CS 739 Paper Reading List

Return to CS739 home page.

Numbered papers are required reading for everyone in the class. Papers showed indented below a numbered paper are to be read by the presenter and incorporated in the day's presentation.

    Background

  1. J.H. Saltzer, D.P. Reed, and D.D. Clark "End-To-End Arguments in System Design", ACM Trans. on Computer Systems 2, 4, November 1984, pp. 277-288.
  2. Language Issues

  3. N. Carriero and D. Gelernter, "The S/Net's Linda Kernel", ACM Trans. on Computer Systems 4, 2, May 1986, pp. 110-129.
  4. E. Jul, H. Levy, N. Hutchinson, and A. Black, "Fine-Grained Mobility in the Emerald System", ACM Trans. on Computer Systems 6, 1, February 1988, pp. 109-133.
  5. Distributed Shared Memory

  6. D.J. Scales and K. Gharachorloo, "Towards Transparent and Efficient Software Distributed Shared Memory", 16th Symposium on Operating Systems Principles, Saint Malo, France, October 1997, pp. 157-169.
  7. R. Stets, S. Dwarkadas, N. Hardavellas, G. Hunt, L. Kontothanassis, S. Parthasarathy, and M. Scott, "Cashmere-2L: Software Coherent Shared Memory on a Clustered Remote-Write Network", 16th Symposium on Operating Systems Principles, Saint Malo, France, October 1997, pp. 170-183.

    Process Migration and Load Sharing

  8. M.L. Powell and B.P. Miller, "Process Migration in DEMOS/MP", 9th Symposium on Operating Systems Principles, Bretton Woods, NH, October 1983, pp. 110-119.
  9. M. Theimer, K. Lantz, and D. Cheriton, "Preemptable Remote Execution Facility for the V-System", 10th Symposium on Operating Systems Principles, Orcas Island, WA, December 1985, pp. 2-12.
  10. Grid and Distributed Computing

  11. W. Gropp and E. Lusk, "Goals Guiding Design: PVM and MPI", IEEE International Conference on Cluster Computing, Chicago, September 2002.
  12. D. Thain, T. Tannenbaum and M. Livny, "Distributed Computing in Practice: The Condor Experience", Concurrency and Computation: Practice and Experience 17, 2-4, February-April 2005, pp. 323-356.
  13. I. Foster, "Globus Toolkit Version 4: Software for Service-Oriented Systems", IFIP International Conference on Network and Parallel Computing, Springer-Verlag LNCS 3779, pp. 2-13, 2006.
  14. L. Peterson, T. Anderson, D. Culler, and T. Roscoe, "A Blueprint for Introducing Disruptive Technology into the Internet", First Workshop on Hot Topics in Networking (HotNets-I), October 2002.
  15. Time, Order, and Agreement

  16. L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System", Communications of the ACM, 21 7, July 1978, pp. 558-564.
  17. K. M. Chandy and L. Lamport, "Distributed Snapshots: Determining Global States of Distributed Systems", ACM Trans. on Computer Systems, 3 1, February 1985, pp. 63-75.
  18. B.P. Miller and J-D. Choi, "Breakpoints and Halting in Distributed Programs", 8th Int'l Conf. on Distributed Computing Systems, San Jose, CA, June 1988, pp. 316-323.
  19. L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem", ACM Transactions on Programming Languages Systems 4, 3, July 1982, pp. 382-401.

    Program Replay

  20. T.J. LeBlanc and J.M. Mellor-Crummey, "Debugging Passing Parallel Programs with Instant Replay", IEEE Transactions on Computers C36, 4, April 1987, pp. 471-482.
  21. Remote Procedure Calls

  22. M. D. Schroeder and M. Burrows, "Performance of the Firefly RPC", ACM Trans. on Computer Systems, 8 1, February 1990, pp. 1-17.
  23. Replication and Fault Tolerance

  24. E. C. Cooper, "Replicated Distributed Programs", 10th Symposium on Operating Systems Principles, Orcas Island, WA, December 1985 pp. 63-78.
  25. K.P. Birman, "Replication and Fault-Tolerance in the ISIS System", 10th Symposium on Operating Systems Principles, Orcas Island, WA, December 1985 pp. 79-86.
  26. Authentication

  27. M. Burrows, M. Abadi, and R. Needham, "A Logic of Authentication", 12th Symposium on Operating Systems Principles, Litchfield Park, AZ, December 1989, pp. 1-13.
  28. Netscape Communications, "How SSL Works", http://www.definityhealth.com/marketing/how_ssl_works.html, 1999.
  29. Mobile Computing

  30. G.H. Kuenning and G.J. Popek, "Automated Hoarding for Mobile Computers", 16th Symposium on Operating Systems Principles, Saint Malo, France, October 1997, pp. 264-275.
  31. V.C. Zandy and B.P. Miller, "Reliable Network Connections", ACM MobiCom 2002, Atlanta, September 2002.

Last modified: Wed Jan 24 16:35:17 CST 2007 by bart