Dave Hudson

hashingit.com

Research resources

2020-02-27 19:30

Throughout my career I’ve been reading and collecting papers/articles that I find interesting. Here are some of them:

Date Published Author(s) Title
2020-01 Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, et al. Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Cloud-Scale Infrastructure
2019-11 Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
2018-06 Adam Furgal, Rodney Garratt, Zhiling Guo, Dave Hudson A proposal for a decentralized liquidity savings mechanism with side payments
2017-10-14 Shivaram Venkataraman, Aurojit Panda, Kay Ousterhout, Ali Ghodsi, et al. Drizzle: Fast and Adaptable Stream Processing at Scale
2017-09 Aishwarya Ganesan, Ramnatthan Alagappan, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions
2017-08-15 Martin Kleppmann, Alastair R. Beresford A Conflict-Free Replicated JSON Datatype
2017-08 Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors
2017-05 Peng Huang, Chuanxiong Guo, Lidong Zhou, Jacob R. Lorch, Yingnong Dang, et al. Gray Failure: The Achilles’ Heel of Cloud-Scale Systems
2017-05 Alexandre Verbitski, Anurag Gupta, Debanjan Saha, Murali Brahmadesam, et al. Amazon Aurora: Design Considerations for High Throughput Cloud-Native Relational Databases
2017-05 Todd Warszawski, Peter Bailis ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications
2017-03 Michael Wei, Amy Tai, Christopher J. Rossbach, Ittai Abraham, Maithem Munshed, et al. vCorfu: A Cloud-Scale Object Store on a Shared Log
2017-02-16 Michiel Overeem, Marten Spoor, Slinger Jansen The Dark Side of Event Sourcing: Managing Data Conversion
2017-02-14 Eric Brewer Spanner, TrueTime & The CAP Theorem
2017-02-02 Christopher S. Meiklejohn On the Design of Distributed Programming Models
2017-01 Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, Wenchao Zhou Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead
2016-11 Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan (Newman) Wu, Jieung Kim, Vilhelm Sjoberg, et al. CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels
2016-11 Irene Zhang, Niel Lebeck, Pedro Fonseca, Brandon Holt, Raymond Cheng, et al. Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications
2016-11 Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, et al. TensorFlow: A System for Large-Scale Machine Learning
2016-11 Haonan Lu, Christopher Hodsdon, Khiem Ngo, Shuai Mu, Wyatt Lloyd The SNOW Theorem and Latency-Optimal Read-Only Transactions
2016-11 Rasmus Dahlberg, Tobias Pulls, Roel Peeters Efficient Sparse Merkle Trees Caching Strategies and Secure (Non-)Membership Proofs
2016-11 Jialin Li, Ellis Michael, Naveen Kr. Sharma, Adriana Szekeres, Dan R. K. Ports Just say NO to Paxos Overhead: Replacing Consensus with Network Ordering
2016-10 Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden An In-Depth Study of More Than Ten Years of Java Exploitation
2016-09-28 Russell Pavlicek Unikernels Beyond Containers to the Next Generation of Cloud
2016-05 Ali Basiri, Niosha Behnam, Ruud de Rooij, Lorin Hochstein, Luke Kosewski, et al. Chaos Engineering
2016-05 Maryam M. Najafabadi, Taghi M. Khoshgoftaar, Amri Napolitano, Charles Wheelus RUDY Attack: Detection at the Network Level and Its Important Features
2016-03-04 Martin Kleppmann Making Sense of Stream Processing
2016-03 Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
2016-01-06 Daniel J. Bernstein, Tanja Lange Failures in NIST’s ECC standards
2016-01 Doug Woos, James R. Wilcox, Steve Anton, Zachary Tatlock, Michael D. Ernst, Thomas Anderson Planning for Change in a Formal Verification of the Raft Consensus Protocol
2016 Sang-Woo Jun 50,000,000,000 Instructions Per Second : Design and Implementation of a 256-Core BrainFuck Computer
2015-06-03 Peter Bailis, Alan Fekete†, Michael J. Franklin, Ali Ghodsi, Joseph M. Hellerstein, et al. Feral Concurrency Control: An Empirical Investigation of Modern Application Integrity
2015-05 Jacob R. Lorch, Andrew Baumann, Lisa Glendenning, Dutch Meyer, Andrew Warfield Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services
2015-05 Natalia Kwasnikowska, Luc Moreau, Jan Van den Bussche A Formal Account of the Open Provenance Model
2015-05 Anil Madhavapeddy, Thomas Leonard, Magnus Skjegstad, Thomas Gazagnaire, et al. Jitsu: Just-In-Time Summoning of Unikernels
2015-03-20 Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
2015-03-19 Arvind Narayanan, Joanna Huey, Edward W. Felten A Precautionary Approach to Big Data Privacy
2015-03 Matthias Grimmer, Chris Seaton, Thomas Wurthinger, Hanspeter Mossenbock Dynamically Composing Languages in a Modular Way: Supporting C Extensions for Dynamic Languages
2015-01-21 Carl Hewitt Actor Model of Computation: Scalable Robust Information Systems
2014-12-11 Jeremy Rubin, Manali Naik, Nitya Subramanian Merkelized Abstract Syntax Trees
2014-11-27 Ittay Eyal The Miner’s Dilemma
2014-11 Peter Bailis, Alan Fekete†, Michael J. Franklin, Ali Ghodsi, Joseph M. Hellerstein, et al. Coordination Avoidance in Database Systems
2014-11 Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov Deanonymisation of Clients in Bitcoin P2P Network
2014-10 Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Renna Rodrigues, Xu Zhao, Yongle Zhang, et al. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems
2014-10 Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, et al. All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications
2014-10 Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards Efficient Record-Level Keyless Signatures for Audit Logs
2014-06 Zachary DeVito, Daniel Ritchie, Matt Fisher, Alex Aitken, Pat Hanrahan First-class Runtime Generation of High-performance Types using Exotypes
2014-06 Laurel Emurian, Arun Raghavan, Lei Shao, Jeffrey M. Rosen, Marios Papaefthymiou, et al. Pitfalls of Accurately Benchmarking Thermally Adaptive Chips
2014-04 Tony Garnock-Jones, Sam Tobin-Hochstadt, Matthias Felleisen The Network as a Language Construct
2014-04 Sandeep Kulkarni, Murat Demirbas, Deepak Madeppa, Bharadwaj Avva, Marcelo Leone Logical Physical Clocks and Consistent Snapshots in Globally Distributed Databases
2014-01 Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi Authenticated Data Structures, Generically
2014-01 Sebastian Burckhardt, Alexey Gotsman, Hongseok Yang, Marek Zawirski Replicated Data Types: Specification, Verification, Optimality
2014 Alex Homer, John Sharp, Larry Brader, Masashi Narumoto, Trent Swanson Cloud Design Patterns
2013-12 Mahesh Balakrishnan, Dahlia Malkhi, John D. Davis, Vijayan Prabhakaran, et al. CORFU: A Distributed Shared Log
2013-11 Peter Bailis, Aaron Davidson, Alan Fekete†, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica Highly Available Transactions: Virtues and Limitations
2013-11 Peter Alvaro, Peter Bailis, Neil Conway, Joseph M. Hellerstein Consistency Without Borders
2013-10 Santiago Perez De Rosso, Daniel Jackson What’s Wrong with Git? A Conceptual Design Analysis
2013-10 Ahto Buldas, Andres Kroonmaa1, and Risto Laanoja Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees
2013-07-06 Alex Shinn, John Cowan, Arthur A. Gleckler, et al. Revised^7 Report on the Algorithmic Language Scheme
2013-04 Viktor Leis, Alfons Kemper, Thomas Neumann The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases
2013-04 Christoffer Dall, Jason Nieh KVM/ARM: Experiences Building the Linux ARM Hypervisor
2013-02-04 Dror G. Feitelson, Eitan Frachtenberg, Kent L. Beck Development and Deployment at Facebook
2012-12 Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, et al. Distributed Time-aware Provenance
2012-10 James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, et al. Spanner: Google’s Globally-Distributed Database
2012-08-06 Quanyan Zhu, Carl Gunter and Tamer Basar Tragedy of Anticommons in Digital Right Management of Medical Records
2012-08 Jordan Lee Brown Verifiable and Redactable Medical Documents
2012-06 David P. Reed “Simultaneous” Considered Harmful: Modular Parallelism (deprecating “locks”, “semaphores”, serializability, and other sequential thinking)
2012-05 Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, et al. On the (Im)possibility of Obfuscating Programs
2012-04 Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, et al. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing
2012-03 Jaekyu Lee, Hyesoon Kim, Richard Vuduc When Prefetching Works, When It Doesn’t, and Why
2012-02 Ahto Buldas, Andres Kroonmaa, Allan Park Open KSI Format
2012-01-23 Ashish Kundu, Mikhail Atallah, Elisa Bertino Efficient Leakage-free Authentication of Trees, Graphs and Forests
2012-01 Leslie Beard, Rebecca Schein, Dante Morra, Kumanan Wilson, Jennifer Keelan The challenges in making electronic health records accessible to patients
2012 Brian Mulloy Web API Design Crafting Interfaces that Developers Love
2012 Dominic Betts, Julián Domínguez, Grigori Melnik, Fernando Simonazzi, Mani Subramanian Exploring CQRS and Event Sourcing
2011-11-06 Jukka Suomela Survey of Local Algorithms
2011-08 Thomas Neumann Efficiently Compiling Efficient Query Plans for Modern Hardware
2011-07-25 Mateusz Berezecki, Eitan Frachtenberg, Mike Paleczny, Kenneth Steele Many-Core Key-Value Store
2011-07 Marc Shapiro, Nuno Preguica, Carlos Baquero, Marek Zawirski Conflict-free Replicated Data Types
2011-06 Matei Zaharia, Benjamin Hindman, Andy Konwinski, Ali Ghodsi, Anthony D. Joseph, et al. The Datacenter Needs an Operating System
2011-06 Wenchao Zhou, Ling Ding, Andreas Haeberlen, Zachary Ives, Boon Thau Loo TAP: Time-aware Provenance for Distributed Systems
2011-06 Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham Transforming Provenance using Redaction
2011-06 Wenchao Zhou, Qiong Fei, Andreas Haeberlen, Zachary Ives, Shengzhi Sun, et al. NetTrails: A Declarative Platform for Maintaining and Querying Provenance in Distributed Systems
2011-03 Md Kamruzzaman, Steven Swanson, Dean M. Tullsen Inter-core Prefetching for Multicore Processors Using Migrating Helper Threads
2011-01 Marc Shapiro, Nuno Preguica, Carlos Baquero, Marek Zawirski A comprehensive study of Convergent and Commutative Replicated Data Types
2010-12 Jaekyu Lee, Nagesh B. Lakshminarayana, Hyesoon Kim, Richard Vuduc Many-Thread Aware Prefetching Mechanisms for GPGPU Applications
2010-11-18 Slava Pestov, Daniel Ehrenberg, Joe Groff Factor: A Dynamic Stack-based Programming Language
2010-09-01 Peter Buneman, Susan B. Davidson Data provenance – the foundation of data quality
2010-09 Chris Shore Efficient C Code for ARM Devices
2010-07-27 Luc Moreau, Ben Cliordb, Juliana Freirec, Joe Futrelle, et al. The Open Provenance Model Core Specification (v1.1)
2009-12 Ragib Hasan, Radu Sion, Marianne Winslett Preventing History Forgery with Secure Provenance
2009-12 David A. Carvalho, Manuela Pereira, Mário M. Freire Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection
2009-10 Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, et al. seL4: Formal Verification of an OS Kernel
2009-10 Jing Zhang, Adriane Chapman, Kristen LeFevre Do You Know Where Your Data’s Been? – Tamper-Evident Database Provenance
2009-07-16 P. Rogaway, T. Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
2009-07 Rafael Accorsi Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
2009-07 Dominikus Herzberg, Tim Reichert CONCATENATIVE PROGRAMMING An Overlooked Paradigm in Functional Programming
2009-05-24 Satoshi Nakamoto Bitcoin: A Peer-to-Peer Electronic Cash System
2008-12 Cristian Cadar, Daniel Dunbar, Dawson Engler KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
2008-12 Paulo Sergio Almeida, Carlos Baquero, Victor Fonte Interval Tree Clocks: A Logical Clock for Dynamic Systems
2008-04-20 Christopher Diggins Simple Type Inference for Higher-Order Stack-Oriented Languages
2007-12-04 Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, et al. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
2007-10 Andreas Haeberlen, Petr Kuznetsov, Peter Druschel PeerReview: Practical Accountability for Distributed Systems
2007-10 Iavor S. Diatchki, Thomas Hallgren, Mark P. Jones, Rebekah Leslie, Andrew Tolmach Writing Systems Software in a Functional Language
2007-03 Boris Glavic, Klaus Dittrich Data Provenance: A Categorization of Existing Approaches
2006-10-18 Alexander W. Dent Fundamental problems in provable security and cryptography
2006-09 Jan Reineke, Daniel Grund, Christoph Berg, Reinhard Wilhelm Predictability of Cache Replacement Policies
2006-01 Nathan Sidwell, Joseph Myers Improving Software Floating Point Support
2005-12 Gerome Miklau, Dan Suciu Implementing a Tamper-evident Database System
2005-11-16 Ralf Hinze, Ross Paterson Finger trees: a simple general-purpose data structure
2005-11 John Regehr, Alastair Reid, Kirk Webb Eliminating Stack Overflow by Abstract Interpretation
2005-04 Bryan Ford, Pyda Srisuresh, Dan Kegel Peer-to-Peer Communication Across Network Address Translators
2004-10 Niklau Wirth Programming in Oberon
2004-04 Manuel M. T. Chakravarty, Gabriele Keller, Patryk Zadarnowski A Functional Perspective on SSA Optimisation Algorithms
2003-11-20 Joe Armstrong Making reliable distributed systems in the presence of sodware errors
2003-07 Chris Okasaki Flattening Combinators: Surviving Without Parenthesis
2003-01 Amos Fiat, Haim Kaplan Making Data Structures Confluently Persistent
2003 Roberto Tamassia Authenticated Data Structures
2002-12-03 Roy Friedman, Alon Kama Transparent Fault-Tolerant Java Virtual Machine
2002-08-02 Josh Berdine, Peter O’Hearn, Uday Reddy, Hayo Thielecke Linear Continuation-Passing
2002-08-01 Adam Back Hashcash - A Denial of Service Counter-Measure
2002-07-31 Paul A. Karger, Roger R. Schell Thirty Years Later: Lessons from the Multics Security Evaluation
2002-07-01 Timothy L. Harris Dependable Software Needs Pervasive Debugging
2002-07 Neil Johnson, Alan Mycroft Pattern and Approximate-Pattern Matching for Program Compaction
2001-07 Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)
2001-06 Don Davis Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP and XML
2001 Phil Bagwell Ideal Hash Trees
2000-12 Peter Buneman, Sanjeev Khanna, Wang-Chiew Tan Data Provenance: Some Basic Issues
2000-08-29 Leslie Lamport The Part-Time Parliament
2000-08-23 Simon Peyton Jones, Jean-Marc Eber, Julian Seward Composing contracts: an adventure in financial engineering
2000-08 Jonathan Stone, Craig Partridge When The CRC and TCP Checksum Disagree
2000-02-14 Seth Lloyd Ultimate physical limits to computation
1999-07 Barbara H. Liskov, Jeannette M. Wing Behavioral Subtyping Using Invariants and Constraints
1999-05 Bruce Schneier, John Kelsey Secure Audit Logs to Support Computer Forensics
1998-02-09 C. J. Fidge A limitation of vector timestamps for reconstructing distributed computations
1997-10 C. Michael Holloway Why Engineers Should Consider Formal Methods
1997-03 Jacques Supcik, Moira C. Norrie An Object-Oriented Database Programming Environment for Oberon
1996-09 Chris Okasaki Purely Functional Data Structures
1996-06-18 Laurie Law, Susan Sabett, Jerry Solinas How to Make a Mint: The Cryptography of Anonymous Electronic Cash
1996-06 Patrick O’Neil, Edward Cheng, Dieter Gawlick, Elizabeth O’Neil The Log-Structured Merge Tree (LSM-Tree)
1996-05 Luca Cardelli Object-based vs. Class-based Languages
1996-01 Nicholas Pippenger Pure Versus Impure Lisp
1995-12 Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gun Sirer, et al. Extensibility, Safety and Performance in the SPIN Operating System
1995-12 Jochen Liedtke On Micro-Kernel Construction
1995-12 Dawson R. Engler, M. Frans Kaashoek, James O’Toole Jr. Exokernel: An Operating System Architecture for Application-Level Resource Management
1995-10-01 John Thornley Performance of a Class of Highly-Parallel Divide-and-Conquer Algorithms
1995-08-16 Tom Axford, Mike Joy Aladin: An Abstract Machine for Integrating Functional and Procedural Programming
1995-06 Brad Calder, Dirk Grunwald, Donald Lindsay, James Martin, et al. Corpus-based Static Branch Prediction
1995 Ross Anderson, Roger Needham Programming Satan’s Computer
1994-05 Josef Templ Metaprogramming in Oberon
1994-03 Henry G. Baker Linear Logic and Permutation Stacks - The Forth Shall Be First
1994-02 James G. Mitchell, Jonathan J. Gibbons, Graham Hamilton, Peter B. Kessler, et al. An Overview of the Spring System
1994 Josef Templ Metaprogramming in Oberon
1994 Michael Franz Compiler Optimizations Should Pay for Themselves
1993-10 Henry G. Baker Equal Rights for Functional Objects or, The More Things Change, The More They Are the Same
1993-07 Bill Stoddart, Peter J. Knaggs Type Inference in Stack Based Languages
1993-02-09 Thomas Ball, James R. Larus Branch Prediction For Free
1993-01 Tom Axford, Mike Joy List Processing Primitives for Parallel Computation
1992-08 Henry G. Baker Lively Linear Lisp - ‘Look Ma, No Garbage’
1992-02 Thomas E. Anderson, Brian N. Bershad, Edward D. Lazowska, Henry M. Levy Scheduler Activiations: Efficient Kernel Support for User-Level Management of Parallelism
1992 Tom Axford The Divide-and-Conquer Paradigm as a Basis for Parallel Language Design
1992 Niklaus Wirth, Jürg Gutknecht Project Oberon The Design of an Operating System and Compiler
1991-08 Andrew S. Tanenbaum, M. Frans Kaashoek, Robbert van Renesse, Henri E. Bal The Amoeba Distributed Operating System - A Status Report
1991-08 Erik Meijer, Maarten Fokkinga, Ross Paterson Functional Programming with Bananas, Lenses, Envelopes and Barbed Wire
1991-07-24 Mendel Rosenblum, John K. Ousterhout The Design and Implementation of a Log-Structured File System
1991-07 David Ungar, Craig Chambers, Bay-Wei Chang, Urs Holzle Organizing Programs Without Classes
1991-06 Charles M. C. Lee, Mark J. Ready Inferring Trade Direction from Intraday Data
1991-04 Mary Wolcott Hall Managing Interprocedural Optimization
1990-12 Fred B. Schneider Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial
1990 John Hughes Why Functional Programming Matters
1989-10 John Ousterhout Why Aren’t Operating Ssytems Getting Faster As Fast As Hardware?
1989-09 Richard Rashid, Robert Baron, Alessandro Forin, David Golub, Michael Jones, et al. Mach: A Foundation for Open Systems
1989-01 Richard Kelsey, Paul Hudak Realistic Compilation by Program Transformation
1989 Phil Trinder A Functional Database
1988-11 C. J. Fidge Partial Orders for Parallel Debugging
1988-02 Colin J. Fidge Timestamps in Message-Passing Systems That Preserve the Partial Ordering
1987-05 C. J. Fidge Reproducible Tests in CSP
1985-04 Michael J. Fischer, Nancy A. Lynch, Michael S. Paterson Impossibility of Distributed Consensus with One Faulty Process
1984-11 J. H. Saltzer, D. P. Reed, D. D. Clark End-To-End Arguments in Systems Design
1984-08 Ken Thompson Reflections on Trusting Trust
1984-08 Gene T. J Wuu, Arthur J. Bernstein Efficient Solutions to the Replicated Log and Dictionary Problems
1984-07 S. D. Brookes, C. A. R. Hoare, A. W. Roscoe A Theory of Communicating Sequential Processes
1983-12 Theo Haerder, Andreas Reuter Principles of Transaction-Oriented Database Recovery
1983-07 Butler W. Lampson Hints for Computer System Design
1983-02 David P. Reed Implementing Atomic Actions on Decentralized Data
1982-07 Leslie Lamport, Robert Shostak, Marshall Pease The Byzantine Generals Problem
1981 Charles Antony Richard Hoare The Emperor’s Old Clothes
1980-11 Jim Gray, Paul McJones, Mike Blasgen, Bruce Lindsay, Raymond Lorie, Tom Price, et al. The Recovery Manager of the System R Database Manager
1980-04 M. Pease, R. Shostak, L. Lamport Reaching Agreement in the Presence of Faults
1979-06 Ralph Charles Merkle Secrecy, Authentication, and Public Key Systems
1979-04-02 Hugh C. Lauer, Roger M. Needham On the Duality of Operating System Structures
1979-03 Guy Lewis Steele Jr., Gerald Jay Sussman Design of LISP-Based Processors or, SCHEME: A Dieletric LISP or, Finite Memories Considered Harmful or, LAMBDA, the Ultimate Opcode
1978-08 John Backus Can Programming Be Liberated from the von Neumann Style? A Functional Style and Its Algebra of Programs
1978-07 Leslie Lamport Time, Clocks, and the Ordering of Events in a Distributed System
1978-05 Guy Lewis Steele Jr., Gerald Jay Sussman The Art of the Interpreter or, The Modularity Complex (Parts Zero, One, and Two
1978-05 Guy Lewis Steele Jr. RABBIT: A Compiler for SCHEME
1978-01 Guy Lewis Steele Jr., Gerald Jay Sussman The Revised Report on SCHEME, a Dialect of LISP
1977-12 Wolfram Bartussek, David L. Parnas Using Traces to Write Abstract Specifications for Software Modules
1977-12 Carl Hewitt, Henry Baker Jr. Actors and Continuous Functionals
1977-10 Guy Lewis Steele Jr. Debunking the “Expensive Procedure Call” Myth or Procedure Call Implementations Considered Harmfull or, LAMBDA: the Ultimate Goto
1976-11 Guy Lewis Steele Jr. LAMBDA, the Ultimate Declarative
1976-03-10 Guy Lewis Steele Jr., Gerald Jay Sussman LAMBDA, the Ultimate Imperative
1975-12 Gerald Jay Sussman, Guy Lewis Steele Jr. SCHEME An Interpreter for the Extended Lambda Calculus
1975-03 Donald B. Johnson Finding all the Elementary Circuits of a Directed Graph
1974-10 C. A. R. Hoare Monitors: An Operating System Structuring Concept
1974-07 Dennis M. Ritchie, Ken Thompson The UNIX Time-Sharing System
1974-06 Paul A. Karger, Roger R. Schell Multics Security Evaluation: Vulnerability Analysis
1974-03 Barbara Liskov, Stephen Zilles Programming with Abstract Data Types
1973-12 William A. Wulf, Richard K. Johnsson, Charles B. Weinstock, Steven O. Hobbs The Design of an Optimizing Compiler
1972-12 D. L. Parnas On the Criteria To Be Used in Decomposing Systems into Modules
1970-09 Peter J. Denning Virtual Memory
1970-06 E. F. Codd A Relational Model of Data for Large Shared Data Banks
1970 J. E. Thornton Design of a Computer: The Control Data 6600
1968-04 Melvin E. Conway How do Committees Invent?
1960-04 John McCarthy Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I
1956 Claude E. Shannon The Bandwagon
1950-10 A. M. Turing Computing Machinery and Intelligence
1948-07 C. E. Shannon A Mathematical Theory of Communication
1948 A. M. Turing Intelligent Machinery