News: I have posted all presentations sent to me. One student is yet to send me his presentation. I am trying to contact him, but if any of you happen to know him, please ask him to send me the presentations. .!!!
Introduction | |
Course organization and Review.
Groups Projects Review Lectures Interrupt Handling Review |
|
Fundamentals of Distributed Systems | |
Hoare, C.A.R., J.Communicating
Sequential Processes, Communications of the ACM, August 1978, pp.
666-677. (Radhey Shah - 10/05/04) Presentation Slides Lauer, H.C., and Needham, R. M.,,On the Duality of Operating System Structures, Proc. Second Int'l Symposium on Operating Systems, IRIA, October 1978, reprinted in Operating Systems Review, Vol. 13, No. 2, April 1979, pp. 3-19 (Nicholas Lovett - 10/05/04) Presentation Slides Birrell, A.D. and Nelson, B. J.,Implementing Remote Procedure Calls, ACM Transactions on Computer Systems, February 1984, pages 39-59. (Saraswathy Somasundaram - 10/07/04) Presentation Slides Lamport, L.,, Time, Clocks, and the Ordering of Events in a Distributed System, Communications of the ACM, July 1978, pages 558-565 (Leif Halvorsen - 10/07/04) Presentation Slides Ricart, G. and Agrawala, A. K.,, An Optimal Algorithm for Mutual Exclusion in Computer Networks, Communications of the ACM, January 1981, pages 9-17 (Shawn Embleton - 10/12/04) Presentation Slides Lamport, L., Shostak, R., and Pease, M., The Byzantine Generals Problem, ACM Transaction on Programming Languages and Systems, July 1982, pp. 382-401. (Harish Ramakrishnan - 10/12/04) Presentation Slides Bartlett, J. F., A Nonstop Kernel, In Proceedings of the 8th ACM Symposium on Operating Systems Principles, Dec. 1981, pp. 22-29. (Craig Fruetel - 10/14/04) Presentation Slides Douglis, F., Kaashoek, M.F., Ousterhout, J. K., and Tanebaum, A. S. A Comparison of Two Distributed Systems: Amoeba and Sprite , Computing Systems, December 1991, pp. 353-384. (Finny Varghese - 10/14/04) Presentation Slides Ghemawat, S., Gobioff, H., and Leung, S. The Google File System , Proceedings of the Nineteenth ACM symposium on Operating systems principles, October 2003, pp. 29-43. (Pankaj Mahajan - 10/19/04) |
|
Protection and Security | |
Dennis, J. B. and Van Horn, E. C.,
Programming Semantics for Multiprogrammed Computations, Communications
of the ACM 9(3), March 1974, pp. 143-155. (Sharon Rajan - 10/19/04) Presentation Slides Schroeder, M. D. and Saltzer, J. H. , A Hardware Architecture for Implementing Protection Rings, Communications of the ACM 15(3), March 1972, pp. 157-170. (Sheetal Shankaregowda - 10/21/04) Presentation Slides INTEL., Pentium Protection Rings, Architecture and Programming Manual Vol. 3, Chapter 12, 1995, pp. 12-1-12-27. (Sherri Sparks - 10/21/04) Presentation Slides Fabry, R. S., Capability-Based Addressing, Communications of the ACM 17(7), July 1974, pp. 403-412. (Rajan John Thomas - 11/04/04) Presentation Slides England, D.M., The Capability Concept Mechanism and Structure in System 250, IRIA International Workshop on Protection in Operating Systems, Rocquencourt, (1974), pp. 63-82. (Christian Diercks - 11/04/04) Presentation Slides Saltzer, J. H. and Schroeder, M. D. , The Protection of Information in Computer Systems, Proceedings of the IEEE, 63(9), September 1975, pp. 1278-1308. (KeeHong Pang - 11/09/04) Presentation Slides Cohen, E. and Jefferson, D., Protection in The Hydra Operating System, Proceedings of the fifth ACM symposium on Operating systems principles, June 1975, pp. 141-160. (Farhan Saleem Khan - 11/09/04) Presentation Slides Denning, D. E. and Denning, P. J., Data Security, Computing Surveys, 11(3), September 1979, pp. 227-249. (Jeffrey L. Welch - 11/11/04) Presentation Slides Morris, R., and Thompson, K., Password Security: A Case History, Communications of the ACM, 22(11), November 1979, pp. 594-597. (Matthew Little - 11/11/04) Presentation Slides Lampson, B. W. A Note on the Confinement Problem, Communications of the ACM, 16(10), October 1973, pp. 613-615. (James Campbell - 11/16/04) Presentation Slides Needham, R.M. and Schroeder, M.D. Using Encryption for Authentication in Large Networks of Computers , Communications of the ACM, Vol. 21, No. 12 (December 1978), pp. 993-999. (Musawir Shah - 11/16/04) Presentation Slides Steiner, J.G., Neuman, C., and Schiller, J.I Kerberos: An Authentication Service for Open Network Systems , USENIX Winter Conference Proceedings, February 1988, pp. 191-202. (Gautami Shirhatti - 11/18/04) Presentation Slides |