[Next]
[Up]
[Previous]
Next: About this document ...
Up: Scale and Performance in
Previous: Acknowledgments
- 1
-
M. Accetta et al.
Mach: A new kernel foundation for UNIX development.
In Proceedings of the USENIX Summer Conference, 1986.
- 2
-
Collaborative advanced interagency research network (cairn).
https://www.cairn.net, 1997.
- 3
-
D. Balfanz and D.R. Simon.
Windowbox: A simple security model for the connected desktop.
In Proceedings of the 4th USENIX Windows Systems Symposium,
August 2000.
- 4
-
G. Banga, P. Druschel, and J.C. Mogul.
Resource containers: a new facility for resource management in server
systems.
In Proceedings of the 3rd USENIX Symposium on Operating system
design and implementation, February 1999.
- 5
-
L. Breslau et al.
Web caching, and Zipf-like distributions: Evidence, and
implications, Mar 1999.
- 6
-
E. Bugnion, S. Devine, and M. Rosenblum.
Disco: running commodity operating systems on scalable
multiprocessors.
In Proceedings of the Sixteenth ACM Symposium on Operating
System Principles, October 1997.
- 7
-
R. Carr and J. Hennessy.
WSCLOCK: a simple and effective algorithm for virtual memory
management.
In Proceedings of the 8th Symposium on Operating System
Principles, Dec 1981.
- 8
-
A. Chou et al.
An Empirical Study of Operating System Errors.
In Proceedings of the 18th ACM Symposium on Operating
System Principles (SOSP '01), October 2001.
- 9
-
R.J. Creasy.
The origin of the VM/370 time-sharing system.
IBM Journal of Research and Development, 25(5), 1981.
- 10
-
R.P. Draves, B.N. Bershad, R.F. Rashid, and R.W. Dean.
Using continuations to implement thread management and communication
in operating systems.
In Proceedings of the 13th ACM Symposium on Operating Systems
Principles, Pacific Grove, CA, USA, October 1991.
- 11
-
P. Druschel and G. Banga.
Lazy receiver processing: A network subsystem architecture for server
systems.
In Proceedings of the Second Symposium on Operating Systems
Design and Implementation, Seattle, WA, USA, Oct 1996.
- 12
-
D. Ely, S. Savage, and D. Wetherall.
Alpine: A user-level infrastructure for network protocol development.
In Proceedings of the Third USENIX Symposium on Internet
Technologies and Systems (USITS '01), March, 2001.
- 13
-
B. Ford et al.
Microkernels meet recursive virtual machines.
In Proceedings of the Second Symposium on Operating Systems
Design and Implementation, October 1996.
- 14
-
B. Ford et al.
The Flux OSKit: A substrate for kernel and language research.
In Proceedings of the 16th ACM Symposium on Operating Systems
Principles, St.-Malo, France, October 1997.
- 15
-
A.F. Forin, D.B. Golub, and B.N. Bershad.
An I/O system for Mach.
In Proceedings of the Usenix Mach Symposium (MACHNIX), Nov
1991.
- 16
-
I. Goldberg, D. Wagner, R. Thomas, and E.A. Brewer.
A secure environment for untrusted helper applications.
In Proceedings of the sixth USENIX Security Symposium, July
1996.
- 17
-
R.P. Goldberg.
Architectural Principles for Virtual Computer Systems.
PhD thesis, Harvard University, 1972.
- 18
-
D. Gollmann.
Computer Security.
John Wiley and Son, Ltd., 1st edition, February 1999.
- 19
-
Robert S. Gray.
Agent Tcl: A Flexible and Secure Mobile-Agent System.
In Proceedings of the Fourth Annual Usenix Tcl/Tk Workshop,
1996.
- 20
-
M.F. Kaashoek et al.
Application performance and flexibility on exokernel systems.
In Proceedings of the Sixteenth ACM Symposium on Operating
System Principles, October 1997.
- 21
-
P.A. Karger et al.
A retrospective on the VAX VMM security kernel.
17(11), November 1991.
- 22
-
J. Lepreau, B. Ford, and M. Hibler.
The persistant relevance of the local operating system to global
applications.
In Proceedings of the Seventh SIGOPS European Workshop, Sep
1996.
- 23
-
I. Leslie et al.
The design and implementation of an operating system to support
distributed multimedia applications.
IEEE Journal of Selected Areas in Communications, 14(7), 1996.
- 24
-
R. Meushaw and D. Simard.
NetTop: Commercial technology in high assurance applications.
https://www.vmware.com/, 2000.
- 25
-
V. Paxson, J. Mahdavi, A. Adams, and M. Mathis.
An architecture for large-scale Internet measurement.
IEEE Communications Magazine, 36(8):48-54, August 1998.
- 26
-
J. Reumann et al.
Virtual services: A new abstraction for server consolidation.
In Proceedings of the 2000 USENIX Annual Technical Conference,
San Diego, USA, June 2000.
- 27
-
J.S. Robin and C.E. Irvine.
Analysis of the Intel Pentium's ability to support a secure
virtual machine monitor.
In Proceedings of the 9th USENIX Security Symposium, Denver,
CO, August 2000.
- 28
-
J. Rushby.
Design and verification of secure systems.
In Proceedings of the 8th Symposium on Operating System
Principles, December 1981.
- 29
-
J.H. Saltzer and M.D. Schroeder.
The protection of information in computer systems.
Proceedings of the IEEE, 63(9), 1975.
- 30
-
I. Stoica et al.
Chord: A scalable content-addressable network.
In Proceedings of ACM SIGCOMM 2001, San Diego, USA, Aug 2001.
- 31
-
J. Sugerman, G. Venkitachalam, and B. Lim.
Virtualizing I/O devices on VMware workstation's hosted virtual
machine monitor.
In Proceedings of the 2001 Annual Usenix Technical Conference,
Boston, MA, USA, June 2001.
- 32
-
M.M. Swift et al.
Improving the granularity of access control in Windows NT.
In Proceedings of the 6th ACM Symposium On Access Control Models
and Technologies, May 2001.
- 33
-
D.S. Wallach et al.
Extensible security architectures for Java.
In Proceedings of the Sixteenth ACM Symposium on Operating
System Principles, Oct 1997.
- 34
-
A. Wolman et al.
Organization-based analysis of web-object sharing and caching.
In Proceedings of the 2nd USENIX Conference on Internet
Technologies and Systems (USITS '99), Boulder, CO, Oct 1999.
Andrew Whitaker
2002-10-07