Cristian, C. (1985). An efficient fault-tolerant protocol for replicated data management. In 4th Annual ACM SIGACT/SIGMOD Symposium on Principles of Data Base Systems, Portland, OR.

Ellis et al. 1991

Ellis, C., Gibbs, S. and Rein, G. (1991). Groupware - some issues and experiences. Comms. ACM, Vol. 34, No. 1, pp. 38-58.

Ellison 1996

Ellison, C. (1996). Establishing identity without certification authorities. In 6th USENIX Security Symposium, San Jose, July 22-25.

Ellison et al. 1999

Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. and Ylonen, T. (1999). SPKI Certificate Theory. Internet RFC 2693, September.

Elrad et al. 2001

Elrad, T., Filman, R. and Bader A. (eds) (2001). Theme Section on Aspect-Oriented Programming, Comms. ACM, Vol. 44, No. 10.

Evans et al. 2003

Evans, C. and 15 other authors (2003). Web Services Reliability (WS-Reliability), Fujitsu, Hitachi, NEC, Oracle Corporation, Sonic Software, and Sun Microsystems. January.

Fall 2003

Fall, K. (2003). A delay-tolerant network architecture for challenged internets. Proceedings of the ACM 2003 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2003), Karlsruhe, Germany, August, pp. 27-34.

Farley 1998

Farley, J. (1998). Java Distributed Computing. Cambridge, MA: O'Reilly.

Farrow 2000

Farrow, R. (2000). Distributed denial of service attacks - how Amazon, Yahoo, eBay and others were brought down. Network Magazine, April.

Ferguson and Schneier 2003

Ferguson, N. and Schneier, B. (2003). Practical Cryptography, John Wiley & Sons.

Ferrari and Verma 1990

Ferrari, D. and Verma, D. (1990). A scheme for real-time channel establishment in wide-area networks, IEEE Journal on Selected Areas in Communications, Vol. 8, No. 4.

Ferreira et al. 2000

Ferreira, P., Shapiro, M., Blondel, X., Fambon, O., Garcia, J., Kloostermann, S., Richer, N., Roberts, M., Sandakly, F., Coulouris, G., Dollimore, J., Guedes, P., Hagimont, D. and Krakowiak, S. (2000). PerDiS: Design, Implementation, and Use of a PERsistent DIstributed Store. In LNCS 1752: Advances in Distributed Systems . Berlin, Heidelberg, New York: Springer-Verlag. pp. 427-53.

Ferris and Langworthy 2004

Ferris, C. and Langworthy, D. (eds), Bilorusets, R. and 22 other authors (2004). Web Services Reliable Messaging Protocol (WS-Reliable Messaging). BEA, IBM,Microsoft and TibCo. March.

Fidge 1991

Fidge, C. (1991). Logical Time in Distributed Computing Systems. IEEE Computer, Vol. 24, No. 8, pp. 28-33.

Fielding 2000

Fielding, R. (2000). Architectural Styles and the Design of Network-based Software Architectures, PhD. Dissertation.

Fielding et al. 1999

Fielding, R., Gettys, J., Mogul, J.C., Frystyk, H., Masinter, L. , Leach, P. and Berners-Lee, T. (1999). Hypertext Transfer Protocol - HTTP/1.1. Internet RFC 2616.

Fischer 1983

Fischer, M. (1983). The Consensus Problem in Unreliable Distributed Systems (a Brief Survey). In Karpinsky, M. (ed.), Foundations of Computation Theory, Vol. 158 of Lecture Notes in Computer Science, Springer-Verlag, pp. 127-140. Yale University Technical Report YALEU/DCS/TR-273.

Fischer and Lynch 1982

Fischer, M. and Lynch, N. (1982). A lower bound for the time to assure interactive consistency. Inf. Process. Letters, Vol. 14, No. 4, June, pp. 183-6.

Fischer and Michael 1982

Fischer, M.J. and Michael, A. (1982). Sacrificing Serializability to Attain High Availability of Data in an Unreliable Network. In Proceedings Symposium on Principles of Database Systems, ACM, pp. 70-5.

Fischer et al. 1985

Fischer, M., Lynch, N. and Paterson, M. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM, Vol. 32, No. 2, Apr., pp. 374-82.

Fitzgerald and Rashid 1986

Fitzgerald, R. and Rashid, R.F. (1986). The integration of virtual memory management and interprocess communication in Accent. ACM Transactions Computer Systems, Vol. 4, No. 2, pp. 147-77.

Flanagan 2002

Flanagan, D. (2002). Java in a Nutshell. 4th edn. Cambridge, England: O'Reilly.

Fleisch and Popek 1989

Fleisch, B. and Popek, G. (1989). Mirage: a coherent distributed shared memory design. In Proceedings 12th ACM Symposium on Operating System Principles, December, pp. 211-23.

Floyd 1986

Floyd, R. (1986). Short term file reference patterns in a UNIX environment. Technical Rep. TR 177, Rochester, NY: Dept of Computer Science, University of Rochester.

Floyd and Jacobson 1993

Floyd, S. and Jacobson, V. (1993). The Synchronization of Periodic Routing Messages. ACM Sigcomm '93 Symposium.

Floyd et al. 1997

Floyd, S., Jacobson, V., Liu, C., McCanne, S. and Zhang, L. (1997). A Reliable Multicast Framework for Lightweight Sessions and Application Level Framing. IEEE/ACM Transactions on Networking, Vol. 5, No. 6, pp. 784-803.

Fluhrer et al. 2001

Fluhrer, S., Mantin, I. and Shamir, A. (2001). Weaknesses in the Key Scheduling Algorithm of RC4, in Proceedings of the 8th annual workshop on Selected Areas of Cryptography (SAC), Toronto, Canada.

Ford and Fulkerson 1962

Ford, L.R. and Fulkerson, D.R. (1962). Flows in Networks. Princeton, NJ: Princeton University Press.

Foster and Kesselman 2004

Foster, I. and Kesselman, C. (eds) (2004). The Grid 2. San Francisco, CA: Morgan Kauffman.

Foster et al. 2001

Foster, I., Kesselman, C. and Tuecke, S. (2001). The Anatomy of the Grid: enabling scalable virtual organisations. Intl. J. Supercomputer Applications. Vol. 15, No. 3, pp. 200-222.

Foster et al. 2002

Foster, I., Kesselman, C., Nick, J. and Tuecke, S. (2002). Grid services for distributed systems integration. IEEE Computer, Vol. 35, No. 6, pp. 37-46.

Foster et al. 2004

Foster, I., Kesselman, C. and Tuecke, S. (2004). T he Open Grid Services Architecture. In Foster, I. and Kesselman, C. (eds), The Grid 2. San Francisco, CA: Morgan Kauffman.

Fox et al. 1997

Fox, A., Gribble, S., Chawathe, Y., Brewer, E. and Gauthier, P. (1997). Cluster-based scalable network services. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 78-91.

Fox et al. 1998

Fox, A., Gribble, S.D., Chawathe, Y. and Brewer, E.A. (1998). Adapting to Network and Client Variation Using Active Proxies: Lessons and Perspectives. IEEE Personal Communications, Vol. 5, No. 4, August, pp. 10-19.

Fox et al. 2003

Fox, D., Hightower, J., Liao, L., Schulz, D. and Borriello, G. (2003). Bayesian Filtering for Location Estimation. IEEE Pervasive Computing, Vol. 2, No. 3, July-September, pp. 24-33.

Freed and Borenstein 1996

Freed, N. and Borenstein, N. (1996). MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies. September. Internet RFC 1521.

Freenet 2004

The Free Network Project (2004).

FreePastry project 2004

FreePastry project (2004). Pastry: A substrate for peer-to-peer applications.

Garay and Moses 1993

Garay, J. and Moses, Y. (1993). Fully polynomial Byzantine agreement in t +1 rounds. In Proceedings 25th ACM symposium on theory of computing, ACM Press, pp. 31-41, May.

Garcia-Molina 1982

Garcia-Molina, H. (1982). Elections in Distributed Computer Systems. IEEE Transactions on Computers, Vol. C-31, No. 1, pp. 48-59.

Garcia-Molina and Spauster 1991

Garcia-Molina, H. and Spauster, A. (1991). Ordered and Reliable Multicast Communication. ACM Transactions Computer Systems, Vol. 9, No. 3, pp. 242-71.

Garfinkel 1994

Garfinkel, S. (1994). PGP: Pretty Good Privacy. O'Reilly.

Gehrke and Madden 2004

Gehrke, J. and Madden, S. (2004). Query processing in sensor networks. IEEE Pervasive Computing, Vol. 3, No. 1, Jan-Mar, pp. 46-55.

Gharachorloo et al. 1990

Gharachorloo, K., Lenoski, D., Laudon, J., Gibbons, P., Gupta, A. and Hennessy, J. (1990). Memory Consistency and Event Ordering in Scalable Shared-Memory Multiprocessors. In Proceedings 17th. Annual International Symposium on Computer Architecture, May, pp. 15-26.

Gibbs and Tsichritzis 1994

Gibbs, S.J. and Tsichritzis, D.C. (1994). Multimedia Programming. Addison-Wesley.

Gibson et al. 2004

Gibson, G., Courtial,J., Padgett, M.J., Vasnetsov,M., Pas'ko,V., Barnett, S.M. and Franke-Arnold,S. (2004). Free-space information transfer using light beams carrying orbital angular momentum. Optics Express, Vol. 12, No. 22, November, pp. 5448-5456.

Gifford 1979

Gifford, D.K. (1979). Weighted voting for replicated data. In Proceedings 7th Symposium on Operating Systems Principles, ACM, pp. 150-62.

Globus 2004

The Globus Alliance (2004). WS-Resource framework.

Gokhale and Schmidt 1996

Gokhale, A. and Schmidt, D. (1996). Measuring the Performance of Communication Middleware on High-Speed Networks. Proceedings of SIGCOMM '96, ACM, pp. 306-17.

Golding and Long 1993

Golding, R. and Long, D. (1993). Modeling replica divergence in a weak-consistency protocol for global-scale distributed databases. Technical report UCSC-CRL-93-09, Computer and Information Sciences Board, University of California, Santa Cruz.

Goldschlag et al. 1999

Goldschlag, D., Reed, M. and Syverson, P. (1999). Onion routing for anonymous and private internet connections. Communications of the ACM, Vol. 42, No. 2, pp. 39-41.

Golub et al. 1990

Golub, D., Dean, R., Forin, A. and Rashid, R. (1990). UNIX as an application program. Proc. USENIX Summer Conference, pp. 87-96.

Gong 1989

Gong, L. (1989). A Secure Identity-Based Capability System. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May, pp. 56-63.

Goodman 1989

Goodman, J. ( 1989 ). Cache Consistency and Sequential Consistency. Technical Report 61, SCI Committee.

Gordon 1984

Gordon, J. (1984). The Story of Alice and Bob.

Govindan and Anderson 1991

Govindan, R. and Anderson, D.P. (1991). Scheduling and IPC Mechanisms for Continuous Media. ACM Operating Systems Review, Vol. 25, No. 5, pp. 68-80.

Goyal and Carter 2004

Goyal, S. and Carter, J. (2004). A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices. Proceedings Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), December, pp. 186-195.

Graumann et al. 2003

Graumann, D., Lara, W., Hightower, J. and Borriello, G. (2003). Real-world implementation of the Location Stack: The Universal Location Framework. Proceedings of the 5th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2003), Monterey, CA, USA, October, pp. 122-128.

Gray 1978

Gray, J. (1978). Note s on database operating systems. In Operating Systems: an Advanced Course. Lecture Notes in Computer Science, Vol. 60, pp. 394-481, Springer-Verlag.

Gray and Szalay 2002

Gray, J. and Szalay, A. (2002). The World-Wide Telescope, an Archetype for Online Science. Technical Report. MSR-TR-2002-75. Microsoft Research.

Greenfield and Dornan 2004

Greenfield, D. and Dornan, A. (2004). Amazon: Web Site to Web Services, Network Magazine. October.

Grimm 2004

Grimm, R. (2004). Experiences with a pervasive computing architecture. IEEE Pervasive Computing, Vol. 3, No. 3, Jul.-Sep., pp. 22-30.

Gruteser and Grunwald 2003

Gruteser, M. and Grunwald, D. (2003). Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH '03), San Diego, CA, USA, September, pp. 46-55.

Guerraoui et al. 1998

Guerraoui, R., Felber, P., Garbinato, B. and Mazouni, K. (1998). System support for object groups. In Proceedings of the ACM Conference on Object Oriented Programming Systems, Languages and Applications (OOPSLA'98).

Gummadi et al. 2003

Gummadi, K.P., Gummadi, R., Gribble, S.D., Ratnasamy, S., Shenker, S. and Stoica, I. (2003). The impact of dht routing geometry on resilience and proximity. In ACM SIGCOMM 2003.

Gusella and Zatti 1989

Gusella, R. and Zatti, S. (1989). The accuracy of clock synchronization achieved by TEMPO in Berkeley UNIX 4.3BSD. IEEE Transactions Software Engineering, Vol. 15, pp. 847-53.

Guttman 1999

Guttman, E. (1999). Service Loocation Protocol: Automatic Discovery of IP Network Services. IEEE Internet Computing, Vol. 3, No. 4, pp. 71-80.

Haartsen et al. 1998

Haartsen, J., Naghshineh, M., Inouye, J., Joeressen, O.J. and Allen, W. (1998). Bluetooth: Vision, Goals, and Architecture, ACM Mobile Computing and Communications Review, Oct., vol. 2, no. 4, pp. 38-45.

Hadzilacos and Toueg 1994

Hadzilacos, V. and Toueg, S. (1994). A Modular Approach to Fault-tolerant Broadcasts and Related Problems, Technical report, Dept of Computer Science, University of Toronto.

Handley 1998

Handley, M. (1998). Session Directories and Scalable Internet Multicast Address Allocation. Proceedings of ACM SIGCOMM, September.

Handley et al. 1999

Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J. (1999). SIP: Session Initiation Protocol, Internet RFC 2543.

Harbison 1992

Harbison, S. P. (1992). Modula-3. Prentice Hall.

Härder 1984

Härder, T. ( 1984 ). Observations on Optimistic Concurrency Control Schemes. Information Systems, Vol. 9, No. 2, pp. 111-20.

Härder and Reuter 1983

Härder, T. and Reuter, A. (1983). Principles of Transaction-Oriented Database Recovery. Computing Surveys, Vol. 15, No. 4.

Harrenstien et al. 1985

Harrenstien, K., Stahl, M. and Feinler, E. (1985). DOD Internet Host Table Specification. Internet RFC 952.

Harter and Hopper 1994

Harter, A. and Hopper, A. (1994). A distributed location system for the active office. IEEE Network, Vol. 8, No. 1, January/February 1994, pp. 62-70.

Harter et al. 2002

Harter, A., Hopper, A., Steggles, P., Ward, A. and Webster, P. (2002). The Anatomy of a Context-Aware Application. Wireless Networks, Vol. 8, No. 2-3, Mar-May, pp. 187-197.

Härtig et al. 1997

Härtig, H., Hohmuth, M., Liedtke, J., Schönberg, S., and Wolter, J. (1997). The performance of kernel-based systems. In Proceedings 16th ACM Symposium on Operating System Principles, pp. 66-77.

Hartman and Ousterhout 1995

Hartman, J. and Ousterhout, J. (1995). The Zebra Striped Network File System. ACM Trans. on Computer Systems, Vol. 13 , No. 3, August, pp. 274-310.

Hauch and Reiser 2000

Hauch, R. and Reiser, H. (2000). Monitoring Quality of Service across Organisational Boundaries. In Trends in Distributed Systems: Towards a Universal Service Market. Proc. third Intl. IFIP/HGI Working conference, USM. September.

Hayton et al. 1998

Hayton, R., Bacon, J. and Moody, K. (1998). OASIS: Access Control in an Open, Distributed Environment. In Proceedings IEEE Symposium on Security and Privacy, Oakland, CA, pp. 3-14, May.

Hedrick 1988

Hedrick, R. (1988). Routing Information Protocol, Internet RFC 1058.

Heidemann et al. 2001

Heidemann, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D. and Ganesan, D. (2001). Building efficient wireless sensor networks with low-level naming. Proceedings of the 18th ACM Symposium on Operating Systems Principles, Banff, Alberta, Canada, October, pp. 146-159.

Henning 1998

Henning, M. (1998). Binding, Migration and Scalability in CORBA, Comms. ACM, October, Vol. 41, No. 10. pp. 62-71.

Henning and Vinoski 1999

Henning, M. and Vinoski, S. (1999). Advanced CORBA Programming with C++. Reading, MA: Addison-Wesley.

Herlihy 19 86

Herlihy, M. (19 86 ). A Quorum-Consensus Replication Method for Abstract Data Types. ACM Transactions Computer Systems, Vol. 4, No. 1, pp. 32-53.

Herlihy and Wing 1990

Herlihy, M. and Wing, J. (1990). On Linearizability: a correctness condition for concurrent objects. ACM Transactions on programming languages and systems, Vol. 12, No. 3, (July), pp. 463-92.

Herrtwich 1995

Herrtwich, R.G. (1995). Achieving Quality of Service for Multimedia Applications. ERSADS '95, European Research Seminar on Advanced Distributed Systems, l'Alpe d'Huez, France, April.

Hightower and Borriello 2001

Hightower, J. and Borriello, G. (2001). Location Systems for Ubiquitous Computing. IEEE Computer, Vol. 34, No. 8, August, pp. 57-66.

Hightower et al. 2002

Hightower, J., Brumitt, B. and Borriello, G. (2002). The Location Stack: A Layered Model for Location in Ubiquitous Computing. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Callicoon, NY, USA, June, pp. 22-28.

Hill et al. 2000

Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000). System architecture directions for networked sensors. Proceedings of the ninth ACM international conference on Architectural support for programming languages and operating systems (ASPLOS-IX), Cambridge, MA, USA, November, pp. 93-104.

Hirsch 1997

Hirsch, F.J. (1997). Introducing SSL and Certificates using SSLeay. World Wide Web Journal, Vol. 2, No. 3, Summer.

Holmquist et al. 2001

Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M. and Gellersen, H.-W. (2001). Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. Proceedings Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, USA, September 30-October 2, Springer-Verlag, pp. 116-122.

Housley 2002

Housley, R. (2002). Cryptographic Message Syntax (CMS) Algorithms. Internet RFC 3370.

Howard et al. 1988

Howard, J.H., Kazar, M.L., Menees, S.G, Nichols, D.A., Satyanarayanan, M., Sidebotham, R.N. and West, M.J. (1988). Scale and Performance in a Distributed File System. ACM Transactions Computer Systems, Vol. 6, No. 1, pp. 51-81.

Huang et al. 2000

Huang, A., Ling, B., Barton, J. and Fox, A. (2000). Running the Web backwards: appliance data services. Proceedings 9th international World Wide Web conference.

Huitema 1998

Huitema, C. (1998). IPv6 - the New Internet Protocol. Upper Saddle River, NJ: Prentice-Hall.

Huitema 2000

Huitema, C. (2000). Routing in the Internet, 2nd edn. Englewood Cliffs, NJ: Prentice-Hall.

Hull et al. 2004

Hull, R., Clayton, B. and Melamad, T. (2004). Rapid Authoring of Mediascapes. Proceedings Sixth International Conference on Ubiquitous Computing (Ubicomp 2004), Nottingham, England, September, Springer-Verlag, pp. 125-142.

Hunter and Crawford 1998

Hunter, J. and Crawford, W. (1998). Java Servlet Programming. O'Reilly.

Hutchinson and Peterson 1991

Hutchinson, N. and Peterson, L. (1991). The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering, Vol. 17, No. 1, pp. 64-76.

Hutchinson et al. 1989

Hutchinson, N.C., Peterson, L.L., Abbott, M.B. and O'Malley, S.W. (1989). RPC in the x-Kernel: Evaluating New Design Techniques. In Proc. 12th ACM Symposium on Operating System Principles, pp. 91-101.

Hutto and Ahamad 1990

Hutto, P. and Ahamad, M. (1990). Slow memory: weakening consistency to enhance concurrency in distributed shared memories. In Proceedings 10th International Conference on Distributed Computer Systems, IEEE, pp. 302-11.

Hyman et al. 1991

Hyman, J., Lazar, A.A. and Pacifici, G. (1991). MARS - The MAGNET-II Real-Time Scheduling Algorithm. ACM SlGCOM ' 91, Zurich.

IEEE 1985a

Institute of Electrical and Electronic Engineers (1985). Local Area Network - CSMA/CD Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.3, IEEE Computer Society.

IEEE 1985b

Institute of Electrical and Electronic Engineers (1985). Local Area Network - Token Bus Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.4, IEEE Computer Society.

IEEE 1985c

Institute of Electrical and Electronic Engineers (1985). Local Area Network - Token Ring Access Method and Physical Layer Specifications. American National Standard ANSI/IEEE 802.5, IEEE Computer Society.

IEEE 1990

Institute of Electrical and Electronic Engineers (1990). IEEE Standard 802: Overview and Architecture. American National Standard ANSI/IEEE 802, IEEE Computer Society.

IEEE 1994

Institute of Electrical and Electronic Engineers (1994). Local and metropolitan area networks - Part 6: Distributed Queue Dual Bus (DQDB) access method and physical layer specifications. American National Standard ANSI/IEEE 802.6, IEEE Computer Society.

IEEE 1999

Institute of Electrical and Electronic Engineers (1999). Local and metropolitan area networks - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, American National Standard ANSI/IEEE 802.11, IEEE Computer Society.

IEEE 2002

Institute of Electrical and Electronic Engineers (2002). Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs), American National Standard ANSI/IEEE 802.15.1, IEEE Computer Society.

IEEE 2003

Institute of Electrical and Electronic Engineers (2003). Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), American National Standard ANSI/IEEE 802.15.4, IEEE Computer Society.

IEEE 2004a

Institute of Electrical and Electronic Engineers (2004). IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Fixed Broadband Wireless Access Systems. American National Standard ANSI/IEEE 802.16, IEEE Computer Society.

IEEE 2004b

Institute of Electrical and Electronic Engineers (2004). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancement, American National Standard ANSI/IEEE 802.11i, IEEE Computer Society.

Iftode et al. 1996

Iftode, L., Singh, J. and Li, K. (1996). Scope consistency: a bridge between release consistency and entry consistenc y. In Proceedings 8th annual ACM symposium on Parallel algorithms and architectures. pp. 277-87.

Imielinski and Navas 1999

Imielinski, T. and Navas, J.C. (1999). GPS-based geographic addressing, routing, and resource discovery. Comms. ACM, Vol. 42, No. 4, pp. 86-92.

international pgp

The International PGP Home Page.

Internet World Stats 2004

Internet World Stats.

Ishii and Ullmer 1997

Ishii, H. and Ullmer, B., (1997). Tangible Bits: Towards Seamless Interfaces between People, Bits and Atoms. Proceedings of ACM Conference on Human Factors in Computing Systems (CHI '97), Atlanta, GA, USA, March, pp. 234-241.

ISO 1992

International Organization for Standardization (1992). Basic Reference Model of Open Distributed Processing, Part 1: Overview and guide to use. ISO/IEC JTC1/SC212/WG7 CD 10746-1, International Organization for Standardization.

ISO 8879

International Organization for Standardization (1986). Information Processing - Text and Office Systems - Standard Generalized Markup Language (SGML), 1986.

ITU/ISO 1997

ITU/ISO (1997). Recommendation X.500 (08/97): Open Systems Interconnection - The Directory: Overview of concepts, models and services. International Telecommunication Union.

Iyer et al. 2002

Iyer, S., Rowstron, A. and Druschel, P. (2002). Squirrel: A decentralized peer-to-peer web cache. In 12th ACM Symposium on Principles of Distributed Computing (PODC 2002), July. I

Sun Microsystems. Java Remote Method Invocation. II

Sun Microsystems. Java Object Serialization Specification. III

Sun Microsystems. Servlet Tutorial. IV

Jordan, M. and Atkinson, M. (1999). Orthogonal Persistence for the Java Platform - Draft Specification. Sun Microsystems Laboratories. Palo Alto, CA. V

Sun Microsystems, Java Security API. VI

Sun Microsystems (1999). JavaSpaces technology. VII

Sun Microsystems. The Java Web Services Tutorial. VIII

Sun Microsystems (2003). Java Data Objects (JDO). IX

Sun Microsystems. Java Remote Object Activation Tutorial.

Johanson and Fox 2004

Johanson, B. and Fox, A. (2004). Extending Tuplespaces For Coordination in Interactive Workspaces. Journal of Systems and Software, Vol. 69, No. 3, January, pp. 243-266.

Johnson and Zwaenepoel 1993

Johnson, D. and Zwaenepoel, W. (1993). The Peregrine High-performance RPC System. S oftware-Practice and Experience, Vol. 23, No. 2, pp. 201-21.

Jordan 1996

Jordan, M. (1996). Early Experiences with Persistent Java. In Proceedings first international workshop on persistrence and Java. Glasgow, Scotland.

Joseph et al. 1997

Joseph, A., Tauber, J. and Kaashoek, M. (1997). Mobile Computing with the Rover Toolkit. IEEE Transactions on Computers: Special issue on Mobile Computing, Vol. 46, No. 3, pp. 337-52.

Jul et al. 1988

Jul, E., Levy, H., Hutchinson, N. and Black, A. (1988). Fine-grained Mobility in the Emerald System. ACM Transactions Computer Systems, Vol. 6, No. 1, pp. 109-33.

Kaashoek and Tanenbaum 1991

Kaashoek, F. and Tanenbaum, A. (1991). Group Communication in the Amoeba Distributed Operating System. In Proceedings 11th International Conference on Distributed Computer Systems, pp. 222-30.

Kaashoek et al. 1989

Kaashoek, F., Tanenbaum, A., Flynn Hummel, S. and Bal, H. (1989). An Efficient Reliable Broadcast Protocol. Operating Systems Review, Vol. 23, No. 4, pp. 5-20.

Kaashoek et al. 1997

Kaashoek, M., Engler, D., Ganzer, G., Briceño, H., Hunt, R., Mazières, D., Pinckney, T., Grimm, R., Jannotti, J. and Mackenzie, K. (1997). Application performance and flexibility on exokernel systems. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 52-65.

Kahn 1967

Kahn, D. (1967). The Codebreakers: The Story of Secret Writing. New York: Macmillan.

Kahn 1983

Kahn, D. (1983). Kahn on Codes. New York: Macmillan.

Kahn 1991

Kahn, D. (1991). Seizing the Enigma. Boston: Houghton Mifflin.

Kaler 2002

Kaler, C. (ed.) (2002). Specification: Web Services Security (WS-Security).

Kaliski and Staddon 1998

Kaliski, B. and Staddon, J. (1998). RSA Cryptography Specifications, Version 2.0. Internet RFC 2437.

Kantor and Lapsley 1986

Kantor, B. and Lapsley, P. (1986). Net work News Transfer Protocol: A Proposed Standard for the Stream-Based Transmission of News, Internet RFC 977, February.

Kehne et al. 1992

Kehne, A., Schonwalder, J. and Langendorfer, H. (1992). A Nonce-based Protocol for Multiple Authentications. ACM Operating Systems Review, Vol. 26, No. 4, pp. 84-9.

Keith and Wittle 1993

Keith, B.E. and Wittle, M. (1993). LADDIS: The Next Generation in NFS File Server Benchmarking, Summer USENIX Conference Proceedings. USENIX Association, Berkeley, CA, June.

Keleher et al. 1992

Keleher, P., Cox, A. and Zwaenepoel, W. (1992). Lazy consistency for software distributed shared memory. In Proceedings 19th Annual International Symposium on Computer Architecture. pp. 13-21, May 1992.

Kessler and Livny 1989

Kessler, R.E. and Livny, M. (1989). An Analysis of Distributed Shared Memory Algorithms, In Proceedings 9th International Conference Distributed Computing Systems. IEEE, pp. 98-104.

Kiciman and Fox 2000

Kiciman, E. and Fox, A. (2000). Using Dynamic Mediation to Integrate COTS Entities in a Ubiquitous Computing Environment. Proceedings Second International Symposium on Handheld and Ubiquitous Computing (HUC2K), Bristol, England, September, pp. 211-226.

Kille 1992

Kille, S. (1992). Implementing X.400 and X.500: The PP and QUIPU Systems. Artech House.

Kindberg 1995

Kindberg, T. (1995). A Sequencing Service for Group Communication (abstract), In Proceedings 14th annual ACM Symposium on Principles of Distributed Computing, p. 260. Technical Report No. 698, Queen Mary and Westfield College Dept. of CS, 1995.

Kindberg 2002

Kindberg, T. (2002). Implementing Physical Hyperlinks Using Ubiquitous Identifier Resolution. Proceedings Eleventh International World Wide Web Conference (WWW2002), Honolulu, HI, USA, May pp. 191-199.

Kindberg and Barton 2001

Kindberg, T. and Barton, J. (2001). A Web-Based Nomadic Computing System. Computer Networks, Vol. 35, No. 4, pp. 443-456.

Kindberg and Fox 2001

Kindberg, T. and Fox, A. (2001). System Software for Ubiquitous Computing. IEEE Pervasive Computing, Vol. 1, No. 1, Jan.-Mar., pp. 70-81.

Kindberg and Zhang 2003a

Kindberg, T. and Zhang, K. (2003). Secure Spontaneous Device Association. Proceedings Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, USA, October, pp. 124-131.

Kindberg and Zhang 2003b

Kindberg, T. and Zhang, K. (2003). Validating and Securing Spontaneous Associations between Wireless Devices. Proceedings 6th Information Security Conference (ISC'03), Bristol, England, October, Springer-Verlag, pp. 44-53.

Kindberg et al. 1996

Kindberg, T., Coulouris, G., Dollimore, J. and Heikkinen, J. (1996). Sharing objects over the Internet: the Mushroom approach. In Proceedings IEEE Global Internet 1996, London, Nov., pp. 67-71.

Kindberg et al. 2002a

Kindberg, T., Barton, J., Morgan, J., Becker, G., Bedner, I., Caswell, D., Debaty, P., Gopal, G., Frid, M., Krishnan, V., Morris, H., Pering, C., Schettino, J. and Serra, B. (2002). People, Places, Things: Web Presence for the Real World. Mobile Networks and Applications (MONET), Vol. 7, No. 5, October, pp. 365-376.

Kindberg et al. 2002b

Kindberg, T., Zhang, K. and Shanka, N. (2002). Context Authentication Using Constrained Channels. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Callicoon, NY, USA, June, pp. 14-21.

Kistler and Satyanarayanan 1992

Kistler, J.J. and Satyanarayanan, M. (1992). Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, Vol. 10, No. 1, pp. 3-25.

Kleinrock 1961

Kleinrock, L. (1961). Information Flow in Large Communication Networks, MIT, RLE Quarterly Progress Report, July.

Kleinrock 1997

Kleinrock, L. (1997). Nomadicity: anytime, anywhere in a disconnected world. Mobile Networks and Applications, Vol. 1, No. 4, pp. 351-7.

Kohl and Neuman 1993

Kohl, J. and Neuman, C. (1993). The Kerberos Network Authentication Service (V5), Internet RFC 1510, September.

Konstantas et al. 1997

Konstantas, D., Orlarey, Y., Gibbs, S. and Carbonel, O. (1997). Distributed Music Rehearsal. In Proceedings International Computer Music Conference 97.

Kopetz and Verissimo 1993

Kopetz, H. and Verissimo, P. (1993). Real Time and Dependability Concepts. In Mullender (ed.), Distributed Systems, 2nd edn. Addison-Wesley.

Kopetz et al. 1989

Kopetz, H., Damm, A., Koza, C., Mulazzani, M., Schwabl, W. Senft, C. and Zainlinger, R. (1989). Distributed Fault-Tolerant Real-Time Systems - The MARS Approach. IEEE Micro, Vol. 9, No. 1.

Krawczyk et al. 1997

Krawczyk, H., Bellare, M. and Canetti, R. (1997). HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104.

Krumm et al. 2000

Krumm, J., Harris, S., Meyers, B., Brumitt , B., Hale, M. and Shafer, S. (2000). Multi-Camera Multi-Person Tracking for EasyLiving. Proceedings of the Third IEEE International Workshop on Visual Surveillance (VS'2000), Dublin, Ireland, July, pp. 3-10.

Kshemkalyani and Singhal 1991

Kshemkalyani, A. and Singhal, M. (1991). Invariant-Based Verification of a Distributed Deadlock Detection Algorithm. IEEE Transactions on Software Engineering , Vol. 17, No. 8. August.

Kshemkalyani and Singhal 1994

Kshemkalyani, A. and Singhal, M. (1994). On Characterisation and Corrrectness of Distributed Deadlock detection, Journal of Parallel and Distributed Computing, Vol. 22, pp. 44-59.

Kubiatowicz 2003

Kubiatowicz, J. (2003). Extracting Guarantees from Chaos, Communications of the ACM, pp. 33-38, vol. 46, No. 2, February.

Kubiatowicz et al. 2000

Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C. and Zhao, B. (2000). OceanStore: an architecture for global-scale persistent storage. In ASPLOS 2000, pp. 190-201, November.

Kung and Robinson 1981

Kung, H.T. and Robinson, J.T. (1981). Optimistic methods for concurrency control. ACM Transactions on Database Systems, Vol. 6, No. 2, pp. 213-26.

Kurose and Ross 2000

Kurose, J.F. and Ross, K.W. (2000). Computer Networking: A Top-Down Approach Featuring the Internet. Addison Wesley Longman.

Ladin et al. 1992

Ladin, R., Liskov, B., Shrira, L. and Ghemawat, S. (1992). Providing Availability Using Lazy Replication. ACM Transactions on Computer Systems, Vol. 10, No. 4, pp. 360-91.

Lai 1992

Lai, X. (1992). On the Design and Security of Block Ciphers, ETH Series in Information Processing, Vol. 1, Konstanz: Hartung-Gorre Verlag.

Lai and Massey 1990

Lai, X. and Massey, J. (1990). A proposal for a new Block Encryption Standard. Advances in Cryptology-Eurocrypt '90. In Proceedings, Springer-Verlag, pp. 389-404.

Lamport 1978

Lamport, L. (1978). Time, clocks and the ordering of events in a distributed system. Comms. ACM, Vol. 21, No. 7, pp. 558-65.

Lamport 1979

Lamport, L. (1979). How to Make a Multiprocessor Computer that Correctly Executes Multiprocess Programs. IEEE Transactions Computers, Vol. C-28, No. 9, pp. 690-1.

Lamport 1986

Lamport, L. (1986). On interprocess communication, parts I and II. Distributed Computing, Vol. 1, No. 2, pp. 77-101.

Lamport 1989

Lamport, L. (1989). The part-time parliament. Technical Report 49, DEC SRC, Palo Alto. (Also in ACM Transactions on Computer Systems, vol. 16, no. 2, pp. 133-169, 1998.)

Lamport 1998

Lamport, L. (1998). The part-time parliament. ACM Transactions on Computer Systems (TOCS), Vol. 16, No. 2, May, pp. 133-69.

Lamport et al. 1982

Lamport, L., Shostak, R. and Pease, M. (1982). Byzantine Generals Problem. ACM Transactions Programming Languages and Systems, Vol. 4, No. 3, pp. 382-401.

Lampson 1971

Lampson, B. (1971). Protection. In Proceedings 5th Princeton Conference on Information Sciences and Systems, Princeton, p. 437. Reprinted in ACM Operating Systems Review. Vol. 8, No. 1, January, p. 18.

Lampson 1981

Lampson, B.W. (1981). Atomic Transactions. In Distributed systems: Architecture and Implementation. Lecture Notes in Computer Science 105, pp. 254-9. Berlin: Springer-Verlag.

Lampson 1986

Lampson, B.W. (1986). Designing a Global Name Service. In Proceedings 5th ACM Symposium Principles of Distributed Computing, pp. 1-10, August.

Lampson et al. 1992

Lampson, B.W., Abadi, M., Burrows, M. and Wobber, E. (1992). Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems, Vol. 10, No. 4, pp. 265-310.

Langheinrich 2001

Langheinrich, M. (2001). Privacy by design - principles of privacy-aware ubiquitous systems. Proceedings Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, USA, Sep.-Oct., Springer-Verlag, pp. 273-291.

Langworthy 2004

Langworthy, D. (ed.) (2004) Web Services Coordination (WS-Coordination), IBM, Microsoft, BEA. November.

Lea et al. 1993

Lea, R., Jacquemot, C. and Pillevesse, E. (1993). COOL: system support for distributed programming. Comms. ACM, Vol. 36, No. 9, pp. 37-46.

Leach et al. 1983

Leach, P.J., Levine, P.H., Douros, B.P., Hamilton, J.A., Nelson, D.L. and Stumpf, B.L. (1983). The architecture of an integrated local network. IEEE J. Selected Areas in Communications, Vol. SAC-1, No. 5, pp. 842-56.

Lee and Thekkath 1996

Lee, E.K. and Thekkath, C.A. (1996). Petal: Distributed Virtual Disks, In Proc. 7th Intl. Conf. on Architectural Support for Prog. Langs. and Operating Systems, October, pp. 84-96.

Lee et al. 1996

Lee, C., Rajkumar, R. and Mercer, C. (1996). Experiences with Processor Reservation and Dynamic QOS in Real-Time Mach. In Proceedings Multimedia Japan '96.

Leffler et al. 1989

Leffler, S., McKusick, M., Karels, M. and Quartermain, J. (1989). The Design and Implementation of the 4.3 BSD UNIX Operating System. Reading, MA: Addison-Wesley.

Leibowitz et al. 2003

Leibowitz, N., Ripeanu, M. and Wierzbicki, A. (2003). Deconstructing the Kazaa Network. in 3rd IEEE Workshop on Internet Applications (WIAPP'03). Santa Clara, CA.

Leiner 1997

Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G. and Wolff, S. (1997). A Brief History of the Internet, Comms. ACM, Vol. 40, No. 1, Feb., pp. 102-108.

Leland et al. 1993

Leland, W.E., Taqqu, M.S., Willinger, W. and Wilson, D.V. (1993). On the Self-Similar Nature of Ethernet Traffic. ACM SIGCOMM ' 93, San Francisco.

Lenoski et al. 1992

Lenoski, D., Laudon, J., Gharachorloo, K., Weber, W.D., Gupta, A., Hennessy, J., Horowitz, M. and Lam, M.S. (1992). The Stanford Dash multiprocessor, IEEE Computer, Vol. 25, No. 3, pp. 63-79.

Leslie et al. 1996

Leslie, I., McAuley, D., Black, R., Roscoe, T., Barham, P., Evers, D., Fairbairns, R. and Hyden, E. (1996). The design and implementation of an operating system to support distributed multimedia applications, ACM Journal of Selected Areas in Communication, Vol. 14, No. 7, pp. 1280-97.

Li and Hudak 1989

Li, K. and Hudak, P. (1989). Memory Coherence in Shared Virtual Memory Systems. ACM Transactions on Computer Systems, Vol. 7, No. 4, pp. 321-59.

Liedtke 1996

Liedtke, J. (1996). Towards real microkernels, Comms. ACM, Vol. 39, No. 9, pp. 70-7.

Linux AFS

The Linux AFS FAQ.

Lipton and Sandberg 1988

Lipton, R. and Sandberg, J. (1988). PRAM: A scalable shared memory. Technical Report CS-TR-180-88, Princeton University.

Liskov 1988

Liskov, B. (1988). Distributed programming in Argus. Comms. ACM , Vol. 31, No. 3, pp. 300-12.

Liskov 1993

Liskov, B. (1993). Practical uses of synchronized clocks in distributed systems, Distributed Computing, Vol. 6, No. 4, pp. 211-19.

Liskov and Scheifler 1982

Liskov, B. and Scheifler, R.W. (1982). Guardians and actions: linguistic support for robust, distributed programs. ACM Transactions Programming Languages and Systems, Vol. 5, No. 3, pp. 381-404.

Liskov and Shrira 1988

Liskov, B. and Shrira, L. (1988). Promises: Linguistic Support for Efficient Asynchronous Procedure Calls in Distributed Systems. In Proceedings SIGPLAN '88 Conference Programming Language Design and Implementation. Atlanta.

Liskov et al. 1991

Liskov, B., Ghemawat, S., Gruber, R., Johnson, P., Shrira, L., Williams, M. (1991). Replication in the Harp File System. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 226-38.

Liu and Albitz 1998

Liu, C. and Albitz, P. (1998). DNS and BIND, third edition. O'Reilly.

Liu and Layland 1973

Liu, C.L. and Layland, J.W. (1973). Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM, Vol. 20, No. 1.

Loepere 1991

Loepere, K. (1991). Mach 3 Kernel Principles. Open Software Foundation and Carnegie-Mellon University.

Lundelius and Lynch 1984

Lundelius, J. and Lynch, N. (1984). An Upper and Lower Bound for Clock Synchronization. Information and Control 62, 2/3 (Aug./Sep.), pp. 190-204.

Lynch 1996

Lynch, N. (1996). Distributed Algorithms. Morgan Kaufmann.

Ma 1992

Ma, C. (1992). Designing a Universal Name Service. Technical Report 270, University of Cambridge.

Macklem 1994

Macklem, R. (1994). Not Quite NFS: Soft Cache Consistency for NFS. Proceedings of the Winter '94 USENIX Conference, San Francisco, CA, January, pp. 261-278.

Madhavapeddy et al. 2003

Madhavapeddy, A., Scott, D., Sharp, R. (2003). Context-aware computing with sound. Proceedings Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, USA, October, pp. 315-332.

 Maekawa 1985

Maekawa, M. (1985). A Algorithm for Mutual Exclusion in Decentralized Systems. ACM Transactions on Computer System s, Vol. 3, No. 2, pp. 145-159.

Maffeis 1995

Maffeis, S. (1995). Adding group communication and fault tolerance to CORBA. In Proceedings of the 1995 USENIX conference on object-oriented technologies. Monterey, CA, USA. pp. 135-146.

Malkin 1993

Malkin, G. (1993). RIP Version 2 - Carrying Additional Information, Internet RFC 1388.

Marsh et al. 1991

Marsh, B., Scott, M., LeBlanc, T. and Markatos, E. (1991). First-class User-level Threads. In Proceedings 13th ACM Symposium on Operating System Principles, pp. 110-21.

Martin et al. 2004

Martin, T., Hsiao, M., Ha, D. and Krishnaswami, J. (2004). Denial-of-Service Attacks on Battery-powered Mobile Computers. Proceedings 2nd IEEE Pervasive Computing Conference, Orlando, FL, USA, March, pp. 309-318.

Marzullo and Neiger 1991

Marzullo, K., and Neiger, G. (1991). Detection of global state predicates, In Toug, S., Spirakis, P. and Kirousis, L. (eds), Proceedings 5th International Workshop on Distributed Algorithms. Springer-Verlag, pp. 254-72.

Mattern 1989

Mattern, F. (1989). Virtual Time and Global States in Distributed Systems. In Cosnard, M. et al. (eds), Proceedings Workshop on Parallel and Distributed Algorithm s. Amsterdam: North-Holland, pp. 215-26.

Maymounkov and Mazieres 2002

Maymounkov, P. and Mazieres, D. (2002). Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of IPTPS02, Cambridge, USA, March.


BIBs: Introduction to the Multicast Backbone.

McGraw and Felden 1999

McGraw, G. and Felden, E. (1999). Securing Java. John Wiley & Sons.

Melliar-Smith et al. 1990

Melliar-Smith, P., Moser, L. and Agrawala, V. (1990). Broadcast Protocols for Distributed Systems. IEEE Transactions on Parallel and Distributed Systems, Vol. 1, No. 1, pp. 17-25.

Menezes 1993

Menezes, A. (1993). Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers.

Menezes et al. 1997

Menezes, A., van Oorschot, O. and Vanstone, S. (1997). Handbook of Applied Cryptography. CRC Press.

Metcalfe and Boggs 1976

Metcalfe, R.M. and Boggs, D.R. (1976). Ethernet: distributed packet switching for local computer networks. Comms. ACM, Vol. 19, pp. 395-403.

Milanovic et al. 2004

Milanovic, N., Malek, M., Davidson, A. and Milutinovic, V. (2004). Routing and Security in Mobile Ad Hoc Networks. IEEE Computer, Vol. 37, No. 2, February, pp. 69-73.

Mills 1995

Mills, D. (1995). Improved Algorithms for Synchronizing Computer Network Clocks, IEEE Transactions Networks, June, pp. 245-54.

Milojicic et al. 1999

Milojicic, J., Douglis, F. and Wheeler, R. (1999). Mobility, Processes, Computers and Agents. Reading: Addison-Wesley.

Minnich and Farber 1989

Minnich, R. and Farber, D. (1989). The Mether System: a Distributed Shared Memory for SunOS 4.0. In Proceedings Summer 1989 Usenix Conference.

Mitchell and Dion 1982

Mitchell, J.G. and Dion, J. (1982). A comparison of two network-based file servers. Comms. ACM, Vol. 25, No. 4, pp. 233-45.

Mitchell et al. 1992

Mitchell, C.J., Piper, F. and Wild, P. (1992). Digital Signatures. In Simmons, G.J. (ed.), Contemporary Cryptology. New York: IEEE Press.

Mockapetris 1987

Mockapetris, P. (1987). Domain names - concepts and facilities. Internet RFC 1034. November.

Mogul 1994

Mogul, J.D. (1994). Recovery in Spritely NFS, Computing Systems, Vol. 7, No. 2.

Mok 1985

Mok, A.K. (1985). SARTOR - A Design Environment for Real-Time Systems. Ninth IEEE COMP-SAC.

Morin 1997

Morin, R. (ed.) (1997). MkLinux: Microkernel Linux for the Power Macintosh. Prime Time Freeware.

Morris et al. 1986

Morris, J., Satyanarayanan, M., Conner, M.H., Howard, J.H., Rosenthal, D.S. and Smith, F.D. (1986). Andrew: a distributed personal computing environment. Comms. ACM, Vol. 29, No. 3, pp. 184-201.

Mosberger 1993

Mosberger, D. (1993). Memory Consistency Models. Technical Report 93/1 1, University of Arizona.

Moser et al. 1994

Moser, L., Amir, Y., Melliar-Smith, P. and Agarwal, D. (1994). Extended Virtual Synchrony. In Proceedings 14th International Conference on Distributed Computing Systems, IEEE Computer Society Press, pp. 56-65.

Moser et al. 1996

Moser, L., Melliar-Smith, P., Agarwal, D., Budhia, R., and Lingley-Papadopoulos, C. (1996). Totem: a Fault-Tolerant Multicast Group Communication System. Comms. ACM, Vol. 39, No. 4, pp. 54-63.

Moser et al. 1998

Moser, L., Melliar-Smith, P. and Narasimhan, P. (1998). Consistent object replication in the Eternal system. Theory and practice of object systems, Vol. 4, No. 2.

Moss 1985

Moss, E. (1985). Nested Transactions, An Approach to Reliable Distributed Computing. MIT Press.

Multimedia Directory 2005

Multimedia Directory (2005). Scala Inc.

Murphy et al. 2001

Murphy, A.L., Picco, G.P. and Roman, G.-C. (2001). Lime: A Middleware for Physical and Logical Mobility. Proceedings 21st International Conference on Distributed Computing Systems (ICDCS-21), Phoenix, AZ, USA, April, pp. 524-233.

Muthitacharoen et al. 2002

Muthitacharoen, A., Morris, R., Gil, T.M. and Chen, B. (2002). Ivy: A Read/Write Peer-to-peer File System. In Fifth Symposium on Operating Systems Design and Implementation (OSDI). Boston, MA. December.

Myers and Liskov 1997

Myers, A.C. and Liskov, B. (1997). A Decentralized Model for Information Flow Control, ACM Operating Systems Review, Vol. 31, No. 5, pp. 129-42, December.

Nagle 1984

Nagle, J. (1984). Congestion Control in TCP/IP Internetworks, Computer Communications Review, Vol. 14, pp. 11-17, October.

Nagle 1987

Nagle, J. (1987). On Packet Switches with Infinite Storage. IEEE Transactions on Communications, Vol. 35, No. 4.

National Bureau of Standards 1977

National Bureau of Standards (1977). Data Encryption Standard (DES). Federal Information Processing Standards No. 46, Washington DC: US National Bureau of Standards.

National Biomedical Computation Resource, University of California, San Diego.

Needham 1993

Needham, R. (1993). Names. In Mullender, S. (ed.), Distributed Systems, an Advanced Course, 2nd edn. Wokingham, England: ACM Press/Addison-Wesley. pp. 315-26.

Needham and Schroeder 1978

Needham, R.M. and Schroeder, M.D. (1978). Using encryption for authentication in large networks of computers. Comms. ACM, Vol. 21, pp. 993-9.

Nelson et al. 1988

Nelson, M.N., Welch, B.B. and Ousterhout, J.K. (1988). Caching in the Sprite Network File System, ACM Transactions on Computer Systems, Vol. 6, No. 1, pp. 134-154.

Netscape 1996

Netscape Corporation (1996). SSL 3.0 Specification.

Neuman et al. 1999

Neuman, B.C., Tung, B. and Wray, J. (1999). Public Key Cryptography for Initial Authentication in Kerberos, Internet Draft ietf-cat-kerberos-pk-init-09, July.

Neumann and Ts'o 1994

Neuman, B.C. and Ts'o, T. (1994). Kerberos: An Authentication Service for Computer Networks, IEEE Communications, vol. 32, no. 9, pp. 33-38. Sept.

Newcomer 2002

Newcomer, E. (2002). Understanding Web Services XML, WSDL, SOAP and UDDI. Boston: Pearson.

Nielsen and Thatte 2001

Nielsen, H.F. and Thatte, S. (2001). Web Services Routing Protocol (WS-Routing). Microsoft Corporation. October.

Nielson et al. 1997

Nielsen, H., Gettys, J., Baird-Smith, A., Prud'hommeaux, E., Lie, H. and Lilley, C. (1997). Network Performance Effects of HTTP/1.1, CSS1, and PNG. Proceedings SIGCOMM '97.

NIST 1994

National Institute for Standards and Technology (1994). Digital Signature Standard, NIST FIPS 186. US Department of Commerce.

NIST 1999

National Institute for Standards and Technology (1999). AES - a Crypto Algorithm for the Twenty-first Century, US Department of Commerce.

NIST 2002

National Institute for Standards and Technology (2002). Secure Hash Standard. NIST FIPS 180-2 + Change Notice to include SHA-224, US Department of Commerce.

NIST 2004

National Institute for Standards and Technology (2004). NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1, US Department of Commerce, August.

Noble and Satyanarayanan 1999

Noble, B. and Satyanarayanan, M. (1999). Experience with Adaptive Mobile Applications in Odyssey. Mobile Networks and Applications, Vol. 4 , No. 4, December, pp. 245-254.

The Berkeley NOW project home page.

Oaks and Wong 1999

Oaks, S. and Wong, H. (1999). Jave Threads, 2nd edn., O'Reilly.

Ohkubo et al. 2003

Ohkubo, M., Suzuki, K. and Kinoshita, S. (2003). Cryptographic approach to `privacy-friendly' tags. Proceedings RFID Privacy Workshop, MIT, USA.

Olson and Ogbuji 2002

Olson, M. and Ogbuji, U. (2002) Choose the best tool for the task at hand.

OMG 2000a

Object Management Group (2000). Trading Object Service Specification,Vn. 1.0. Needham, MA: OMG.

OMG 2000b

Object Management Group (2000). Concurrency Control Service Specification, Needham, MA: OMG.

OMG 2002a

Object Management Group (2002). The CORBA IDL Specification. Needham, MA: OMG.

OMG 2002b

Object Management Group (2002). CORBA Security Service Specification Vn. 1.8. Needham, MA: OMG.

OMG 2002c

Object Management Group (2002). Value Type Semantics. Needham, MA: OMG.

OMG 2002d

Object Management Group (2002). Life Cycle Service, Vn. 1.2. Needham, MA: OMG.

OMG 2002e

Object Management Group (2002). Persistent State Service, Vn. 2.0. Needham, MA: OMG.

OMG 2003

Object Management Group, (2003). Object Transaction Service Specification. Version 1.4. Needham, MA: OMG.

OMG 2004a

Object Management Group (2004). CORBA/IIOP 3.0.3 Specification. Needham, MA: OMG.

OMG 2004b

Object Management Group (2004). Naming Service Specification. Needham, MA: OMG.

OMG 2004c

Object Management Group (2004). Event Service Specification . Vn. 1.2. Needham, MA: OMG.

OMG 2004d

Object Management Group (2004). Notification service Specification. Vn. 1.1. Needham, MA: OMG. Technical report telecom/98-06-15.

OMG 2004e

Object Management Group (2004). CORBA Messaging. Needham, MA: OMG.

Omidyar and Aldridge 1993

Omidyar, C.G. and Aldridge, A. (1993). Introduction to SDH/SONET. IEEE Communications Magazine, Vol. 31, pp. 30-3, Sept.

OpenNap 2001

OpenNap: Open Source Napster Server, Beta release 0.44, September 2001.

Oppen and Dalal 1983

Oppen, D.C. and Dalal Y.K. (1983). The Clearinghouse: a decentralized agent for locating named objects in a distributed environmen t. ACM Trans. on Office Systems, Vol. 1, pp. 230-53.

Oram 2001

Oram, A. (2001). Peer-to-Peer: Harnessing the Benefits of Disruptive Technologies, O'Reilly, Sebastapol, CA.

Orfali et al. 1996

Orfali, R., Harkey, D. and Edwards, J. (1996). The Essential Distributed Objects Survival Guide. New York: Wiley.

Orfali et al. 1997

Orfali, R., Harkey, D., and Edwards, J. (1997) Instant CORBA. New York: Wiley.

Organick 1972

Organick, E.I. (1972). The MULTICS System: An Examination of its Structure. Cambridge, MA: MIT Press.

Orman et al. 1993

Orman, H., Menze, E., O'Malley, S. and Peterson, L. (1993). A fast and general implementation of Mach IPC in a Network. In Proceedings Third USENIX Mach Conference, April.

OSF 1997

Introduction to OSF DCE. The Open Group.

Ousterhout et al. 1985

Ousterhout, J., Da Costa, H., Harrison, D., Kunze, J., Kupfer, M. and Thompson, J. (1985). A Trace-driven analysis of the UNIX 4.2 BSD file system. In 10th ACM Symposium Operating System Principles.

Ousterhout et al. 1988

Ousterhout, J., Cherenson, A., Douglis, F., Nelson, M. and Welch, B. (1988). The Sprite Network Operating System. IEEE Computer, Vol. 21, No. 2, pp. 23-36.

Parker 1992

Parker, B. (1992). The PPP AppleTalk Control Protocol (ATCP). Internet RFC 1378.

Parrington et al. 1995

Parrington, G.D., Shrivastava, S.K., Wheater, S.M. and Little, M.C. (1995). The Design and Implementation of Arjuna, USENIX Computing Systems Journal, Vol. 8, No. 3.

Partridge 1992

Partridge, C. (1992). A Proposed Flow Specificatio n. Internet RFC 1363.

Patel and Abowd 2003

Patel, S.N. and Abowd, G.D. (2003). A 2-way Laser-assisted Selection Scheme for Handhelds in a Physical Environment. Proceedings Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, USA, October, pp. 200-207.

Patterson et al. 1988

Patterson, D., Gibson, G. and Katz, R. (1988). A Case for Redundant Arrays of Interactive Disks, ACM International Conf. on Management of Data (SIGMOD), pp. 109-116, May.

Pease et al. 1980

Pease, M., Shostak, R. and Lamport, L. (1980). Reaching agreement in the presence of faults. Journal of the ACM, Vol. 27, No. 2, April, pp. 228-34.

Pedone and Schiper 1999

Pedone, F. and Schiper, A. (1999). Generic Broadcast. In Proceedings of the 13th International Symposium on Distributed Computing (DISC '99), September.

Perrig et al. 2002

Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, D. (2002). SPINS: Security Protocols for Sensor Networks. Wireless Networks, Vol. 8, No. 5, September, pp. 521-534.

Petersen et al. 1997

Petersen, K., Spreitzer, M., Terry, D., Theimer, M. and Demers, A. (1997). Flexible update propagation for weakly consistent replication. Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 288-301.

Peterson 1988

Peterson, L. (1988). The Profile Naming Service. ACM Transactions Computer Systems, Vol. 6, No. 4, pp. 341-64.

Peterson et al. 1989

Peterson, L.L., Buchholz, N.C. and Schlichting, R.D. (1989). Preserving and Using Context Information in Interprocess Communication. ACM Transactions on Computer Systems, Vol. 7, No. 3, pp. 217-46.

Pike et al. 1993

Pike, R., Presotto, D., Thompson, K., Trickey, H. and Winterbottom, P. (1993). The Use of Name Spaces in Plan 9. Operating Systems Review, Vol. 27, No. 2, April 1993, pp. 72-76.

Plaxton et al. 1997

Plaxton, C.G., Rajaraman, R. and Richa, A.W. (1997). Accessing nearby copies of replicated objects in a distributed environment. ACM Symposium on Parallel Algorithms and Architectures, pp. 311-320.

Ponnekanti and Fox 2004

Ponnekanti, S. and Fox, A. (2004). Interoperability among Independently Evolving Web Services. Proceedings ACM/Usenix/IFIP 5th International Middleware Conference, Toronto, Canada, September.

Ponnekanti et al. 2001

Ponnekanti, S.R., Lee, B., Fox, A., Hanrahan, P. and Winograd, T. (2001). ICrafter: A Service Framework for Ubiquitous Computing Environments. Proceedings Third International Conference on Ubiquitous Computing (Ubicomp 2001), Atlanta, GA, USA, Sep.-Oct., Springer-Verlag, pp. 56-75.

Popek and Walker 1985

Popek, G. and Walker, B. (eds) (1985). The LOCUS Distributed System Architecture. Cambridge, MA: MIT Press.

Postel 1981a

Postel, J. (1981). Internet Protocol. Internet RFC 791.

Postel 1981b

Postel, J. (1981). Transmission Control Protocol. Internet RFC 793.

Pottie and Kaiser 2000

Pottie, G.J. and Kaiser, W.J. (2000). Embedding the internet: wireless integrated network sensors. Comms. ACM, Vol. 43, No. 5, May, pp. 51-58.

Powell 1991

Powell, D. (ed.) (1991). Delta-4: a Generic Architecture for Dependable Distributed Computing. Berlin and New York: Springer-Verlag.

Pradhan and Chiueh 1998

Pradhan, P. and Chiueh, T. (1998). Real-Time Performance Guarantees over Wired and Wireless LANS, in IEEE Conference on Real-Time Applications and Systems, RTAS'98, June.

Preneel et al. 1998

Preneel, B., Rijmen, V. and Bosselaers, A. (1998). Recent developments in the design of conventional cryptographic algorithms. In Computer Security and Industrial Cryptography, State of the Art and Evolution, Lecture Notes in Computer Science, No. 1528, Springer-Verlag, pp. 106-131.

International Cryptography Freedom.

Radia et al. 1993

Radia, S., Nelson, M. and Powell, M. (1993). The Spring Naming Service. Technical Report 93-16, Sun Microsystems Laboratories, Inc.

Raman and McCanne 1999

Raman, S. and McCanne, S. (1999). A model, analysis, and protocol framework for soft state-based communication. Proceedings ACM SIGCOMM, Cambridge, MA, USA, September, pp. 15-25.

Randall and Szydlo 2004

Randall, J. and Szydlo, M. (2004). Collisions for SHA0, MD5, HAVAL, MD4, and RIPEMD, but SHA1 still secure, RSA Laboratories Technical Note, August 31.

Rashid 1985

Rashid, R.F. (1985). Network operating systems. In Local Area Networks: An Advanced Course, Lecture Notes in Computer Science, 184, Springer-Verlag, pp. 314-40.

Rashid 1986

Rashid, R.F. (1986). From RIG to Accent to Mach: the evolution of a network operating system. In Proceedings of the ACM/IEEE Computer Society Fall Joint Conference, ACM, November.

Rashid and Robertson 1981

Rashid, R. and Robertson, G. (1981). Accent: a communications oriented network operating system kernel. ACM Operating Systems Review, Vol. 15, No. 5, pp. 64-75.

Rashid et al. 1988

Rashid, R., Tevanian Jr, A., Young, M., Golub, D., Baron, R., Black, D., Bolosky, W.J. and Chew, J. (1988). Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures. IEEE Transactions Computers, Vol. 37, No. 8, pp. 896-907.

Ratnasamy et al. 2001

Ratnasamy, S., Francis, P., Handley, M., Karp, R. and Shenker, S. (2001). A scalable content-addressable network. In Proc. ACM SIGCOMM 2001, August.

Raynal 1988

Raynal, M. (1988). Distributed Algorithms and Protocols. Wiley.

Raynal 1992

Raynal, M. (1992). About Logical Clocks for Distributed Systems. ACM Operating Systems Review, Vol. 26, No. 1, pp. 41-8.

Raynal and Singhal 1996

Raynal, M. and Singhal, M. (1996). Capturing Causality in Distributed Systems. IEEE Computer, February, pp. 49-56.

Redmond 1997

Redmond, F.E. (1997). DCOM: Microsoft Distributed Component Model. IDG Books Worldwide.

Reed 1983

Reed, D.P. (1983). Implementing atomic actions on decentralized data. ACM Transactions on Computer Systems, Vol. 1, No. 1, pp. 3-23.

Rescorla 1999

Rescorla, E. (1999). Diffie-Hellman Key Agreement Method. Internet RFC 2631.


Rether: A Real-Time Ethernet Protocol.

Rhea et al. 2001

Rhea, S., Wells, C., Eaton, P., Geels, D., Zhao, B., Weatherspoon, H. and Kubiatowicz, J. (2001). Maintenance-Free Global Data Storage, IEEE Internet Computing, Vol 5, No 5, September/October, pp. 40-49.

Rhea et al. 2003

Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B. and Kubiatowicz, J. (2003). Pond: the OceanStore Prototype, Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST '03).

Ricart and Agrawala 1981

Ricart, G. and Agrawala, A.K. (1981). An optimal algorithm for mutual exclusion in computer networks. Comms. ACM, Vol. 24, No. 1, pp. 9-17.

Richardson et al. 1998

Richardson, T., Stafford-Fraser, Q., Wood, K.R. and Hopper, A. (1998). Virtual Network Computing, IEEE Internet Computing. Vol. 2, No. 1, Jan/Feb, pp. 33-8.

Ritchie 1984

Ritchie, D. (1984). A Stream Input Output System. AT&T Bell Laboratories Technical Journal, Vol. 63, No. 8, pt 2, pp. 1897-910.

Rivest 1992

Rivest, R. (1992). The MD5 Message-Digest Algorithm. Internet RFC 1321.

Rivest 1992a

Rivest, R. (1992). The RC4 Encryption Algorithm, RSA Data Security Inc.

Rivest et al. 1978

Rivest, R.L., Shamir, A. and Adelman, L. (1978). A method of obtaining digital signatures and public key cryptosystems. Comms. ACM, Vol. 21, No. 2, pp. 120-6.

Rodrigues et al. 1998

Rodrigues, L., Guerraoui, R. and Schiper, A. (1998). Scalable Atomic Multicast. In Proceedings IEEE IC3N '98. Technical Report 98/257. École polytechnique fédérale de Lausanne.

Rose 1992

Rose, M.T. (1992). T he Little Black Book: Mail Bonding with OSI Directory Services. Englewood Cliffs, NJ: Prentice-Hall.

Rosenblum and Ousterhout 1992

Rosenblum, M. and Ousterhout, J. (1992). The Design and Implementation of a Log-Structured File System, ACM Transactions on Computer Systems, Vol. 10, No. 1, February, pp. 26-52.

Rosenblum and Wolf 1997

Rosenblum, D.S. and Wolf, A.L. (1997). A Design Framework for Internet-Scale Event Observation and Notification . In Proceedings sixth European Software Engineering Conference/ACM SIGSOFT Fifth Symposium on the Foundations of Software Engineering, Zurich, Switzerland.

Rowley 1998

Rowley, A. (1998). A Security Architecture for Groupware, Doctoral Thesis, Queen Mary and Westfield College, University of London.

Rowstron and Druschel 2001

Rowstron, A. and Druschel, P. (2001). Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. IFIP/ACM Middleware 2001, Heidelberg, Germany, Nov.

Rozier et al. 1988

Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien, M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard, P. and Neuhauser, W. (1988). Chorus Distributed Operating Systems. Computing Systems Journal, Vol. 1, No. 4, pp. 305-70.

Rozier et al. 1990

Rozier, M., Abrossimov, V., Armand, F., Boule, I., Gien, M., Guillemont, M., Herrman, F., Kaiser, C., Langlois, S., Leonard, P. and Neuhauser, W. (1990). Overview of the Chorus Distributed Operating System. Technical Report CS/TR-90-25.1, Chorus Systèmes, France.


RTnet: Hard Real-Time Networking for Linux/RTAI.

Salber et al. 1999

Salber, D., Dey, A.K. and Abowd, G.D. (1999). The Context Toolkit: Aiding the Development of Context-Enabled Applications. Proceedings of the 1999 Conference on Human Factors in Computing Systems (CHI '99), Pittsburgh, PA, May, pp. 434-441.

Saltzer et al. 1984

Saltzer, J.H., Reed, D.P. and Clarke, D. (1984). End-to-End Arguments in System Design, ACM Transactions on Computer Systems Vol. 2, No. 4, pp. 277-88.

Sandberg 1987

Sandberg, R. (1987). The Sun Network File System: Design, Implementation and Experience. Technical Report. Mountain View, CA: Sun Microsystems.

Sandberg et al. 1985

Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D. and Lyon, B. (1985). The Design and Implementation of the Sun Network File System. In Proceedings Usenix Conference, Portland, OR.

Sandholm and Gawor 2003

Sandholm, T. and Gawor, J. (2003). Globus Toolkit 3 Core - A Grid Service Container Framework. July.

Sandhu et al. 1996

Sandhu, R., Coyne, E., Felstein, H. and Youman, C. (1996). Role-Based Access Control Models, IEEE Computer, Vol. 29, No. 2, February.

Sane et al. 1990

Sane, A., MacGregor, K. and Campbell, R. (1990). Distributed Virtual Memory Consistency Protocols: Design and Performance. Second IEEE Workshop on Experimental Distributed Systems, pp. 91-6, October.

Sansom et al. 1986

Sansom, R.D., Julin, D.P. and Rashid, R.F. (1986). Extending a capability based system into a network environment. Technical Report CMU-CS-86-116, Carnegie-Mellon University.

Santifaller 1991

Santifaller, M. (1991). TCP/IP and NFS, Internetworking in a Unix Environment. Reading, MA: Addison-Wesley.

Saroiu et al. 2002

Saroiu, S., Gummadi, P. and Gribble, S. (2002). A Measurement Study of Peer-to-Peer File Sharing Systems, In Proc. Multimedia Computing and Networking (MMCN), 2002.

Sastry et al. 2003

Sastry, N., Shankar, U. and Wagner, D. (2003). Secure Verification of Location Claims. Proceedings ACM Workshop on Wireless Security (WiSe 2003), September, pp. 1-10.

Satyanarayanan 1981

Satyanarayanan, M. (1981). A study of file sizes and functional lifetimes. In Proceedings 8th ACM Symposium on Operating System Principles, Asilomar, CA.

Satyanarayanan 1989a

Satyanarayanan, M. (1989). Distributed File Systems. In Mullender, S. (ed.), Distributed Systems, an Advanced Course, 2nd edn, Wokingham: ACM Press/Addison-Wesley. pp. 353-83.

Satyanarayanan 1989b

Satyanarayanan, M. (1989). Integrating Security in a Large Distributed System. ACM Transactions on Computer Systems, Vol. 7, No. 3, pp. 247-80.

Satyanarayanan 2001

Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, Vol. 8, No. 4, August, pp. 10-17.

Satyanarayanan et al. 1990

Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M.E., Siegel, E.H. and Steere, D.C. (1990). Coda: A Highly Available File System for a Distributed Workstation Environment. IEEE Transactions on Computers, Vol. 39, No. 4, pp. 447-59.

Saunders 1987

Saunders, B. (1987). The Information Structure of Distributed Mutual Exclusion Algorithms. ACM Transactions on Computer Systems, Vol. 3, No. 2, pp. 145-59.

Scheifler and Gettys 1986

Scheifler, R.W. and Gettys, J. (1986). The X window system. ACM Transactions on Computer Graphics, Vol. 5, No. 2, pp. 76-109.

Schilit et al. 1994

Schilit, B.N., Adams, N.I. and Want, R. (1994). Context-Aware Computing Applications. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December, pp. 85-90.

Schiper and Raynal 1996

Schiper, A. and Raynal, M. (1996). From Group Communication to Transactions in Distributed Systems. Comms. ACM, Vol. 39, No. 4, pp. 84-7.

Schiper and Sandoz 1993

Schiper, A. and Sandoz, A. (1993). Uniform reliable multicast in a virtually synchronous environment. Proceedings 13th International Conference on Distributed Computing Systems, IEEE Computer Society Press, pp. 561-8.

Schlageter 1982

Schlageter, G. (1982). Problems of Optimistic Concurrency Control in Distributed Database Systems, SigMOD Record, Vol. 13, No. 3, pp. 62-6.

Schmidt 1998

Schmidt, D. (1998). Evaluating architectures for multithreaded object request brokers, Comms. ACM, Vol. 44, No. 10, pp. 54-60.

Schneider 1990

Schneider, F.B. (1990). Implementing Fault-tolerant Services Using the State Machine Approach: A Tutorial. ACM Computing Surveys, Vol. 22, No. 4, pp. 300-19.

Schneider 1996

Schneider, S. (1996). Security properties and CSP. In IEEE Symposium, on Security and Privacy, pp. 174-187.

Schneier 1996

Schneier, B. (1996). Applied Cryptography, second edition. New York: John Wiley.

Schroeder and Burrows 1990

Schroeder, M. and Burrows, M. (1990). The Performance of Firefly RPC. ACM Transactions on Computer Systems, Vol. 8, No. 1. pp. 1-17.

Schroeder et al. 1984

Schroeder, M.D., Birrell, A.D. and Needham, R.M. (1984). Experience with Grapevine: The growth of a distributed system, ACM Transactions on Computer Systems, Vol. 2, No. 1.

Schulzrinne et al. 1996

Schulzrinne, H., Casner, S., Frederick, D. and Jacobson, V. (1996). RTP:A Transport Protocol for Real-Time Applications, Internet RFC 1889, January.

Seetharamanan 1998

Seetharamanan, K. (ed.) (1998). Special Issue: The CORBA Connection, Comms. ACM, October, Vol. 41, No. 10.

session directory

User Guide to sd (Session Directory).

Shannon 1949

Shannon, C.E. (1949). Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715.

Shepler 1999

Shepler, S. (1999). NFS Version 4 Design Considerations, Internet RFC 2624, Sun Microsystems, June.

Shih et al. 2002

Shih, E., Bahl, P. and Sinclair, M. (2002). Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices. Proceedings of the Eighth Annual ACM Conference on Mobile Computing and Networking, Altanta, GA, USA, September, pp. 160-171.

Shirky 2000

Shirky, C. (2000). What's P2P and What's Not, 11/24/2000. Internet publication.

Shoch and Hupp 1980

Shoch, J.F. and Hupp, J.A. (1980). Measured performance of an Ethernet local network. Comms. ACM, Vol. 23, No. 12, pp. 711-21.

Shoch and Hupp 1982

Shoch, J.F. and Hupp, J.A. (1982). The `Worm' programs - early experience with a distributed computation. Comms. ACM, Vol. 25, No. 3, pp. 172-80.

Shoch et al. 1982

Shoch, J.F., Dalal, Y.K. and Redell, D.D. (1982). The evolution of the Ethernet local area network. IEEE Computer, Vol. 15, No. 8, pp. 10-28.

Shoch et al. 1985

Shoch, J.F., Dalal, Y.K., Redell, D.D. and Crane, R.C. (1985). The Ethernet. In Local Area Networks: an Advanced Course, Lecture Notes in Computer Science. No. 184, Springer-Verlag, pp. 1-33.

Shrivastava et al. 1991

Shrivastava, S., Dixon, G.N. and Parrington, G.D. (1991). An Overview of the Arjuna Distributed Programming System. IEEE Software, January, pp. 66-73.

Singh 1999

Singh, S. (1999). The Code Book. London: Fourth Estate.

Sinha and Natarajan 1985

Sinha, M. and Natarajan, N. (1985). A Priority Based Distributed Deadlock Detection Algorithm. IEEE Transactions on Software Engineering. Vol. 11, No. 1, pp. 67-80.

Spafford 1989

Spafford, E.H. (1989). The Internet Worm: Crisis and Aftermath. Comms. ACM, Vol. 32, No. 6, pp. 678-87.

Spasojevic and Satyanarayanan 1996

Spasojevic, M. and Satyanarayanan, M. (1996). An Empirical Study of a Wide-Area Distributed File System, ACM Transactions on Computer Systems, Vol. 14, No. 2, May, pp. 200-222.

Spector 1982

Spector, A.Z. (1982). Performing remote operations efficiently on a local computer network. Comms. ACM, Vol. 25, No. 4, pp. 246-60.

Spurgeon 2000

Spurgeon, C.E. (2000). Ethernet: The Definitive Guide. O'Reilly.

Srikanth and Toueg 1987

Srikanth, T. and Toueg, S. (1987). Optimal Clock Synchronization. Journal ACM. 34, 3 (July), pp. 626-45.

Srinivasan 1995a

Srinivasan, R. (1995). RPC: Remote Procedure Call Protocol Specification Version 2. Sun Microsystems. Internet RFC 1831. August.

Srinivasan 1995b

Srinivasan, R. (1995). XDR: External Data Representation Standard. Sun Microsystems. RFC 1832. Network Working Group. August.

Srinivasan and Mogul 1989

Srinivasan, R. and Mogul, J.D. (1989). Spritely NFS: Experiments with Cache-Consistency Protocols, 12th ACM Symposium on Operating System Principles, Litchfield Park, AZ, December, pp. 45-57.

Srisuresh and Holdrege 1999

Srisuresh, P. and Holdrege, M. (1999), I P Network Address Translator (NAT) Terminology and Considerations, Internet RFC 2663, August.

Stajano 2002

Stajano, F. (2002). Security for ubiquitous computing. Wiley.

Stajano and Anderson 1999

Stajano, F. and Anderson, R. (1999). The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. Proceedings 7th International Workshop on Security Protocols, Springer-Verlag, pp. 172-194.

Stallings 1998a

Stallings, W. (1998). High Speed Networks - TCP/IP and ATM Design Principles. Upper Saddle River, NJ: Prentice-Hall.

Stallings 1998b

Stallings, W. (1998). Operating Systems, third edition. Prentice-Hall International.

Stallings 1999

Stallings, W. (1999). Cryptography and Network Security - Principles and Practice, second edition. Upper Saddle River, NJ: Prentice-Hall.

Steiner et al. 1988

Steiner, J., Neuman, C. and Schiller, J. (1988). Kerberos: an authentication service for open network systems. In Proceedings Usenix Winter Conference, Berkeley: CA.

Stelling et al. 1998

Stelling, P., Foster, I., Kesselman, C., Lee, C. and von Laszewski, G. (1998). A Fault Detection Service for Wide Area Distributed Computations, Proceedings 7th IEEE Symposium on High Performance Distributed Computing, pp. 268-78.

Stoica et al. 2001

Stoica, I., Morris, R., Karger, D., Kaashoek, F. and Balakrishnan, H. (2001). Chord: A scalable Peer-To-Peer lookup service for internet applications. In ACM SIGCOMM, August.

Stojmenovic 2002

Stojmenovic, I. (ed.) (2002). Handbook of Wireless Networks and Mobile Computing. Wiley.

Stoll 1989

Stoll, C. (1989). The Cuckoo's Egg: Tracking a Spy Through a Maze of Computer Espionage. New York: Doubleday.

Stone 1993

Stone, H. (1993). High-performance Computer Architecture, third edition. Addison-Wesley.

Sun 1989

Sun Microsystems Inc. (1989). NFS: Network File System Protocol Specification. Internet RFC 1094.

Sun and Ellis 1998

Sun, C. and Ellis, C. (1998). Operational transformation in real-time group editors: issues, algorithms, and achievements. Proceedings Conference on Computer Supported Cooperative Work Systems, ACM Press, pp. 59-68.

SWAP-CA 2002

Shared Wireless Access Protocol (Cordless Access) Specification (SWAP-CA), Revision 2.0,1 The HomeRF Technical Committee, July 2002.

Szalay and Gray 2001

Szalay, A. and Gray, J. (2001) The World-Wide Telescope, Science, Vol. 293, pp. 2037-2040.

Szalay and Gray 2004

Szalay, A. and Gray, J. (2004). Scientific Data Federation: The World-Wide Telescope. In Foster, I. and Kesselman, C. (eds), The Grid 2. San Francisco, CA: Morgan Kauffman.

Tanenbaum 2001

Tanenbaum, A.S. (2001). Modern Operating Systems, second edition. Englewood Cliffs, NJ: Prentice-Hall.

Tanenbaum 2003

Tanenbaum, A.S. (2003). Computer Networks, fourth edition. Prentice-Hall International.

Tanenbaum and van Renesse 1985

Tanenbaum, A. and van Renesse, R. (1985). Distributed Operating Systems, Computing Surveys, ACM, Vol. 17, No. 4, pp. 419-70.

Tanenbaum et al. 1990

Tanenbaum, A.S., van Renesse, R., van Staveren, H., Sharp, G., Mullender, S., Jansen, J. and van Rossum, G. (1990). Experiences with the Amoeba Distributed Operating System. Comms. ACM, Vol. 33, No. 12, pp. 46-63.

Taufer et al. 2003

Taufer, M., Crowley, M., Karanicolas, J., Cicotti, P., Chien, A. and Brooks, L. (2003). Moving towards desktop Grid solutions for large scale modelling in Computational Chemistry. University of California, San Diego.

Terry et al. 1995

Terry, D., Theimer, M., Petersen, K., Demers, A., Spreitzer, M. and Hauser, C. (1995). Managing update conflicts in Bayou, a weakly connected replicated storage system. Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 172-183.


IEEE Task Force on Cluster Computing.

Thayer 1998

Thayer, R. (1998). IP Security Document Roadmap, Internet RFC 2411, November.

Thekkath et al. 1997

Thekkath, C.A., Mann, T. and Lee, E.K. (1997). Frangipani: A Scalable Distributed File System, in Proc. 16th ACM Symposium on Operating System Principles, St Malo, France, October, pp. 224-237.

Tokuda et al. 1990

Tokuda, H., Nakajima, T. and Rao, P. (1990). Real-time Mach: towards a predictable real-time system. In Proceedings USENIX Mach Workshop, pp. 73-82, October.

Topolcic 1990

Topolcic, C. (ed.) (1990). Experimental Internet Stream Protocol, Version 2. Internet RFC 1190.

Tzou and Anderson 1991

Tzou, S.-Y. and Anderson, D. (1991). The performance of message-passing using restricted virtual memory remapping. Software-Practice and Experience, Vol. 21, pp. 251-67.

van Renesse et al. 1989

van Renesse, R., van Staveran, H. and Tanenbaum, A. (1989). The Performance of the Amoeba Distributed Operating System. Software - Practice and Experience, Vol. 19, No. 3, pp. 223-34.

van Renesse et al. 1995

van Renesse, R., Birman, K., Friedman, R., Hayden, M. and Karr, D. (1995). A Framework for Protocol Composition in Horus. Proceedings PODC 1995, pp. 80-9.

van Renesse et al. 1996

van Renesse, R., Birman, K. and Maffeis, S. (1996). Horus: a Flexible Group Communication System. Comms. ACM, Vol. 39, No. 4, pp. 54-63.

van Steen et al. 1998

van Steen, M., Hauck, F., Homburg, P. and Tanenbaum, A. (1998). Locating objects in wide-area systems. IEEE Communication, Vol. 36, No. 1, pp. 104-109.

Vinoski 1998

Vinoski, S. (1998). New Features for CORBA 3.0, Comms. ACM, October 1998, Vol. 41, No. 10. pp. 44-52.

Vinoski 2002

Vinoski, S. (2002). Putting the `Web' into Web Services. IEEE Internet Computing. July-August.

Vogels 2003

Vogels, W. (2003). Web Services are not Distributed objects. IEEE Internet Computing. Nov-Dec 2003.

Vogt et al. 1993

Vogt, C., Herrtwich, R.G. and Nagarajan, R. (1993). HeiRAT - The Heidelberg Resource Administration Technique: Design Philosophy and Goals. Kommunikation in verteilten Systemen, Munich, Informatik aktuell, Springer.

Volpano and Smith 1999

Volpano, D. and Smith, G. (1999). Language Issues in Mobile Program Security. To appear in Lecture Notes in Computer Science, Vol. 1419, pp. 25-43. Springer.

von Eicken et al. 1995

von Eicken, T., Basu, A., Buch, V. and Vogels, V. (1995). U-Net: a user-level network interface for parallel and distributed programming. Proceedings of the 15th ACM Symposium on Operating Systems Principles, pp. 40-53.

Wahl et al. 1997

Wahl, M., Howes, T. and Kille, S. (1997). The Lightweight Directory Access Protocol (v3). Internet RFC 2251.

Waldo 1999

Waldo, J. (1999). The Jini Architecture for Network-centric Computing. Comms. ACM. Vol. 42, No. 7, pp. 76-82.

Waldo et al. 1994

Waldo, J., Wyant, G., Wollrath, A. and Kendall, S. (1994). A Note on Distributed Computing. In Arnold et al. 1999, pp. 307-26.

Waldspurger et al. 1992

Waldspurger, C., Hogg, T., Huberman, B., Kephart, J. and Stornetta, W. (1992). Spawn: A Distributed Computational Economy. Transactions on Software Engineering, Vol. 18, No. 2, pp. 103-17.

Want 2004

Want, R. (2004). Enabling ubiquitous sensing with RFID. IEEE Computer, Vol. 37, No. 4, April, pp. 84-86.

Want and Pering 2003

Want, R. and Pering, T. (2003). New Horizons for Mobile Computing. Proceedings First IEEE International Conference on Pervasive Computing and Communication (PerCom'03), Dallas-Fort Worth, USA, March, pp. 3-8.

Want et al. 1992

Want, R., Hopper, A., Falcao, V. and Gibbons, V. (1992). The Active Badge Location System. ACM Transactions on Information Systems, Vol. 10, No.1, January, pp. 91-102.

Want et al. 2002

Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M. and Light, J. (2002). The Personal Server: changing the way we think about ubiquitous computing. Proceedings Fourth International Conference on Ubiquitous Computing (Ubicomp 2002), Goteborg, Sweden, Sep.-Oct., Springer-Verlag, pp.194-209.

Weatherspoon and Kubiatowicz 2002

Weatherspoon, H. and Kubiatowicz, J.D. (2002). Erasure Coding vs. Replication: A Quantitative Comparison, 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, March. I

Kerberos: The Network Authentication Protocol. II

The Three Myths of Firewalls.

Weikum 1991

Weikum, G. (1991). Principles and Realization Strategies of Multilevel Transaction Management. ACM Transactions Database Systems, Vol. 16, No. 1, pp. 132-40.

Weiser 1991

Weiser, M. (1991). The Computer for the 21st Century. Scientific American, Vol. 265, No. 3, September, pp. 94-104.

Weiser 1993

Weiser, M. (1993). Some computer science issues in ubiquitous computing. Comms. ACM, Vol. 36, No. 7, pp. 74-84.

Wellner 1991

Wellner, P.D. (1991). The DigitalDesk calculator - tangible manipulation on a desk-top display. Proceedings of the 4th annual ACM symposium on User interface software and technology, Hilton Head, SC, USA, November, pp. 27-33.

Wheeler and Needham 1994

Wheeler, D.J. and Needham, R.M. (1994). TEA, a Tiny Encryption Algorithm. Technical Report 355, Two Cryptographic Notes, Computer Laboratory, University of Cambridge, December, pp. 1-3.

Wheeler and Needham 1997

Wheeler, D.J. and Needham, R.M. (1997). Tea Extensions, October 1994, pp. 1-3.

Wiesmann et al. 2000

Wiesmann, M., Pedone, F., Schiper, A., Kemme, B. and Alonso, G. (2000). Understanding replication in databases and distributed systems. In Proceedings 20th International Conference on Distributed Computing Systems (ICDCS '2000), Taipei, Republic of China, IEEE.

Williams 1998

Williams, P. (1998). JetSend: An Appliance Communication Protocol. Proceedings IEEE International Workshop on Networked Appliances, (IEEE IWNA '98), Kyoto, Japan, November 1998.

Winer 1999

Winer, D. (1999). The XML-RPC specification.

Wobber et al. 1994

Wobber, E., Abadi, M., Burrows, M. and Lampson, B. (1994). Authentication in the Taos operating system. ACM Transactions Computer Systems. 12, 1 (Feb.), pp. 3-32.

Wright et al. 2002

Wright, M., Adler, M., Levine, B.N. and Shields, C. (2002). An Analysis of the Degradation of Anonymous Protocols, In the Proceedings of the Network and Distributed Security Symposium - NDSS '02, February.

WSDL4J 2003

The Web Services Description Language for Java Toolkit (WSDL4J ).

Wulf et al. 1974

Wulf, W., Cohen, E., Corwin, W., Jones, A., Levin, R., Pierson, C. and Pollack, F. (1974). HYDRA: the kernel of a multiprocessor operating system. Comms. ACM, Vol. 17, No. 6, pp. 337-345.

Wuu and Bernstein 1984

Wuu, G.T. and Bernstein, A.J. (1984). Efficient Solutions to the Replicated Log and Dictionary Problems. ACM Proceedings Third Annual Symposium Principles of Distributed Computing, pp. 233-42.

The Access Grid Project.

Apple Computer Corp. Rendezvous technical resources.

The Official Bluetooth SIG Website., The scalable, reliable and high performance online game platform, GoGrid.

Bureau of Export Administration, US Department of Commerce, Commercial Encryption Export Controls.

Coulouris, G., Dollimore, J. and Kindberg, T. (eds), Distributed Systems, Concepts and Design: Supporting material.

Citrix Corporation. Server-based Computing White Paper.

Corporation for Research and Educational Networking, CREN Certificate Authority.

Crypto++® Library 5.2.1.

Distributed Aircraft Maintenance Environment (DAME).

CU-SeeMe Networks Inc. Home page. /

International DOI Foundation. Pages on digital object identifiers.

Delay Tolerant Networking Research Group. Home page.

Globexplorer, the world's largest online library of aerial and satellite imagery.

Handle system. Home page.

Internet Assigned Numbers Authority. IANA Home page.

Internet Engineering Task Force. Internet RFC Index page.

Iona Technologies, Orbix.

InterPlaNetary Internet Project. Home page.

Robert Hobbes Zakon. Hobbes' Internet Timeline. I

Microsoft Corporation. Active Directory Services. II

Microsoft Corporation. Windows 2000 Kerberos Authentication, White Paper. III

Microsoft Corporation. NetMeeting Home page.

NEES Grid, Building the National Virtual Collaboratory for Earthquake Engineering.

Near Field Communication (NFC). Forum Home page.

Object Management Group, Index to CORBA services. OMG: Needham, MA.

Open Group. Portal to the World of DCE.

Open Mobile Alliance. Home page.

OpenSSL Project. OpenSSL: The Open Source toolkit for SSL/TLS.

PGP. Home page.

Read, D.P. (2000). The End of the End-to-End Argument.

RSA Security Inc. Home page. I

RSA Corporation (1997). DES Challenge. II

RSA Corporation (2004). RSA Factoring Challenge.

Real-Time for Java TM Experts Group.

Network Security Library.

The Smart-Its Project. Home page.

SPEC SFS97 Benchmark.

Universal Plug and Play. Home page.

USCMS, The Compact Muon Solenoid.

Verisign Inc. Home page. I

World Wide Web Consortium. Home page. II

World Wide Web Consortium. Pages on the HyperText Markup Language. III

World Wide Web Consortium. Pages on Naming and Addressing. IV

World Wide Web Consortium. Pages on the HyperText Transfer Protocol. V

World Wide Web Consortium. Pages on the Resource Description Framework and other metadata schemes. VI

World Wide Web Consortium. Pages on the Extensible Markup Language. VII

World Wide Web Consortium. Pages on the Extensible Stylesheet Language. VIII

XML Schemas.W3C Recommendation. (2001) IX

World Wide Web Consortium. Pages on SOAP. X

World Wide Web Consortium. Pages on Canonical XML, Version 1.0. W3C Recommendation. March. XI

World Wide Web Consortium. Pages on Web Services Description Language (WSDL). XII

World Wide Web Consortium. Pages on XML Signature Syntax and Processing. XIII

World Wide Web Consortium. Pages on. XML key management specification XKMS. XIV

World Wide Web Consortium. Pages on XML Encryption Syntax and Processing. XV

World Wide Web Consortium. Pages on Web Services Choreography Requirements. W3C Working Draft. XVI

Burdett, D. and Kavantsas, N. (2004). WS Choreography Model Overview, W3C Working Draft. XVII

World Wide Web Consortium. Pages on Web Services Choreography Description Language Version 1.0. XVIII

World Wide Web Consortium. Pages on Web Services Choreography Interface (WSCI ). XIX

World Wide Web Consortium. Pages on Device Independence. XX

World Wide Web Consortium. Pages on the Semantic Web.

WAP Forum. White Papers and Specifications.

The IEEE 802.11 Wireless LAN Standard.

Crossbow Technology Inc. Pages on wireless sensor networks.

IETF Zeroconf Working Group. Home page.

Wyckoff et al. 1998

Wyckoff, P., McLaughry, S., Lehman, T. and Ford, D. (1998). T Spaces. IBM Systems Journal, Vol. 37, No. 3.

Zakon, R.H. Hobbes' Internet Timeline v7.0,

Zhang and Kindberg 2002

Zhang, K. and Kindberg, T. (2002). An authorization infrastructure for nomadic computing. Proceedings Seventh ACM Symposium on Access Control Models and Technologies, Monterey, CA, USA, June, pp. 107-113.

Zhang et al. 1993

Zhang, L., Deering, S.E., Estrin, D., Shenker, S. and Zappala, D. (1993). RSVP - A New Resource Reservation Protocol. IEEE Network Magazine, Vol. 9, No. 5.

Zhao et al. 2004

Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D. and Kubiatowicz, J.D. (2004). Tapestry: A Resilient Global-Scale Overlay for Service Deployment, IEEE Journal on Selected Areas in Communications, Vol. 22, No. 1, January.

Zimmermann 1995

Zimmermann, P.R. (1995). The Official PGP User's Guide. Cambridge, MA: MIT Press.