⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.cs.utexas.edu^users^dahlin^classes^webos^reading.html

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 HTML
字号:
MIME-Version: 1.0
Server: CERN/3.0
Date: Monday, 06-Jan-97 20:24:53 GMT
Content-Type: text/html
Content-Length: 10206
Last-Modified: Friday, 15-Nov-96 01:05:13 GMT

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"><HTML><HEAD>   <TITLE>CS 395T: Web Operating Systems</TITLE>   <META NAME="GENERATOR" CONTENT="Mozilla/3.0Gold (X11; I; SunOS 5.5 sun4u) [Netscape]"></HEAD><BODY><H1 ALIGN=CENTER>CS 395T: Web Operating Systems</H1><CENTER><P>unique no. 47928 MWF 1:00-2:00 TAY 3.144 Mike Dahlin </P></CENTER><P>The <B>bold faced</B> papers will be available in a reader at the TexasUnion Copy Center (24th and Guadeloupe). Most of the rest are availableon line. </P><LI>Internet Basics </LI><UL><LI><B>D. Clark &quot;The Design Philosophy of the DARPA Internet Protocols&quot;SIGCOMM88 Computer Communication Review Vol. 19, No. 4 Aug 1988 pp 106-114.</B></LI><LI><A HREF="http://oac3.hsc.uth.tmc.edu/staff/snewton/tcp-tutorial/index.html">C.Hendrick &quot;Introduction to the Internet Protocols&quot; 1987. </A></LI><LI><A HREF="ftp://ftp.ee.lbl.gov/papers/routing.SIGCOMM.ps.Z">V. Paxon&quot;End-to-end Routing Behavior in the Internet&quot; ACM SIGCOMM96 Aug96. </A></LI><LI><A HREF="http://ds.internic.net/rfc/rfc793.txt">RFC 793 (TCP) </A></LI><LI><A HREF="ftp://ds.internic.net/rfc/rfc1883.txt">RFC 1883 (IP Version6) </A></LI><LI><B>Jacobson, V.&quot;Congestion avoidance and control&quot; (SIGCOMM'88 Symposium: Communications Architectures and Protocols, Stanford, CA,USA, 16-19 Aug. 1988). Computer Communication Review, Aug. 1988, vol.18,(no.4):314-29. </B></LI><LI><B>Jeff Mogul &quot;The Case for Persistent-Connection HTTP&quot; SIGCOMM95p299-313 </B></LI><P>-or- </P><LI><A HREF="http://HTTP.CS.Berkeley.EDU/~padmanab/papers/www_fall94.ps">V.Padmanabhan and J. Mogul &quot;Improving HTTP Latency&quot; </A></LI><LI><A HREF="http://www.sun.com/sunsoft/solaris/networking/webnfs/webnfs.ps">B.Callaghan &quot;WebNFS: The File System for the World Wide Web&quot; SunWhite Paper May 1996. </A></LI><LI><B>H. Eriksson &quot;MBone: The Multicast Backbone&quot; CACM Aug1994v37 pp 54--60 </B></LI><LI>another real-time networking paper? Ask Harrick. or perhaps uiuc &quot;vosaic&quot;</LI></UL><LI>Remote File Service </LI><UL><LI><B>Howard, J.H., Kazar, M.L., Menees, S.G., Nichols, D.A., Satyanarayanan,M., Sidebotham, R.N., West, M.J. &quot;Scale and Performance in a DistributedFile System&quot; ACM Transactions on Computer Systems Feb. 1988, Vol.6, No. 1, pp. 51-81. </B></LI><LI><B>J. Kistler and M. Satyanarayanan &quot;Disconnected Operation inthe Coda File System&quot; ACM Transactions on Computer Systems. Feb. 1992,Vol. 10, No. 1, pp. 3-25 </B></LI><LI><A HREF="http://www.eecs.harvard.edu/~vino/web/usenix.196">Gwertzman,J., Seltzer, M. &quot;World-Wide Web Cache Consistency&quot; Proceedingsof the 1996 Usenix Technical Conference, San Diego, CA January 1996. </A></LI><LI><A HREF="http://ftp.digital.com/~mogul/cachedraft.txt">Internet Draft&quot;A design for caching in HTTP 1.1&quot; </A></LI><LI><A HREF="http://www.research.digital.com/SRC/personal/Steve_Glassman/CachingTheWeb/paper.html">S.Glassman &quot;A Caching Relay for the World Wide Web&quot; ProceedingsWWW94 </A></LI><LI><A HREF="http://www1.cern.ch/PapersWWW94/luotonen.ps">A. Luotonen andK. Altis &quot;World-Wide Web Proxies&quot; Proceedings WWW94 April 94.</A></LI><LI><A HREF="http://catarina.usc.edu/danzig/cache.ps">Anawat Chankhunthod,Peter B. Danzig, Chuck Neerdaels, Michael F. Schwartz and Kurt J. Worrell.A Hierarchical Internet Object Cache. </A></LI><LI><A HREF="http://www.parc.xerox.com/csl/projects/bayou/pubs/sosp-95/www/BayouConflictsSOSP-web_1.html">D.Terry and M. Theimer and K. Petersen and A. Demers and M. Spreitzer andC. Hauser &quot;Managing Update Conflicts in Bayou, a Weakly ConnectedReplicated Storage System&quot; </A></LI><LI><B>C. Gray and D. Cheriton &quot;Leases: An Efficient Fault-TolerantMechanism for Distributed File Cache Consistency&quot; Symposium on OperatingSystems Principles 1989 pp. 202-210. </B></LI><LI><B><A HREF="http://sunsite.icm.edu.pl/~wojsyl/cache.html">WWW&nbsp;CacheRelated Links</A></B></LI><LI><B><A HREF="http://excalibur.usc.edu/cache-html/cache.html">Chankhunthodet. al &quot;A Hierarchical Internet Object Cache&quot;</A></B></LI></UL><LI>Extensibility </LI><UL><LI><A HREF="http://HTTP.CS.Berkeley.EDU/~daw/janus-usenix96.ps">D. Wagnerand I. Goldberg and R. Thomas &quot;A Secure Environment for UntrustedHelper Applications: Confining the Wily Hacker&quot; 1996 USENIX SecuritySymposium. To Appear. </A></LI><LI><A HREF="http://http.cs.berkeley.edu/~tea/sfi.ps">R. Wahbe, S. Lucco,T. Anderson and S. Graham. ``Efficient Software-Based Fault Isolation.''Proc. Fourteenth ACM Symposium on Operating System Principles, December1993, pp. 203-216. </A></LI><LI><A HREF="http://java.sun.com:80/doc/Overviews/java">Sun White Paper&quot;Java Language Overview&quot; 1996. </A></LI><LI><A HREF="http://java.sun.com/sfaq/may95/security.html">Sun Microsystems&quot;HotJava: The Security Story&quot;. May 1995. </A></LI><LI><A HREF="http://java.sun.com/sfaq/verifier.html">F. Yellin &quot;LowLevel Security in Java&quot; 1996. </A></LI><LI><A HREF="http://ferret.lmh.ox.ac.uk/~david/java/bugs/">D. Hopwood &quot;SecurityBugs in Java&quot; Web page -- descriptions and links to other sites. </A></LI><LI><A HREF="http://www.cs.princeton.edu/sip/pub/secure96.html">D. Deanand E. Felten and D. Wallach &quot;Java Security: From HotJava to Netscapeand Beyond&quot; 1996. </A></LI><LI><A HREF="http://www.tns.lcs.mit.edu/publications/ccr96.html">D. Tennenhouseand D. Wetherall &quot;Towards an Active Network Architecture&quot; ComputerCommunication Review. To appear. 1996. </A></LI><LI><A HREF="http://net.cs.utexas.edu/users/rdb/papers/SIGOPS96.ps.gz">E.Baldeschwiler and R. Blumofe and E. Brewer &quot;Atlas: An Infrastructurefor Global Computing&quot; Sept 1996. </A></LI><LI>Rent-a-server </LI></UL><LI>Scalable Services </LI><UL><LI><A HREF="http://now.cs.berkeley.edu/Case/case.ps">T. Anderson, D. Culler,D. Patterson &quot;A Case for Networks of Workstations: NOW&quot; IEEEMicro Feb. 1995. </A></LI><LI><A HREF="http://www1.cern.ch/PapersWWW94/ekatz.ps">E. Katz and M. Butlerand R. McGrath &quot;A Scalable HTTP Server: The NCSA Prototype&quot; WWW94Conference. </A></LI><LI><A HREF="http://www.cs.utexas.edu/users/dahlin/papers/tocs96.copyright.ps">T.Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli, and R. Wang. &quot;ServerlessNetwork File Systems.&quot; TOCS (February 1996) </A></LI><LI><A HREF="http://www.cs.utexas.edu/users/vin/CS395T/replicated.ps">J.D. Guyton and M. F. Schwartz, &quot;Locating Nearby Copies of ReplicatedInternet Servers&quot;, In Proceedings of ACM SIGCOMM'95, 1995 </A></LI><LI><A HREF="http://now.cs.berkeley.edu/SmartClients/usenix97.ps">C. Yoshikawa,B. Chun, P. Eastham, A. Vahdat, T. Anderson, and D. Culler. ``Using SmartClients to Build Scalable Services.'' To appear, Proc. of the 1997 USENIXConference, Jan. 1997. </A></LI><p><A HREF="usenix97.ps">DRAFT VERSION OF FINAL PAPER<A></UL><LI>Reliability/Availability </LI><UL><LI><B>J. Gray &quot;A Census of Tandem System Availability Between 1985and 1990&quot; IEEE Transactions on Reliability&quot; v39 n4 October 1990pp. 409--418. </B></LI><LI><B>T. Haerder and A. Reuter &quot;Principles of Transaction-OrientedDatabase Recovery&quot; ACM Computing Surveys 15(4):287--318 1983. </B></LI><LI>XXX Distributed reliability: Consensus/3-phase commit paper. </LI></UL><LI>Security: Secure communication </LI><UL><LI><B>D. Denning and P. Denning &quot;Data Security&quot; Computing Surveysv11 n3 Sept 1979 pp. 227--249. </B></LI><LI><B>J. Steiner and C. Neuman and J. Schiller &quot;Kerberos: An AuthenticationService for Open Network Systems&quot; USENIX Winter Conference Feb 9-121988 pp. 191--202. </B></LI><LI><A HREF="http://home.netscape.com/eng/ssl3/ssl-toc.html">A. Freierand P. Karlton and P. Kocher &quot;Secure Socket Layer&quot; March 96.</A></LI><LI><B>M. Burrows and M. Abadi and R. Needham &quot;A Logic of Authentication&quot;ACM Transactions on Computer Systems v8 n1 Feb 1990 pp. 18--36. </B></LI><LI><A HREF="http://www.research.digital.com/SRC/millicent/papers/millicent-w3c4/millicent.html">S.Glassman and M. Manasse and M. Abadi and P. Gauthier and P. Sobalvarro&quot;The Millicent Protocol for Inexpensive Electronic Commerce&quot;WWW4 Conference Dec 1995. </A></LI></UL><LI>Resource Allocation </LI><UL><LI><A HREF="http://www.psg.lcs.mit.edu/papers/stride-tm528.ps">Carl A.Waldspurger and William E. Weihl. Stride Scheduling: Deterministic Proportional-ShareResource Mangement, Technical Memo MIT/LCS/TM-528, June 1995. </A></LI><LI><A HREF="http://www.pdos.lcs.mit.edu/~engler/sosp-95.ps">D. Englerand F. Kaashoek and J. O'Toole &quot;Exokernel: An Operating System Architecturefor Application-Level Resource Management&quot; SOSP95 Dec. 1995 </A></LI><LI><A HREF="http://s2k-ftp.cs.berkeley.edu:8000/personal/aoki/papers/vldbj96.ps.gz">Z.Qin and W. Wang and F. Wu and T. Lo and P. Aoki &quot;Mariposa: A Wide-AreaDistributed Database System&quot; VLDB Journal 5 1 (Jan 9`1996) pp 48--63.</A></LI></UL><LI>Workloads</LI><UL><LI><A HREF="http://193.242.86.10/Products/WebFORCE/WebStone/paper.html">Webstone</A></LI><LI><A HREF="http://www.specbench.org/osg/web96/">SPECweb96</A></LI><LI><A HREF="http://town.hall.org/Archives/pub/ITA/html/traces.html">InternetTraffic Archive</A></LI></UL><LI>More topics? </LI><UL><LI>Hollow PC paper? </LI><LI>A. Birrell, R. Levin, R. Needham, M. Schroeder &quot;Grapevine: AnExercise in Distributed Computing&quot; CACM v25 n4 April 1982 pp. 260--274.</LI><LI>M. Schroeder, A. Birrell, R. Needham &quot;Experience With Grapevine:The Growth of a Distributed System&quot; ACM TOCS v2 n1 Feb 1984 pp 3--23.</LI><LI>VRML:Virtual reality modeling language </LI><LI>E-mail, news </LI><LI><A HREF="ftp://ftp.cs.colorado.edu/pub/techreports/schwartz/Essence.Jour.ps.Z">D.Hardy and M. Schwartz &quot;Customized Information Extraction as a Basisfor Resource Discovery&quot; TOCS v14 n2 May 1996 </A></LI></UL></BODY></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -