Bibliography
[Accetta et al. 1986] M. Accetta, R. Baron, W. Bolosky, D. B. Golub, R. Rashid, A. Tevanian, and M. Young, “Mach: A New Kernel Foundation for UNIX Development”, Proceedings of the Summer USENIX Conference (1986).
[Adl-Tabatabai et al. 2007] A.-R. Adl-Tabatabai, C. Kozyrakis, and B. Saha, “Unlocking Concurrency”, Queue, Volume 4, Number 10 (2007), pages 24-33.
[Agrawal and Abbadi 1991] D. P. Agrawal and A. E. Abbadi, “An Efficient and Fault-Tolerant Solution of Distributed Mutual Exclusion”, ACM Transactions on Computer Systems, Volume 9, Number 1 (1991), pages 1-20.
[Agre 2003] P. E. Agre, “P2P and the Promise of Internet Equality”, Communications of the ACM, Volume 46, Number 2 (2003), pages 39-42.
[Ahituv et al. 1987] N. Ahituv, Y. Lapid, and S. Neumann, “Processing Encrypted Data”, Communications of the ACM, Volume 30, Number 9 (1987), pages 777-780.
[Ahmed 2000] I. Ahmed, “Cluster Computing: A Glance at Recent Events”, IEEE Concurrency, Volume 8, Number 1
[Akl 1983] S. G. Akl, “Digital Signatures: A Tutorial Survey”, Computer, Volume 16, Number 2 (1983).
[Akyurek and Salem 1993] S. Akyurek and K. Salem, “Adaptive Block Rearrangement”, Proceedings of the International Conference on Data Engineering (1993), pages 182-189.
[Alt 1993] H. Alt, “Removable Media in Solaris”, Proceedings of the Winter USENIX Conference (1993).
[Anderson 1990] T. E. Anderson, “The Performance of Spin Lock Alternatives for Shared-Money Multiprocessors”, IEEE Trans. Parallel Distrib. ...