Bibliography
 
[Accetta et al. 1986] M. Accetta, R. Baron, W. Bolosky, D. B. Golub, R. Rashid, A. Tevanian, and M. Young, “Mach: A New Kernel Foundation for UNIX Development”, Proceedings of the Summer USENIX Conference (1986).
 
[Adl-Tabatabai et al. 2007] A.-R. Adl-Tabatabai, C. Kozyrakis, and B. Saha, “Unlocking Concurrency”, Queue, Volume 4, Number 10 (2007), pages 24-33.
 
[Agrawal and Abbadi 1991] D. P. Agrawal and A. E. Abbadi, “An Efficient and Fault-Tolerant Solution of Distributed Mutual Exclusion”, ACM Transactions on Computer Systems, Volume 9, Number 1 (1991), pages 1-20.
 
[Agre 2003] P. E. Agre, “P2P and the Promise of Internet Equality”, Communications of the ACM, Volume 46, Number 2 (2003), pages 39-42.
 
[Ahituv et al. 1987] N. Ahituv, Y. Lapid, and S. Neumann, “Processing Encrypted Data”, Communications of the ACM, Volume 30, Number 9 (1987), pages 777-780.
 
[Ahmed 2000] I. Ahmed, “Cluster Computing: A Glance at Recent Events”, IEEE Concurrency, Volume 8, Number 1
 
[Akl 1983] S. G. Akl, “Digital Signatures: A Tutorial Survey”, Computer, Volume 16, Number 2 (1983).
 
[Akyurek and Salem 1993] S. Akyurek and K. Salem, “Adaptive Block Rearrangement”, Proceedings of the International Conference on Data Engineering (1993), pages 182-189.
 
[Alt 1993] H. Alt, “Removable Media in Solaris”, Proceedings of the Winter USENIX Conference (1993).
 
[Anderson 1990] T. E. Anderson, “The Performance of Spin Lock Alternatives for Shared-Money Multiprocessors”, IEEE Trans. Parallel Distrib. ...

Get Operating System Concepts, 8th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.