Emergent (mis)behavior vs. complex software systems
暂无分享,去创建一个
[1] Master Gardener,et al. Mathematical games: the fantastic combinations of john conway's new solitaire game "life , 1970 .
[2] Eric Aiiman,et al. Sendmail -- an internetwork mail router , 1986 .
[3] V. Jacobson,et al. Congestion avoidance and control , 1988, SIGCOMM '88.
[4] Bernardo A. Huberman,et al. The ecology of computation , 1988, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[5] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[6] Lui Sha,et al. Priority Inheritance Protocols: An Approach to Real-Time Synchronization , 1990, IEEE Trans. Computers.
[7] Sharon E. Perl. Performance assertion checking , 1993, SOSP '93.
[8] V. Jacobson,et al. The synchronization of periodic routing messages , 1993, SIGCOMM '93.
[9] Brian N. Bershad,et al. Dynamic Page Mapping Policies for Cache Conflict Resolution on Standard Hardware , 1994, OSDI.
[10] K. K. Ramakrishnan,et al. The Ethernet capture effect: analysis and solution , 1994, Proceedings of 19th Conference on Local Computer Networks.
[11] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[12] K. K. Ramakrishnan,et al. Eliminating receive livelock in an interrupt-driven kernel , 1996, TOCS.
[13] H. Van Dyke Parunak,et al. Managing Emergent Behavior in Distributed Control Systems , 1997 .
[14] G. E. Reeves,et al. What Really Happened on Mars , 1998 .
[15] Ramesh Govindan,et al. BGP Route Flap Damping , 1998, RFC.
[16] P. Kidwell,et al. Darwin Among the machines: The evolution of global intelligence , 1999, IEEE Annals of the History of Computing.
[17] K Erol,et al. APPLICATION OF AGENT TECHNOLOGY TO TRAFFIC SIMULATION , 2000 .
[18] Deborah Estrin,et al. Embedded Every-where: A Research Agenda for Networked Systems of Embedded Computers , 2001 .
[19] Steven D. Gribble,et al. Robustness in complex systems , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[20] TriGS Debugger - A Tool for Debugging Active Database Behavior , 2001, DEXA.
[21] Stephen B. Wicker,et al. Phase transition phenomena in wireless ad hoc networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[22] P Dallard,et al. The London Millennium Footbridge , 2001 .
[23] Jeffrey C. Mogul,et al. Rethinking the TCP Nagle algorithm , 2001, CCRV.
[24] George Varghese,et al. Route flap damping exacerbates internet routing convergence , 2002, SIGCOMM '02.
[25] Eric A. Brewer,et al. Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.
[26] Ramesh Govindan,et al. Route flap damping exacerbates internet routing convergence , 2002, SIGCOMM 2002.
[27] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[28] Mary Baker,et al. Preserving peer replicas by rate-limited sampled voting , 2003, SOSP '03.
[29] Erik Riedel,et al. More Than an Interface - SCSI vs. ATA , 2003, FAST.
[30] Tammy Noergaard,et al. Embedded Software , 2009, Encyclopedia of Biometrics.
[31] Jeffrey S. Chase,et al. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control , 2004, OSDI.
[32] Paul Brett,et al. A Shared Global Event Propagation System to Enable Next Generation Distributed Services , 2004, WORLDS.
[33] George Candea,et al. Predictable Software - A Shortcut to Dependable Computing? , 2004, ArXiv.
[34] Armando Fox,et al. Capturing, indexing, clustering, and retrieving system history , 2005, SOSP '05.
[35] Samuel T. King,et al. Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.
[36] Joseph L. Hellerstein,et al. Reducing the Cost of IT Operations - Is Automation Always the Answer? , 2005, HotOS.
[37] Thu D. Nguyen,et al. Falling Off the Cliff: When Systems Go Nonlinear , 2005, HotOS.
[38] Amin Vahdat,et al. Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.
[39] Peter Scheuermann,et al. Active Database Systems , 2008, Wiley Encyclopedia of Computer Science and Engineering.