Proceedings of the IEEE, 63(9):1278–1308, Sept. 1975. Cited on 453
Saltzer J., Reed D., and Clark D. End-to-End Arguments in System Design. ACM Transactions on Computer Systems, 2(4):277–288, Nov. 1984. Cited on 281
Sandhu R. S., Coyne E. J., Feinstein H. L., and Youman C. E. Role-Based Access Control Models. Computer, 29(2):38–47, Feb. 1996. Cited on 455
Saroiu S., Gummadi P. K., and Gribble S. D. Measuring and Analyzing the Charac- teristics of Napster and Gnutella Hosts. ACM Multimedia Systems, 9(2):170–184, Aug. 2003. Cited on 72
Satyanarayanan M. and Siegel E. Parallel Communication in a Large Distributed System. IEEE Transactions on Computers, 39(3):328–348, Mar. 1990. Cited on 546 Saxena P. and Rai J. A Survey of Permission-based Distributed Mutual Exclusion
Algorithms. Computer Standards and Interfaces, 25(2):159–181, May 2003. Cited on 281
Schmidt D., Stal M., Rohnert H., and Buschmann F. Pattern-Oriented Software Architecture – Patterns for Concurrent and Networked Objects. John Wiley, New York, 2000. Cited on 75
Schneider F. Implementing Fault-Tolerant Services Using the State Machine Ap- proach: A Tutorial. ACM Computing Surveys, 22(4):299–320, Dec. 1990. Cited on 277, 335, 520
Schneier B. Secrets and Lies. John Wiley, New York, 2000. Cited on 426
Schneier B. Applied Cryptography. John Wiley, New York, 2nd edition, 1996. Cited on 426, 448
Schulzrinne H. The tel URI for Telephone Numbers. RFC 3966, Jan. 2005. Cited on 615
Schulzrinne H., Casner S., Frederick R., and Jacobson V. RTP: A Transport Protocol for Real-Time Applications. RFC 3550, July 2003. Cited on 143
Sebesta R. Programming the World Wide Web. Addison-Wesley, Reading, MA., 3rd
edition, 2006. Cited on 591
Shapiro M., Dickman P., and Plainfosse D. SSP Chains: Robust, Distributed Ref- erences Supporting Acyclic Garbage Collection. Technical Report 1799, INRIA, Rocquencourt, France, Nov. 1992. Cited on 211
Shaw M. and Clements P. A Field Guide to Boxology: Preliminary Classification of Architectural Styles for Software Systems. In 21st International Computer Software and Applications Conference, pages 6–13, Aug. 1997. Cited on 52
Shepler S., Callaghan B., Robinson D., Thurlow R., Beame C., Eisler M., and Noveck
D. Network File System (NFS) Version 4 Protocol. RFC 3530, Apr. 2003. Cited on 229, 531
Sheth A. P. and Larson J. A. Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Computing Surveys, 22(3): 183–236, Sept. 1990. Cited on 331
Shooman M. L. Reliability of Computer Systems and Networks: Fault Tolerance, Analysis,
and Design. John Wiley, New York, 2002. Cited on 354
Silberschatz A., Galvin P., and Gagne G. Operating System Concepts. John Wiley, New York, 7th edition, 2005. Cited on 224
Singh A., Castro M., Druschel P., and Rowstron A. Defending Against Eclipse Attacks on Overlay Networks. In 11th SIGOPS European Workshop, pages 115–120, New York, NY, Sept. 2004. ACM, ACM Press. Cited on 583
Singh A., Ngan T.-W., Druschel P., and Wallach D. S. Eclipse Attacks on Overlay Networks: Threats and Defenses. In 25th INFOCOM Conference, pages 1–12, Los Alamitos, CA., Apr. 2006. IEEE, IEEE Computer Society Press. Cited on 583
Singhal M. and Shivaratri N. Advanced Concepts in Operating Systems: Distributed, Database, and Multiprocessor Operating Systems. McGraw-Hill, New York, 1994. Cited on 399
Sivasubramanian S., Pierre G., and Steen M.van . Replicating Web Applications On-Demand. In 1st International Conference on Services Computing, pages 227–236, Los Alamitos, CA., Sept. 2004a. IEEE, IEEE Computer Society Press. Cited on 627 Sivasubramanian S., Szymaniak M., Pierre G., and Steen M.van . Replication for Web Hosting Systems. ACM Computing Surveys, 36(3):1–44, Sept. 2004b. Cited on
331, 620
Sivasubramanian S., Alonso G., Pierre G., and Steen M.van . GlobeDB: Autonomic Data Replication for Web Applications. In 14th International World Wide Web Conference, pages 33–42, New York, NY, May 2005. ACM Press. Cited on 628
Sivasubramanian S., Pierre G., Steen M.van , and Alonso G. GlobeCBC: Content- blind Result Caching for Dynamic Web Applications. Technical report, Vrije Universiteit, Department of Computer Science, Jan. 2006. Cited on 629
Sivrikaya F. and Yener B. Time Synchronization in Sensor Networks: A Survey. IEEE Network, 18(4):45–50, July 2004. Cited on 271
Skeen D. Nonblocking Commit Protocols. In SIGMOD International Conference on Management Of Data, pages 133–142. ACM, 1981. Cited on 395
Skeen D. and Stonebraker M. A Formal Model of Crash Recovery in a Distributed System. IEEE Transactions on Software Engineering, SE-9(3):219–228, Mar. 1983. Cited on 396
Smith J. and Nair R. The Architecture of Virtual Machines. Computer, 38(5):32–38, May 2005. Cited on 101, 102
Snir M., Otto S., Huss-Lederman S., Walker D., and Dongarra J. MPI: The Complete Reference – The MPI Core. MIT Press, Cambridge, MA., 1998. Cited on 169
Speakman T., Crowcroft J., Gemmell J., Farinacci D., Lin S., Leshchiner D., Luby M., Montgomery T., Rizzo L., Tweedly A., Bhaskar N., Edmonstone R., Sumanasekera R., and Vicisano L. PGM Reliable Transport Protocol Specification. RFC 3208, Dec. 2001. Cited on 662
Specht S. M. and Lee R. B. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. In Int’l Workshop on Security in Parallel and Distributed Systems, pages 543–550, Sept. 2004. Cited on 465
Spector A. Performing Remote Operations Efficiently on a Local Computer Network.
Do'stlaringiz bilan baham: |