Proposal skelteon



Yüklə 0,76 Mb.
səhifə23/25
tarix11.09.2018
ölçüsü0,76 Mb.
#80711
1   ...   17   18   19   20   21   22   23   24   25

Chapter 3

[Abadi and Jurjens 2001] M. Abadi, J. Jurjens. Formal eavesdropping and its computational interpretation. In Fourth International Symposium on Theoretical Aspects of Computer Software (TACS2001), LNCS. Springer-Verlag, 2001.

[Abadi and Rogaway 2002] M. Abadi, Ph. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2), pp. 103–127, 2002.

[Adelsbach et al 2002] A. Adelsbach, D. Alessandri, C. Cachin, S. Creese, Y. Deswarte, K. Kursawe, J. C. Laprie, D. Powell, B. Randell, J. Riordan, P. Ryan, W. Simmonds, R. Stroud, P. Verissimo, M. Waidner, A. Wespi. Conceptual Model and Architecture of MAFTIA. Project MAFTIA IST-1999-11583 deliverable D21. 2002 http://www.research.ec.org/maftia/deliverables/D21.pdf.

[Agat 2000] J. Agat. Transforming out timing leaks. In 27th Principles of programming languages (POPL), pp. 40–53, Boston, Massachusetts, Jan 2000. ACM Press, New York.

[Alur et al 1998] R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, S. Tasiran. MOCHA: Modularity in model checking. In Computer Aided Verification, pp. 521–525, 1998.

[Anderson 2001] R. J. Anderson. Security Engineering: A guide to building dependable distributed systems. John Wiley & Sons Inc, New York, 2001.

[Bellare 1997] M. Bellare. Practice-oriented provable security. In Information Security, First International Workshop, ISW ’97, LNCS 1396, pp. 221–231, 1997.

[Bellare and Kohno 2003] M. Bellare, T. Kohno. A theoretical treatment of related-key attacks: Rka-prps, rka-prfs, and applications. In EUROCRYPT 2003, LNCS 2656, pp. 491–506, 2003.

[Biham and Shamir 1997] E. Biham, A. Shamir. Differential fault analysis of secret key cryptosystems. In B. S. Kaliski Jr., editor, 17th Advances in Cryptology (CRYPTO), volume LNCS 1294, pp. 513–525, Santa Barbara, California, Aug 1997. Springer-Verlag, Berlin.

[Black et al 2002] J. Black, P. Rogaway, T. Shrimpton. Encryption scheme security in the presence of key-dependent messages. In Selected Areas in Cryptography — SAC’02, LNCS. Springer-Verlag, 2002.

[Burrows et al 1990] M. Burrows, M. Abadi, R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1), pp. 18–36, 1990.

[Canvel et al 2003] B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux. Password interception in a SSL/TLS channel. In D. Boneh, Ed., Advances in Cryptology (CRYPTO), Santa Barbara, California, Aug 2003. Springer-Verlag, Berlin.

[Chari et al 1999] S. Chari, C. Jutla, J. R. Rao, P. Rohatgi. A cautionary note regarding evaluation of AES candidates on Smart-Cards. In 2nd Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999.

[Dolev and Yao 1983] D. Dolev, A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), pp. 198–208, 1983.

[English and Hamilton 1996] E. English, S. Hamilton. Network security under siege: the timing attack. IEEE Computer, 29(3):95–97, Mar 1996.

[Goldreich 1997] O. Goldreich. On the foundations of modern cryptography. Lecture Notes in Computer Science, 1294. pp. 46–74, 1997.

[Handschuh and Heys 1998] H. Handschuh, H. M. Heys. A timing attack on RC5. In Selected Areas in Cryptography (SAC), LNCS 1556, pp. 306–318, Kingston, Canada, Aug 1998. Springer-Verlag, Berlin.

[Herrmann et al 2002] P. Herrmann, L. Wiebusch, H. Krumm. State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. In: 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E), pp. 195-209, Lisbon, October 2002. Kluwer Academic Publisher.

[Herrmann 2003a] P. Herrmann. Formal Security Policy Verification of Distributed Component-Structured Software. To appear in: 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems (FORTE'2003), IFIP, LNCS, Berlin, September/October 2003, Springer-Verlag.

[Herrmann 2003b] P. Herrmann. Trust-Based Protection of Software Component Users and Designers. In: 1st International Conference on Trust Management, pp. 75-90, LNCS 2692, Heraklion, May 2003, Springer-Verlag.

[Hevia and Kiwi. 1998] A. Hevia, M. Kiwi. Strength of two data encryption standard implementations under timing attacks. In C. L. Lucchesi, A. V. Moura, Eds, 3rd Latin American Symp. on Theoretical Informatics (LATIN), pp. 192–205, Campinas, Brazil, Apr 1998. Springer-Verlag, Berlin.

[Kocher 1996] P. C. Kocher. Timing attacks on implementations of Diffe-Hellman, RSA, DSS and other systems. In N. Koblitz, editor, 16th Advances in Cryptology (CRYPTO), LNCS 1109, pp. 104–113, Santa Barbara, California, Aug 1996. Springer-Verlag.

[Laud 2001] P. Laud. Semantics and program analysis of computationally secure information flow. In Programming Languages and Systems: 10th European Symposium on Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001, volume 2028 of LNCS, pp. 77–91. Springer-Verlag, 2001.

[Laud 2002] P. Laud. Encryption cycles and two views of cryptography. In NORDSEC 2002 - Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pp. 85–100, 2002.

[Laud and Corin. 2003] P. Laud, R. Corin. Sound computational interpretation of formal encryption with composed keys. In Information Security and Cryptology - ICISC 2003, 6th International Conference, LNCS. Springer-Verlag, 2003.

[Lazic 1999] R .S. Lazic. A Semantic Study of Data Independence with Applications to Model Checking, DPhil thesis, Oxford University Computing Laboratory, April 1999.

[Lowe 1997] G. Lowe. Casper: A compiler for the analysis of security protocols. In 10th Computer Security Foundations Workshop (CSFW), pp. 18–30, Rockport, Massachusetts, Jun 1997. IEEE CS Press.

[Lück et al 1999] I. Lück, M. Schönbach, A. Mester, H. Krumm. Derivation of Backup Service Management Applications from Service and System Models. In R. Stadler, B. Stiller (eds.), Active Technologies for Network and Service Management, Proc. DSOM'99, pp. 243-255, Springer-Verlag, LNCS 1700, 1999.

[Lück et al 2001] I. Lück, C. Schäfer, H. Krumm. Model-based Tool-Assistance for Packet-Filter Design. In: M. Sloman, E. Lupu, J. Lobo (Eds.), Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2001), pp. 120-136, Bristol, UK, LNCS 1995, 2001. Springer-Verlag.

[Lück et al 2002] I. Lück, S. Vögel, H. Krumm. Model-Based Configuration of VPNs. In: 8th IEEE/IFIP Network Operations and Management Symposium (NOMS2002), pp. 589-602, Florence, April 2002. IEEE Computer Society Press.

[May et al 2001] D. May, H. Muller, N. P. Smart. Non-Deterministic processors. In V. Varadharajan and Y. Mu, Eds, 6th Australasian Conf. (ACISP) – Information Security and Privacy, volume LNCS 2119, pp. 115–129, Sydney, Australia, Jul 2001. Springer-Verlag. 2001.

[Micciancio and Warinschi 2003] D. Micciancio, B. Warinschi. Completeness theorems for the abadi-rogaway language of encrypted expressions. To appear. 2003.

[Paulson 1998] L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6, pp. 85–128, 1998.

[Pfitzmann et al 2000] B. Pfitzmann, M. Schunter, M. Waidner. Cryptographic Security of Reactive Systems, Notes in Theoretical Computer Science (ENTCS), March 2000. hhtp://www.elsevier.nl/cas/tree/store/tcs/free/noncas/pc/menu.hym.

[Rayn et al 2000] P. Y. A., Ryan, S. A. Schneider, A. W. Roscoe, G. Lowe, M. H. Goldsmith. Modelling and Analysis of Security Protocols, Pearson Education 2000.

[Schunter 2000] M. Schunter. SEMPER: Secure Electronic Marketplace for Europe. In LNCS 1854. Springer Verlag. 2000.

[Verissimo et al 2003] P. E. Veríssimo, N. F. Neves, M. P. Correia. Intrusion-Tolerant Architectures: Concepts and Design. In: Architecting Dependable Systems. LNCS 2677. 2003.


Chapter 4

[Aldea Rivas and Gonzalez Harbour 2002a] M. Aldea Rivas, M. Gonzalez Harbour. “Application-Defined Scheduling in Ada”, IRTAW 11, Ada Letters, XXII (4), pp. 77-84. 2002.

[Aldea Rivas and Gonzalez Harbour 2002b] M. Aldea Rivas, M. Gonzalez Harbour. POSIX-Compatible Application-Defined Scheduling in MaRTE OS. Proceedings of 14th Euromicro Conference on Real-Time Systems, Vienna, Austria, IEEE Computer Society Press, June 2002

[Allen et al 1983] J. Allen, K. Kennedy, C. Porterfield, J. Warren. Conversion of Control Dependence to Data Dependence. Proceedings of the 10th ACM Symposium on Principles of Programming Languages. pp. 177-189, 1983.

[Anantaraman et al 2003] A. Anantaraman, K. Seth, K. Patil, E. Rotenberg, F. Mueller. Virtual Simple Architecture (VISA): Exceeding the Complexity Limit in Safe Real-Time Systems, Proceedings of the International Symposium on Computer Architecture, 2003.

[Aydin et al 2001] H. Aydin, R. Melhem, D.Mossé and Pedro Mejia Alvarez ``Determining Optimal Processor Speeds for Periodic Real-Time Tasks with Different Power Characteristics'', ECRTS01 (Euromicro Conference on Real-Time Systems), Delft, Holland, 2001

[Bernat and Burns 2001] G. Bernat, A. Burns. “Implementing a Flexible Scheduler in Ada”, LNCS, 2043, pp. 179-190. 2001

[Bernat et al 2002] G. Bernat, A. Colin, S. Petters, Analysis of Probabilistic Hard Real-Time Systems. Proceedings of the IEEE Real-Time Systems Symposium, 2002.

[Bollella et al 2000] G. Bollella, B. Brosgol, P. Dibble, S. Furr, J., Gosling, D. Hardin, M. Turnbull. “The Real-Time Specification for Java”, Addison Wesley, 2000.

[Burns and Wellings. 2002] A. Burns, A. J. Wellings. “Accessing Delay Queues”, IRTAW 11, Ada Letters, XXII(4), pp. 72-76. 2002

[Burns et al 2003] A. Burns, B. Dobbing, T. Vardanega. “Guide for the Use of the Ada Ravenscar Profile in High Integrity Systems”, YCS-2003-348. 2003

[Carnahan and Ruark 1999] L. Carnahan, M. Ruark, (Eds). “Requirements for Real-time Extensions for the Java Platform”, NIST Publication 5000-243, 1999 http://www.nist.gov/rt-java, last accessed 20/8/2002.

[Colin and Puaut 2000] A. Colin, I. Puaut. Worst Case Execution Time Analysis for a Processor with Branch Prediction. Real-Time Systems, 18 (2/3). Pp. 249-274, 2000.

[Critical Software 2003] Critical Software, SA, “Call-off Order 01: SFMECA and Code Inspections on SCOS-2000 2.3e Evaluation Report”, Report CSW-RAMS-2003-TNR-1515, DL-RAMS01-08, Version 1.3, October 31, 2003 (ftp.estec.esa.nl/pub/tos-qq/qqs/RAMSFrameContract/SW_FMECAonSCOS2000andCodeInspections/).

[de la Puente and Ruiz 2001] J. A. de la Puente, J. F. Ruiz. “Open Ravenscar Real-Time Kernel – Operations Manual”, March 2001.

[ECSS 2002] ECSS Secretariat, “ECSS-E-40B, ECSS Space Engineering, Software Space Engineering Draft B”, ESA-ESTEC Requirements & Standards Division, Noordwijk, The Netherlands, February 2002 (http://www.ecss.nl/).

[Engblom and Ermedahl 2000] J. Engblom, A. Ermedahl. Modeling Complex Flows for Worst Case Execution Time Analysis. Proceedings of the 21st IEEE Real-Time Systems Symposium. pp. 163-174, 2000.

[Erpenbach and Altenbernd 1999] E. Erpenbach, P. Altenbernd Worst-Case Execution Times and Schedulability Analysis of Statchart Models. Proceedings of the 11th Euromicro Conference on Real-Time Systems. Pp. 70-77, 1999.

[Fohler 1995] G. Fohler, Joint scheduling of distributed complex periodic and hard aperiodic tasks in statically scheduled systems, 16th IEEE Real-Time Systems Symposium (RTSS '95) Dec 1995.

[Hecht et al 1997] H. Hecht, M. Hecht, S. Graff. Review Guidelines for Software Languages for the Use in Nuclear Powerplant Systems. Technical Report NUREG/CR-6463, Rev. 1, U.S. Nuclear Regulatory Commission, 1997.

[JCR 2000] Java Community Process, JSR50. “JSR 50: Distributed Real Time Specification”, http:// www.jcp.org/jsr/detail/50.jsp, 2000, last accessed 20/8/2002.

[J-Consortium 2000] J-Consortium. Realtime Core Extensions”, Revision 1.0.14, http://www.j-consortium.org/rtjwg/index.html, 2000, last accessed 20/8/2002.

[Kirner et al 2002] R. Kirner, R. Lang, G. Freiberger, P. Puschner. Fully Automatic Worst-Case Execution-Time Analysis for Matlab/Simulink Models. Proceedings of the 14th Euromicro Conference on Real-Time Systems. pp. 31-40, 2002.

[Kopetz 1997] H. Kopetz, H. Real-Time Systems: Design Principles for Distributed Embedded Applications, Kluwer Academic Publishers, 1997.

[Krause and Hartmann 1999] K. H. Krause, W. Hartmann. “RT JAVA Proposal", 1999 http://www.j-consortium.org/rtjw

[Kwon et al 2002] J. Kwon, A. J. Wellings, S. King. “Ravenscar-Java: A High-Integrity Profile for Real-Time Java, Java Grande, pp. 131-140. 2002.

[Lipari and Baruah 2000] S. Lipari, S. K. Baruah "Efficient Scheduling of Multi-Task Applications in Open Systems" IEEE Proceedings of the 6th Real-Time Systems and Applications Symposium, Washington DC, June 2000.

[Liu and Layland 1973] C.L. Liu, J.W. Layland, “Scheduling Algorithms for Multiprogramming in Hard Real-Time Environment”, Journal of the ACM, No. 1, Vol. 20, pp. 40-61, 1973.

[Lundqvist and Stenström 1999] T. Lundqvist, P. Stenström. Timing Anomalies in Dynamically Scheduled Microprocessors. Proceedings of the 20th IEEE Real-Time Systems Symposium. Pp. 12-21, 1999.

[Mok et al 2001]. A. Mok, X. Feng & D. Chen , Resource Partition for Real-Time Systems, 7th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2001).

[Moreira et al 2003] F. Moreira, R. Maia, D. Costa, N. Duro, K. Hjortnaes, P. Rodriguez, “Static and Dynamic Verification of Critical Software for Space Applications”, In proc. of the Data Systems In Aerospace conference 2003 (DASIA’03), Prague, Czech Republic, June 2-6, 2003.

[Petters and Färber 1999] S. Petters, G. Färber. Making Worst Case Execution Time Analysis for Hard Real-Time Tasks on State of the Art Processors Feasible. Proceedings of the 6th IEEE International Conference on Real-Time Computer Systems and Applications. Pp. 442-449, 1999.

[Puschner and Burns 2002] P. Puschner, A. Burns. Writing Temporally Predictable Code. Proceedings 7th IEEE International Workshop on Object-oriented Real-time Dependable Systems. Pp. 85-91, 2002.

[Puschner 2002a] P. Puschner. Is Worst-Case Execution-Time Analysis a Non-Problem – Towards New Software and Hardware Architectures. Proceedings 2nd Euromicro International Workshop on WCET Analysis, Technical Report, Department of Computer Science, University of York, 2002.

[Puschner 2002b] P. Puschner. Transforming Execution-Time Boundable Code into Temporally Predictable Code. Kleinjohann, B., Kim, K.H. (Kane), Kleinjohann, and L., Rettberg, A. Editors, Design and Analysis of Distributed Embedded Systems, pp. 163-172, Kluwer Academic Publishers, 2002.

[Puschner 2003] P. Puschner. Algorithms for Dependable Hard Real-Time Systems. Proceedings 8th IEEE International Workshop on Object-oriented Real-Time Dependable Systems. 2003.

[Puschner and Koza 1989] P. Puschner, C. Koza, “Calculating the Maximum Execution Time of Real-Time Programs”, Real-Time Systems, vol. 1, pp. 159-176, 1989.

[Ramamamritham1990] K. Ramamritham: Scheduling Complex Periodic Tasks, Intl. Conference on Distributed Computing Systems, June 1990.

[Rodríguez et al 2003] M. Rodríguez, N. Silva, J. Esteves, L. Henriques, D. Costa, “Challenges in Calculating the WCET of a Complex On-board Satellite Application”, In proc. of the 3rd Int. Euromicro Workshop on Worst-Case Execution Time Analysis, Porto, Portugal, pp. 3-6, July 1, 2003.

[Regehr and Stankovic 2001] J. Regehr, J. Stankovic, "HLS: a framework for composing soft real-time systems", Proc. RTSS 2001, London 2001.

[Sprunt et al 1989] ] B. Sprunt, L. Sha, J. Lehoczky. Aperiodic task scheduling for hard real-time systems. Journal of Real-Time Systems, 1(1):27--60, 1989.

[Spuri and Buttazzo 1996] M. Spuri, G. Buttazzo, "Scheduling Aperiodic Tasks in Dynamic Priority Systems", The Journal of Real-Time Systems, Vol. 10, No. 2, pp. 179-210, March 1996.

[Tindell et al 1994] K. Tindell, A. Burns and A.J. Wellings: An Extendible Approach for Analysing Fixed Priority Hard Real-Time Tasks, Real-Time Systems, Vol. 6(2), pp. 133-151 (March 1994).

[Wellings 2004] A. J. Wellings. “Concurrent and Real-Time Programming in Java”, Wiley, 2004 (to appear).


Chapter 5

[Abendroth and Jensen 2003] J. Abendroth, C. D. Jensen. "A Unified Security Framework for Networked Applications". Computer Security Track of the Symposium of Applied Computing (SAC2003), 2003, pp. 351-357.

[Al-Bar and Wakeman 2001] A. Al-Bar, I. Wakeman. "A Survey of Adaptive Applications in Mobile Computing". International Conference on Distributed Computing Systems, Arizona, USA, 2001, pp. 246-251.

[Almeida and Verissimo 1998] C. Almeida, P. Verissimo "Using light-weight groups to handle timing failures in quasi-synchronous systems." The 19th IEEE Real-Time Systems Symposium. Pp. 430-439, Madrid, Spain. 1998.

[Bacon et al 2000] J. Bacon, K. Moody, J. Bates, R. Hayton, C. Ma, A. McNeil, O. Seidel, M. Spiteri, "Generic Support for Distributed Applications," IEEE Computer, vol. 33, pp. 68-76, 2000.

[Banavar et al 2000] 11 G. Banavar, J. Beck, E. Gluzberg, "Challenges: An Application Model for Pervasive Computing". Sixth Annual Conference on Mobile Computing and Networking (MobiCom), 2000

[Belaramani et al 2003] N. M. Belaramani, Y. Chow, V. W.-M. Kwan, C-L Wang, F. C. M. Lau, "A Component-based Software Architecture for Pervasive Computing". Intelligent Virtual World: Technologies and Applications in Distributed Virtual Environments, World Scientific Publishing Co., 2003.

[Cugola et al 2001] G. Cugola, E. D. Nitto, A. Fuggetta, "The JEDI Event-Based Infrastructure and its Application to the Development of the OPSS WFMS," IEEE Transactions on Software Engineering (TSE), vol. 27, pp. 827-850, 2001.

[Fitzpatrick et al 2002] A. Fitzpatrick, G. Biegel, S. Clarke, V. Cahill. "Towards a Sentient Object model". in Workshop on Engineering Context-Aware Object-Oriented Systems and Environments (ECOOSE), Seattle, WA, USA, November, 2002.

[Forman and Zahorjan 1994] G. H. Forman, J. Zahorjan, "The Challenges of Mobile Computing". IEEE Computer, 27, 4, pp. 38-47, April 1994.

[Gomez et al 1999] J. Gomez, A. T. Campbell, M. Naghshineh, C. Bisdikian. "Power-aware Routing in Wireless Packet Networks". In 6th IEEE International Workshop on Mobile Multimedia Communications (MOMUC'99), San Diego, 15-17 November 1999.

[Huang and Garcia-Molina 2001] Y. Huang, H. Garcia-Molina, "Publish/Subscribe in a Mobile Environment," in Proceedings of the Second ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDe'01). Santa Barbara, CA, USA, 2001, pp. 27-34.

[Hughes and Cahill 2003] B. Hughes, V. Cahill, "Towards Real-time Event-based Communication in Mobile Ad Hoc Wireless Networks," in Proceedings of 2nd International Workshop on Real-Time LANS in the Internet Age 2003 (ECRTS/RTLIA03). Porto, Portugal, 2003, pp. 77-80.

[Keeney and Cahill 2003] J. Keeney, V. Cahill, "Chisel: A Policy-Driven, Context-Aware, Dynamic Adaptation Framework". in Fourth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY2003), Lake Como, Italy, 4-6 June, 2003, pp. 3 -14.

[Meier and Cahill 2002] R. Meier, V. Cahill, "STEAM: Event-Based Middleware for Wireless Ad Hoc Networks," in Proceedings of the International Workshop on Distributed Event-Based Systems (ICDCS/DEBS'02). Vienna, Austria, 2002, pp. 639-644.

[Meier and Cahill 2003] R. Meier, V. Cahill, "Exploiting Proximity in Event-Based Middleware for Collaborative Mobile Applications," in Proceedings of the 4th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS'03). Paris, France: Springer-Verlag Heidelberg, Germany, 2003.

[Pietzuch and Bacon, 2002] P. Pietzuch, J. Bacon, "Hermes: A Distributed Event-Based Middleware Architecture," in Proceedings of the International Workshop on Distributed Event-Based Systems (ICDCS/DEBS'02). Vienna, Austria, 2002, pp. 611-618.

[Podnar et al 2002] I. Podnar, M. Hauswirth, M. Jazayeri, "Mobile Push: Delivering Content to Mobile Users," in Proceedings of the International Workshop on Distributed Event-Based Systems (ICDCS/DEBS'02). Vienna, Austria, 2002, pp. 563-570.

[Sutton et al 2001] P. Sutton, R. Arkins, B. Segall, "Supporting Disconnectedness – Transparent Information Delivery for Mobile and Invisible Computing," in Proceedings of the IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001). Brisbane, Australia: IEEE CS Press, 2001, pp. 277-285.

[Verissimo and Casimiro 2002] P. Verissimo, A. Casimiro. "The Timely Computing Base Model and Architectures". Transaction on Computers - Special Issue on Asynchronous Real-Time Systems, 51 (8), August, 2002.

[Verissimo and Casimiro, 2003] P. Verissimo, A. Casimiro, "Event-Driven Support of Real-Time Sentient Objects". In 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, Guadalajara, Mexico, January 2003.

[UMTS] Universal Mobile Telecommunications System Forum. http://www.umts-forum.org

[Wang and Li 2002] K. Wang, B. Li. "Efficient and Guaranteed Service Coverage in Partitionable Mobile Ad-hoc Networks". in IEEE Joint Conference of Computer and Communication Societies (INFOCOM'02), New York City, New York, June 23-27 2002, pp. 1089-1098. 2002.
Chapter 6

[Cecchet et al 2002] E. Cecchet, J. Marguerite, W. Zwaenepoel. Performance and Scalability of EJB Applications. Proceedings of OOPSLA'02, 2002, Seattle, WA, USA.

[Cecchet and Marguerite 2003] E. Cecchet, J. Marguerite, C-JDBC: Scalability and High Availability of the Database Tier in J2EE environments, the 4th ACM/IFIP/USENIX International Middleware Conference (Middleware), 2003, Rio de Janeiro, Brazil, June.

[Fassino et al 2002] J.-P. Fassino, J.-B. Stefani, J. Lawall, G. Muller. THINK: A Software Framework for Component-based Operating System Kernels. Proceedings of Usenix Annual Technical Conference, 2002, Monterey (USA), June 10-15, 2002.

[Senart et al 2002] A. Senart, O. Charra, J.-B. Stefani. Developing Dynamically Reconfigurable Operating System Kernels with the THINK Component Architecture. Proceedings of the workshop on Engineering Context-aware Object-Oriented Systems and Environments, in association with OOPSLA'2002. 2002, Seattle, WA USA November 4-8.

[Charra and Senart 2002] O. Charra, A. Senart. ThinkRCX: un noyau de systeme d'exploitation extensible pour Lego RCX. Actes des Journees sur les Systemes a Composants Adaptables et Extensibles, Grenoble (France), 17-18 October. pp. 239-244.

[Rippert and Stefani 2002a] C. Rippert, J.-B. Stefani. THINK: A Secure Distributed Systems Architecture. Proceedings of the 10th ACM SIGOPS European Workshop", 2002.

[Rippert and Stefani 2002b] C. Rippert, J.-B. Stefani. Building Secure Embedded Kernels with the THINK Architecture. Proceedings of the Workshop on Engineering Context-aware Object-Oriented Systems and Environments, in association with OOPSLA'2002. November 4-8, Seattle, WA (USA) 2002.

[Hansen 2001] J. S. Hansen. Flexible Network Attached Storage using Remote DMA, Proceedings of Hot Interconnects 9, Stanford University. Pp. 51-55, August 22-24. IEEE. 2001.

[Hansen and Jul 2001] J. S. Hansen, E. Jul. Prioritizing Network Event Handling in Clusters of Workstations. Proceedings of the 7th International Euro-Par Conference LNCS Vol. 2150, pp. 704-711, Manchester, 2001, August 28-31. Springer.

[Hansen 2001b] J. S. Hansen. I/O Buffer Management for Shared Storage Devices in SCI-based Clusters of Workstations. Proceedings of SCI Europe 2001, 4th International Conference on SCI-based Technology and Research, October1—3, Dublin. pp. 47-54, 2001,

[Hansen and Lachaize 2002] J. S. Hansen, R. Lachaize. Using Disks in a Cluster as a High Performance Storage System. Proceedings of IEEE International on Cluster Computing (Cluster 2002), 2002, Chicago, IL, (USA).


Yüklə 0,76 Mb.

Dostları ilə paylaş:
1   ...   17   18   19   20   21   22   23   24   25




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin