Throughout my career I’ve been reading and collecting papers/articles that I find interesting. Here are some of them:
Date Published | Author(s) | Title |
---|---|---|
2020-01 | Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, Xinsheng Yang, Qingwei Lin, Youjiang Wu, Sebastien Levy, Murali Chintalapati | Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Cloud-Scale Infrastructure |
2019-11 | Martin Kleppmann, Adam Wiggins, Peter van Hardenberg, Mark McGranaghan | Local-First Software: You Own Your Data, in spite of the Cloud |
2019-11 | Chia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter | Civet: An Efficient Java Partitioning Framework for Hardware Enclaves |
2018-06 | Adam Furgal, Rodney Garratt, Zhiling Guo, Dave Hudson | A proposal for a decentralized liquidity savings mechanism with side payments |
2017-10-14 | Shivaram Venkataraman, Aurojit Panda, Kay Ousterhout, Ali Ghodsi, Michael J. Franklin, Benjamin Recht, Ion Stoica | Drizzle: Fast and Adaptable Stream Processing at Scale |
2017-09 | Aishwarya Ganesan, Ramnatthan Alagappan, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau | Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed Storage Reactions to Single Errors and Corruptions |
2017-08-15 | Martin Kleppmann, Alastair R. Beresford | A Conflict-Free Replicated JSON Datatype |
2017-08 | Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich | The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors |
2017-05 | Peng Huang, Chuanxiong Guo, Lidong Zhou, Jacob R. Lorch, Yingnong Dang, Murali Chintalapati, Randolph Yao | Gray Failure: The Achilles’ Heel of Cloud-Scale Systems |
2017-05 | Alexandre Verbitski, Anurag Gupta, Debanjan Saha, Murali Brahmadesam, Kamal Gupta, Raman Mittal, Sailesh Krishnamurthy, Sandor Maurice, et al. | Amazon Aurora: Design Considerations for High Throughput Cloud-Native Relational Databases |
2017-05 | Todd Warszawski, Peter Bailis | ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications |
2017-03 | Michael Wei, Amy Tai, Christopher J. Rossbach, Ittai Abraham, Maithem Munshed, Medhavi Dhawan, Jim Stabile, Udi Wieder, Scott Fritchie, et al. | vCorfu: A Cloud-Scale Object Store on a Shared Log |
2017-02-16 | Michiel Overeem, Marten Spoor, Slinger Jansen | The Dark Side of Event Sourcing: Managing Data Conversion |
2017-02-14 | Eric Brewer | Spanner, TrueTime & The CAP Theorem |
2017-02-02 | Christopher S. Meiklejohn | On the Design of Distributed Programming Models |
2017-01 | Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, Wenchao Zhou | Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead |
2016-11 | Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan (Newman) Wu, Jieung Kim, Vilhelm Sjoberg, David Costanzo | CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels |
2016-11 | Irene Zhang, Niel Lebeck, Pedro Fonseca, Brandon Holt, Raymond Cheng, Ariadna Norberg, Arvind Krishnamurthy, Henry M. Levy | Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications |
2016-11 | Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, et al. | TensorFlow: A System for Large-Scale Machine Learning |
2016-11 | Haonan Lu, Christopher Hodsdon, Khiem Ngo, Shuai Mu, Wyatt Lloyd | The SNOW Theorem and Latency-Optimal Read-Only Transactions |
2016-11 | Rasmus Dahlberg, Tobias Pulls, Roel Peeters | Efficient Sparse Merkle Trees Caching Strategies and Secure (Non-)Membership Proofs |
2016-11 | Jialin Li, Ellis Michael, Naveen Kr. Sharma, Adriana Szekeres, Dan R. K. Ports | Just say NO to Paxos Overhead: Replacing Consensus with Network Ordering |
2016-10 | Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden | An In-Depth Study of More Than Ten Years of Java Exploitation |
2016-09-28 | Russell Pavlicek | Unikernels Beyond Containers to the Next Generation of Cloud |
2016-05 | Ali Basiri, Niosha Behnam, Ruud de Rooij, Lorin Hochstein, Luke Kosewski, Justin Reynolds, Casey Rosenthal | Chaos Engineering |
2016-05 | Maryam M. Najafabadi, Taghi M. Khoshgoftaar, Amri Napolitano, Charles Wheelus | RUDY Attack: Detection at the Network Level and Its Important Features |
2016-03-04 | Martin Kleppmann | Making Sense of Stream Processing |
2016-03 | Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi | Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack |
2016-01-06 | Daniel J. Bernstein, Tanja Lange | Failures in NIST’s ECC standards |
2016-01 | Doug Woos, James R. Wilcox, Steve Anton, Zachary Tatlock, Michael D. Ernst, Thomas Anderson | Planning for Change in a Formal Verification of the Raft Consensus Protocol |
2016 | Sang-Woo Jun | 50,000,000,000 Instructions Per Second : Design and Implementation of a 256-Core BrainFuck Computer |
2015-06-03 | Peter Bailis, Alan Fekete†, Michael J. Franklin, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica | Feral Concurrency Control: An Empirical Investigation of Modern Application Integrity |
2015-05 | Jacob R. Lorch, Andrew Baumann, Lisa Glendenning, Dutch Meyer, Andrew Warfield | Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services |
2015-05 | Natalia Kwasnikowska, Luc Moreau, Jan Van den Bussche | A Formal Account of the Open Provenance Model |
2015-05 | Anil Madhavapeddy, Thomas Leonard, Magnus Skjegstad, Thomas Gazagnaire, David Sheets, Dave Scott, Richard Mortier, Amir Chaudhry, et al. | Jitsu: Just-In-Time Summoning of Unikernels |
2015-03-20 | Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg | Eclipse Attacks on Bitcoin’s Peer-to-Peer Network |
2015-03-19 | Arvind Narayanan, Joanna Huey, Edward W. Felten | A Precautionary Approach to Big Data Privacy |
2015-03 | Matthias Grimmer, Chris Seaton, Thomas Wurthinger, Hanspeter Mossenbock | Dynamically Composing Languages in a Modular Way: Supporting C Extensions for Dynamic Languages |
2015-01-21 | Carl Hewitt | Actor Model of Computation: Scalable Robust Information Systems |
2015-01 | Pat Helland | Immutability Changes Everything |
2014-12-11 | Jeremy Rubin, Manali Naik, Nitya Subramanian | Merkelized Abstract Syntax Trees |
2014-11-27 | Ittay Eyal | The Miner’s Dilemma |
2014-11 | Peter Bailis, Alan Fekete†, Michael J. Franklin, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica | Coordination Avoidance in Database Systems |
2014-11 | Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov | Deanonymisation of Clients in Bitcoin P2P Network |
2014-10 | Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Renna Rodrigues, Xu Zhao, Yongle Zhang, Pranay U. Jain, Michael Stumm | Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems |
2014-10 | Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau | All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications |
2014-10 | Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards | Efficient Record-Level Keyless Signatures for Audit Logs |
2014-06 | Zachary DeVito, Daniel Ritchie, Matt Fisher, Alex Aitken, Pat Hanrahan | First-class Runtime Generation of High-performance Types using Exotypes |
2014-06 | Laurel Emurian, Arun Raghavan, Lei Shao, Jeffrey M. Rosen, Marios Papaefthymiou, Kevin Pipe, Thomas F. Wenisch, Milo Martin | Pitfalls of Accurately Benchmarking Thermally Adaptive Chips |
2014-04 | Tony Garnock-Jones, Sam Tobin-Hochstadt, Matthias Felleisen | The Network as a Language Construct |
2014-04 | Sandeep Kulkarni, Murat Demirbas, Deepak Madeppa, Bharadwaj Avva, Marcelo Leone | Logical Physical Clocks and Consistent Snapshots in Globally Distributed Databases |
2014-01 | Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi | Authenticated Data Structures, Generically |
2014-01 | Sebastian Burckhardt, Alexey Gotsman, Hongseok Yang, Marek Zawirski | Replicated Data Types: Specification, Verification, Optimality |
2014 | Alex Homer, John Sharp, Larry Brader, Masashi Narumoto, Trent Swanson | Cloud Design Patterns |
2013-12 | Mahesh Balakrishnan, Dahlia Malkhi, John D. Davis, Vijayan Prabhakaran, Michael Wei, Ted Wobber | CORFU: A Distributed Shared Log |
2013-11 | Peter Bailis, Aaron Davidson, Alan Fekete†, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica | Highly Available Transactions: Virtues and Limitations |
2013-11 | Peter Alvaro, Peter Bailis, Neil Conway, Joseph M. Hellerstein | Consistency Without Borders |
2013-10 | Santiago Perez De Rosso, Daniel Jackson | What’s Wrong with Git? A Conceptual Design Analysis |
2013-10 | Ahto Buldas, Andres Kroonmaa1, and Risto Laanoja | Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees |
2013-07-06 | Alex Shinn, John Cowan, Arthur A. Gleckler, Steven Ganz, Aaron W. Hsu, Bradley Lucier, Emmanuel Medernach, Alexey Radul, Jeffrey T. Read, et al. | Revised^7 Report on the Algorithmic Language Scheme |
2013-04 | Viktor Leis, Alfons Kemper, Thomas Neumann | The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases |
2013-04 | Christoffer Dall, Jason Nieh | KVM/ARM: Experiences Building the Linux ARM Hypervisor |
2013-02-04 | Dror G. Feitelson, Eitan Frachtenberg, Kent L. Beck | Development and Deployment at Facebook |
2012-12 | Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, Micah Sherr | Distributed Time-aware Provenance |
2012-10 | James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, et al. | Spanner: Google’s Globally-Distributed Database |
2012-08-06 | Quanyan Zhu, Carl Gunter and Tamer Basar | Tragedy of Anticommons in Digital Right Management of Medical Records |
2012-08 | Jordan Lee Brown | Verifiable and Redactable Medical Documents |
2012-06 | David P. Reed | “Simultaneous” Considered Harmful: Modular Parallelism (deprecating “locks”, “semaphores”, serializability, and other sequential thinking) |
2012-05 | Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang | On the (Im)possibility of Obfuscating Programs |
2012-04-14 | Pat Helland | Idempotence is Not a Medical Condition |
2012-04 | Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker, Ion Stoica | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing |
2012-03 | Jaekyu Lee, Hyesoon Kim, Richard Vuduc | When Prefetching Works, When It Doesn’t, and Why |
2012-02 | Ahto Buldas, Andres Kroonmaa, Allan Park | Open KSI Format |
2012-01-23 | Ashish Kundu, Mikhail Atallah, Elisa Bertino | Efficient Leakage-free Authentication of Trees, Graphs and Forests |
2012-01 | Leslie Beard, Rebecca Schein, Dante Morra, Kumanan Wilson, Jennifer Keelan | The challenges in making electronic health records accessible to patients |
2012 | Brian Mulloy | Web API Design Crafting Interfaces that Developers Love |
2012 | Dominic Betts, Julián Domínguez, Grigori Melnik, Fernando Simonazzi, Mani Subramanian | Exploring CQRS and Event Sourcing |
2011-11-06 | Jukka Suomela | Survey of Local Algorithms |
2011-11 | Antonio Badia, Daniel Lemire | A Call to Arms: Revisiting Database Design |
2011-08 | Thomas Neumann | Efficiently Compiling Efficient Query Plans for Modern Hardware |
2011-07-25 | Mateusz Berezecki, Eitan Frachtenberg, Mike Paleczny, Kenneth Steele | Many-Core Key-Value Store |
2011-07 | Marc Shapiro, Nuno Preguica, Carlos Baquero, Marek Zawirski | Conflict-free Replicated Data Types |
2011-06 | Pat Helland | If You Have Too Much Data, then ‘Good Enough’ Is Good Enough |
2011-06 | Matei Zaharia, Benjamin Hindman, Andy Konwinski, Ali Ghodsi, Anthony D. Joseph, Randy Katz, Scott Shenker, Ion Stoica | The Datacenter Needs an Operating System |
2011-06 | Wenchao Zhou, Ling Ding, Andreas Haeberlen, Zachary Ives, Boon Thau Loo | TAP: Time-aware Provenance for Distributed Systems |
2011-06 | Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham | Transforming Provenance using Redaction |
2011-06 | Wenchao Zhou, Qiong Fei, Andreas Haeberlen, Zachary Ives, Shengzhi Sun, Tao Tao, Boon Thau Loo, Micah Sherr | NetTrails: A Declarative Platform for Maintaining and Querying Provenance in Distributed Systems |
2011-05 | Stephen Wilson | Identities Evolved - Why federated identity is easier said than done |
2011-03 | Md Kamruzzaman, Steven Swanson, Dean M. Tullsen | Inter-core Prefetching for Multicore Processors Using Migrating Helper Threads |
2011-01 | Marc Shapiro, Nuno Preguica, Carlos Baquero, Marek Zawirski | A comprehensive study of Convergent and Commutative Replicated Data Types |
2010-12 | Jaekyu Lee, Nagesh B. Lakshminarayana, Hyesoon Kim, Richard Vuduc | Many-Thread Aware Prefetching Mechanisms for GPGPU Applications |
2010-11-18 | Slava Pestov, Daniel Ehrenberg, Joe Groff | Factor: A Dynamic Stack-based Programming Language |
2010-09-01 | Peter Buneman, Susan B. Davidson | Data provenance – the foundation of data quality |
2010-09 | Chris Shore | Efficient C Code for ARM Devices |
2010-07-27 | Luc Moreau, Ben Cliordb, Juliana Freirec, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, et al. | The Open Provenance Model Core Specification (v1.1) |
2009-12 | Ragib Hasan, Radu Sion, Marianne Winslett | Preventing History Forgery with Secure Provenance |
2009-12 | David A. Carvalho, Manuela Pereira, Mário M. Freire | Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection |
2009-10 | Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, et al. | seL4: Formal Verification of an OS Kernel |
2009-10 | Jing Zhang, Adriane Chapman, Kristen LeFevre | Do You Know Where Your Data’s Been? – Tamper-Evident Database Provenance |
2009-07-16 | P. Rogaway, T. Shrimpton | Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance |
2009-07 | Rafael Accorsi | Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer? |
2009-07 | Dominikus Herzberg, Tim Reichert | CONCATENATIVE PROGRAMMING An Overlooked Paradigm in Functional Programming |
2009-05-24 | Satoshi Nakamoto | Bitcoin: A Peer-to-Peer Electronic Cash System |
2008-12 | Cristian Cadar, Daniel Dunbar, Dawson Engler | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs |
2008-12 | Paulo Sergio Almeida, Carlos Baquero, Victor Fonte | Interval Tree Clocks: A Logical Clock for Dynamic Systems |
2008-04-20 | Christopher Diggins | Simple Type Inference for Higher-Order Stack-Oriented Languages |
2007-12-04 | Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezokuy, Danfeng Yao | Efficient signature schemes supporting redaction, pseudonymization, and data deidentification |
2007-10 | Andreas Haeberlen, Petr Kuznetsov, Peter Druschel | PeerReview: Practical Accountability for Distributed Systems |
2007-10 | Iavor S. Diatchki, Thomas Hallgren, Mark P. Jones, Rebekah Leslie, Andrew Tolmach | Writing Systems Software in a Functional Language |
2007-09 | Michael Stonebreaker, Samuel Madden, Daniel J. Abadi, Stavros Harizopoulos, Nabil Hachem, Pat Helland | The Endo of an Architectural Era (It’s Time for a Complete Rewrite) |
2007-03 | Boris Glavic, Klaus Dittrich | Data Provenance: A Categorization of Existing Approaches |
2007-01 | Pat Helland | Life beyond Distributed Transactions: an Apostate’s Opinion |
2006-10-18 | Alexander W. Dent | Fundamental problems in provable security and cryptography |
2006-09 | Jan Reineke, Daniel Grund, Christoph Berg, Reinhard Wilhelm | Predictability of Cache Replacement Policies |
2006-01 | Nathan Sidwell, Joseph Myers | Improving Software Floating Point Support |
2005-12 | Gerome Miklau, Dan Suciu | Implementing a Tamper-evident Database System |
2005-11-16 | Ralf Hinze, Ross Paterson | Finger trees: a simple general-purpose data structure |
2005-11 | John Regehr, Alastair Reid, Kirk Webb | Eliminating Stack Overflow by Abstract Interpretation |
2005-04 | Bryan Ford, Pyda Srisuresh, Dan Kegel | Peer-to-Peer Communication Across Network Address Translators |
2004-10 | Niklau Wirth | Programming in Oberon |
2004-04 | Manuel M. T. Chakravarty, Gabriele Keller, Patryk Zadarnowski | A Functional Perspective on SSA Optimisation Algorithms |
2003-11-20 | Joe Armstrong | Making reliable distributed systems in the presence of sodware errors |
2003-07 | Chris Okasaki | Flattening Combinators: Surviving Without Parenthesis |
2003-01 | Amos Fiat, Haim Kaplan | Making Data Structures Confluently Persistent |
2003 | Roberto Tamassia | Authenticated Data Structures |
2002-12-03 | Roy Friedman, Alon Kama | Transparent Fault-Tolerant Java Virtual Machine |
2002-08-02 | Josh Berdine, Peter O’Hearn, Uday Reddy, Hayo Thielecke | Linear Continuation-Passing |
2002-08-01 | Adam Back | Hashcash - A Denial of Service Counter-Measure |
2002-07-31 | Paul A. Karger, Roger R. Schell | Thirty Years Later: Lessons from the Multics Security Evaluation |
2002-07-01 | Timothy L. Harris | Dependable Software Needs Pervasive Debugging |
2002-07 | Neil Johnson, Alan Mycroft | Pattern and Approximate-Pattern Matching for Program Compaction |
2001-07 | Hugo Krawczyk | The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?) |
2001-06 | Don Davis | Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP and XML |
2001 | Phil Bagwell | Ideal Hash Trees |
2000-12 | Peter Buneman, Sanjeev Khanna, Wang-Chiew Tan | Data Provenance: Some Basic Issues |
2000-08-29 | Leslie Lamport | The Part-Time Parliament |
2000-08-23 | Simon Peyton Jones, Jean-Marc Eber, Julian Seward | Composing contracts: an adventure in financial engineering |
2000-08 | Jonathan Stone, Craig Partridge | When The CRC and TCP Checksum Disagree |
2000-02-14 | Seth Lloyd | Ultimate physical limits to computation |
1999-07 | Barbara H. Liskov, Jeannette M. Wing | Behavioral Subtyping Using Invariants and Constraints |
1999-05 | Bruce Schneier, John Kelsey | Secure Audit Logs to Support Computer Forensics |
1998-02-09 | C. J. Fidge | A limitation of vector timestamps for reconstructing distributed computations |
1997-10 | C. Michael Holloway | Why Engineers Should Consider Formal Methods |
1997-03 | Jacques Supcik, Moira C. Norrie | An Object-Oriented Database Programming Environment for Oberon |
1996-09 | Chris Okasaki | Purely Functional Data Structures |
1996-06-18 | Laurie Law, Susan Sabett, Jerry Solinas | How to Make a Mint: The Cryptography of Anonymous Electronic Cash |
1996-06 | Patrick O’Neil, Edward Cheng, Dieter Gawlick, Elizabeth O’Neil | The Log-Structured Merge Tree (LSM-Tree) |
1996-05 | Luca Cardelli | Object-based vs. Class-based Languages |
1996-01 | Nicholas Pippenger | Pure Versus Impure Lisp |
1995-12 | Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gun Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan Eggers | Extensibility, Safety and Performance in the SPIN Operating System |
1995-12 | Jochen Liedtke | On Micro-Kernel Construction |
1995-12 | Dawson R. Engler, M. Frans Kaashoek, James O’Toole Jr. | Exokernel: An Operating System Architecture for Application-Level Resource Management |
1995-10-01 | John Thornley | Performance of a Class of Highly-Parallel Divide-and-Conquer Algorithms |
1995-08-16 | Tom Axford, Mike Joy | Aladin: An Abstract Machine for Integrating Functional and Procedural Programming |
1995-06 | Brad Calder, Dirk Grunwald, Donald Lindsay, James Martin, Michael Mozer, Benjamin Zorn | Corpus-based Static Branch Prediction |
1995 | Ross Anderson, Roger Needham | Programming Satan’s Computer |
1994-05 | Josef Templ | Metaprogramming in Oberon |
1994-03 | Henry G. Baker | Linear Logic and Permutation Stacks - The Forth Shall Be First |
1994-02 | James G. Mitchell, Jonathan J. Gibbons, Graham Hamilton, Peter B. Kessler, Yousef A. Khalidi, Panos Kougiouris, Peter W. Manday, et al. | An Overview of the Spring System |
1994 | Josef Templ | Metaprogramming in Oberon |
1994 | Michael Franz | Compiler Optimizations Should Pay for Themselves |
1993-10 | Henry G. Baker | Equal Rights for Functional Objects or, The More Things Change, The More They Are the Same |
1993-07 | Bill Stoddart, Peter J. Knaggs | Type Inference in Stack Based Languages |
1993-02-09 | Thomas Ball, James R. Larus | Branch Prediction For Free |
1993-01 | Tom Axford, Mike Joy | List Processing Primitives for Parallel Computation |
1992-08 | Henry G. Baker | Lively Linear Lisp - ‘Look Ma, No Garbage’ |
1992-02 | Thomas E. Anderson, Brian N. Bershad, Edward D. Lazowska, Henry M. Levy | Scheduler Activiations: Efficient Kernel Support for User-Level Management of Parallelism |
1992 | Tom Axford | The Divide-and-Conquer Paradigm as a Basis for Parallel Language Design |
1992 | Niklaus Wirth, Jürg Gutknecht | Project Oberon The Design of an Operating System and Compiler |
1991-08 | Andrew S. Tanenbaum, M. Frans Kaashoek, Robbert van Renesse, Henri E. Bal | The Amoeba Distributed Operating System - A Status Report |
1991-08 | Erik Meijer, Maarten Fokkinga, Ross Paterson | Functional Programming with Bananas, Lenses, Envelopes and Barbed Wire |
1991-07-24 | Mendel Rosenblum, John K. Ousterhout | The Design and Implementation of a Log-Structured File System |
1991-07 | David Ungar, Craig Chambers, Bay-Wei Chang, Urs Holzle | Organizing Programs Without Classes |
1991-06 | Charles M. C. Lee, Mark J. Ready | Inferring Trade Direction from Intraday Data |
1991-04 | Mary Wolcott Hall | Managing Interprocedural Optimization |
1990-12 | Fred B. Schneider | Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial |
1990 | John Hughes | Why Functional Programming Matters |
1989-10 | John Ousterhout | Why Aren’t Operating Ssytems Getting Faster As Fast As Hardware? |
1989-09 | Richard Rashid, Robert Baron, Alessandro Forin, David Golub, Michael Jones, Daniel Julin, Douglas Orr, Richard Sanzi | Mach: A Foundation for Open Systems |
1989-01 | Richard Kelsey, Paul Hudak | Realistic Compilation by Program Transformation |
1989 | Phil Trinder | A Functional Database |
1988-11 | C. J. Fidge | Partial Orders for Parallel Debugging |
1988-02 | Colin J. Fidge | Timestamps in Message-Passing Systems That Preserve the Partial Ordering |
1987-05 | C. J. Fidge | Reproducible Tests in CSP |
1985-04 | Michael J. Fischer, Nancy A. Lynch, Michael S. Paterson | Impossibility of Distributed Consensus with One Faulty Process |
1984-11 | J. H. Saltzer, D. P. Reed, D. D. Clark | End-To-End Arguments in Systems Design |
1984-08 | Ken Thompson | Reflections on Trusting Trust |
1984-08 | Gene T. J Wuu, Arthur J. Bernstein | Efficient Solutions to the Replicated Log and Dictionary Problems |
1984-07 | S. D. Brookes, C. A. R. Hoare, A. W. Roscoe | A Theory of Communicating Sequential Processes |
1983-12 | Theo Haerder, Andreas Reuter | Principles of Transaction-Oriented Database Recovery |
1983-07 | Butler W. Lampson | Hints for Computer System Design |
1983-02 | David P. Reed | Implementing Atomic Actions on Decentralized Data |
1982-07 | Leslie Lamport, Robert Shostak, Marshall Pease | The Byzantine Generals Problem |
1981 | Charles Antony Richard Hoare | The Emperor’s Old Clothes |
1980-11 | Jim Gray, Paul McJones, Mike Blasgen, Bruce Lindsay, Raymond Lorie, Tom Price, Franco Putzolu, Irving Traiger | The Recovery Manager of the System R Database Manager |
1980-04 | M. Pease, R. Shostak, L. Lamport | Reaching Agreement in the Presence of Faults |
1979-06 | Ralph Charles Merkle | Secrecy, Authentication, and Public Key Systems |
1979-04-02 | Hugh C. Lauer, Roger M. Needham | On the Duality of Operating System Structures |
1979-03 | Guy Lewis Steele Jr., Gerald Jay Sussman | Design of LISP-Based Processors or, SCHEME: A Dieletric LISP or, Finite Memories Considered Harmful or, LAMBDA, the Ultimate Opcode |
1978-08 | John Backus | Can Programming Be Liberated from the von Neumann Style? A Functional Style and Its Algebra of Programs |
1978-07 | Leslie Lamport | Time, Clocks, and the Ordering of Events in a Distributed System |
1978-05 | Guy Lewis Steele Jr., Gerald Jay Sussman | The Art of the Interpreter or, The Modularity Complex (Parts Zero, One, and Two |
1978-05 | Guy Lewis Steele Jr. | RABBIT: A Compiler for SCHEME |
1978-01 | Guy Lewis Steele Jr., Gerald Jay Sussman | The Revised Report on SCHEME, a Dialect of LISP |
1977-12 | Wolfram Bartussek, David L. Parnas | Using Traces to Write Abstract Specifications for Software Modules |
1977-12 | Carl Hewitt, Henry Baker Jr. | Actors and Continuous Functionals |
1977-10 | Guy Lewis Steele Jr. | Debunking the “Expensive Procedure Call” Myth or Procedure Call Implementations Considered Harmfull or, LAMBDA: the Ultimate Goto |
1976-11 | Guy Lewis Steele Jr. | LAMBDA, the Ultimate Declarative |
1976-03-10 | Guy Lewis Steele Jr., Gerald Jay Sussman | LAMBDA, the Ultimate Imperative |
1975-12 | Gerald Jay Sussman, Guy Lewis Steele Jr. | SCHEME An Interpreter for the Extended Lambda Calculus |
1975-11 | R. Levin, E. Cohen, W. Corwin, F. Pollack, W. Wulf | Policy/Mechanism Separation in Hydra |
1975-03 | Donald B. Johnson | Finding all the Elementary Circuits of a Directed Graph |
1974-10 | C. A. R. Hoare | Monitors: An Operating System Structuring Concept |
1974-07 | Dennis M. Ritchie, Ken Thompson | The UNIX Time-Sharing System |
1974-06 | Paul A. Karger, Roger R. Schell | Multics Security Evaluation: Vulnerability Analysis |
1974-03 | Barbara Liskov, Stephen Zilles | Programming with Abstract Data Types |
1973-12 | William A. Wulf, Richard K. Johnsson, Charles B. Weinstock, Steven O. Hobbs | The Design of an Optimizing Compiler |
1972-12 | D. L. Parnas | On the Criteria To Be Used in Decomposing Systems into Modules |
1970-09 | Peter J. Denning | Virtual Memory |
1970-06 | E. F. Codd | A Relational Model of Data for Large Shared Data Banks |
1970-04 | Per Brinch Hansen | The Nucleus of a Multiprogramming System |
1970 | J. E. Thornton | Design of a Computer: The Control Data 6600 |
1968-04 | Melvin E. Conway | How do Committees Invent? |
1960-04 | John McCarthy | Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I |
1956 | Claude E. Shannon | The Bandwagon |
1950-10 | A. M. Turing | Computing Machinery and Intelligence |
1948-07 | C. E. Shannon | A Mathematical Theory of Communication |
1948 | A. M. Turing | Intelligent Machinery |
1936-11-12 | A. M. Turing | On Computable Numbers, with an Application to the Entscheidungsproblem |