Bibliography
[Abbot 1984] IEEE Transactions on Software Engineering, , Number 3 (1984), pages 268–274.
, "Intervention Schedules for Real-Time Programming",[Accetta et al. 1986] Proceedings of the Summer USENIX Conference (1986), pages 93–112.
, , , , , , and , "Mach: A New Kernel Foundation for Unix Development",[Agrawal and Abbadi 1991] ACM Transactions on Computer Systems, , Number 1 (1991), pages 1–20.
and , "An Efficient and Fault-Tolerant Solution of Distributed Mutual Exclusion",[Agre 2003] Communications of the ACM, , Number 2 (2003), pages 39–42.
, "P2P and the Promise of Internet Equality",[Ahituv et al. 1987] Communications of the ACM, , Number 9 (1987), pages 777–780.
, , and , "Processing Encrypted Data",[Ahmed 2000] IEEE Concurrency, , Number 1 (2000).
, "Cluster Computing: A Glance at Recent Events",[Akl 1983] Computer, , Number 2 (1983), pages 15–24.
, "Digital Signatures: A Tutorial Survey",[Akyurek and Salem 1993] Proceedings of the International Conference on Data Engineering (1993), pages 182–189.
and , "Adaptive Block Rearrangement",[Alt 1993] Proceedings of the Winter USENIX Conference (1993), pages 281–287.
, "Removable Media in Solaris",[Anderson 1990]
, "The Performance of Spin Lock Alternatives for Shared-Money ...Get Operating System Concepts, Seventh Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.