BibliographyAccetta, M., Baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., and Young, M. 1986. "Mach: A New Kernel Foundation for UNIX Development," Proceedings of the 1986 Summer USENIX Conference, pp. 93113, Atlanta, GA. Adobe Systems Inc. 1999. PostScript Language Reference Manual, Third Edition. Addison-Wesley, Reading, MA. Aho, A. V., Kernighan, B. W., and Weinberger, P. J. 1988. The AWK Programming Language. Addison-Wesley, Reading, MA. Andrade, J. M., Carges, M. T., and Kovach, K. R. 1989. "Building a Transaction Processing System on UNIX Systems," Proceedings of the 1989 USENIX Transaction Processing Workshop, vol. May, pp. 1322, Pittsburgh, PA. Arnold, J. Q. 1986. "Shared Libraries on UNIX System V," Proceedings of the 1986 Summer USENIX Conference, pp. 395404, Atlanta, GA. AT&T. 1989. System V Interface Definition, Third Edition. Addison-Wesley, Reading, MA. AT&T. 1990a. UNIX Research System Programmer's Manual, Tenth Edition, Volume I. Saunders College Publishing, Fort Worth, TX. AT&T. 1990b. UNIX Research System Papers, Tenth Edition, Volume II. Saunders College Publishing, Fort Worth, TX. AT&T. 1990c. UNIX System V Release 4 BSD/XENIX Compatibility Guide. Prentice-Hall, Englewood Cliffs, NJ. AT&T. 1990d. UNIX System V Release 4 Programmer's Guide: STREAMS. Prentice-Hall, Englewood Cliffs, NJ. AT&T. 1990e. UNIX System V Release 4 Programmer's Reference Manual. Prentice-Hall, Englewood Cliffs, NJ. AT&T. 1991. UNIX System V Release 4 System Administrator's Reference Manual. Prentice-Hall, Englewood Cliffs, NJ. Bach, M. J. 1986. The Design of the UNIX Operating System. Prentice-Hall, Englewood Cliffs, NJ. Bolsky, M. I., and Korn, D. G. 1995. The New KornShell Command and Programming Language, Second Edition. Prentice-Hall, Englewood Cliffs, NJ. Chen, D., Barkley, R. E., and Lee, T. P. 1990. "Insuring Improved VM Performance: Some No-Fault Policies," Proceedings of the 1990 Winter USENIX Conference, pp. 1122, Washington, D.C. Comer, D. E. 1979. "The Ubiquitous B-Tree," ACM Computing Surveys, vol. 11, no. 2, pp. 121137 (June). Date, C. J. 2004. An Introduction to Database Systems, Eighth Edition. Addison-Wesley, Boston, MA. Fagin, R., Nievergelt, J., Pippenger, N., and Strong, H. R. 1979. "Extendible HashingA Fast Access Method for Dynamic Files," ACM Transactions on Databases, vol. 4, no. 3, pp. 315344 (September). Fowler, G. S., Korn, D. G., and Vo, K. P. 1989. "An Efficient File Hierarchy Walker," Proceeding of the 1989 Summer USENIX Conference, pp. 173188, Baltimore, MD. Gallmeister, B. O. 1995. POSIX.4: Programming for the Real World. O'Reilly & Associates, Sebastopol, CA. Garfinkel, S., Spafford, G., and Schwartz, A. 2003. Practical UNIX & Internet Security, Third Edition. O'Reilly & Associates, Sebastopol, CA. Gingell, R. A., Lee, M., Dang, X. T., and Weeks, M. S. 1987. "Shared Libraries in SunOS," Proceedings of the 1987 Summer USENIX Conference, pp. 131145, Phoenix, AZ. Gingell, R. A., Moran, J. P., and Shannon, W. A. 1987. "Virtual Memory Architecture in SunOS," Proceedings of the 1987 Summer USENIX Conference, pp. 8194, Phoenix, AZ. Goodheart, B. 1991. UNIX Curses Explained. Prentice-Hall, Englewood Cliffs, NJ. Hume, A. G. 1988. "A Tale of Two Greps," Software Practice and Experience, vol. 18, no. 11, pp. 10631072. IEEE. 1990. Information TechnologyPortable Operating System Interface (POSIX) Part 1: System Application Program Interface (API) [C Language]. IEEE (Dec.). ISO. 1999. International Standard ISO/IEC 9899Programming Language C. ISO/IEC. Kernighan, B. W., and Pike, R. 1984. The UNIX Programming Environment. Prentice-Hall, Englewood Cliffs, NJ. Kernighan, B. W., and Ritchie, D. M. 1988. The C Programming Language, Second Edition. Prentice-Hall, Englewood Cliffs, NJ. Kleiman, S. R. 1986. "Vnodes: An Architecture for Multiple File System Types in Sun Unix," Proceedings of the 1986 Summer USENIX Conference, pp. 238247, Atlanta, GA. Knuth, D. E. 1998. The Art of Computer Programming, Volume 3: Sorting and Searching, Second Edition. Addison-Wesley, Boston, MA. Korn, D. G., and Vo, K. P. 1991. "SFIO: Safe/Fast String/File IO," Proceedings of the 1991 Summer USENIX Conference, pp. 235255, Nashville, TN. Krieger, O., Stumm, M., and Unrau, R. 1992. "Exploiting the Advantages of Mapped Files for Stream I/O," Proceedings of the 1992 Winter USENIX Conference, pp. 2742, San Francisco, CA. Leffler, S. J., McKusick, M. K., Karels, M. J., and Quarterman, J. S. 1989. The Design and Implementation of the 4.3BSD UNIX Operating System. Addison-Wesley, Reading, MA. Lennert, D. 1987. "How to Write a UNIX Daemon," ;login:, vol. 12, no. 4, pp. 1723 (July/August). Libes, D. 1990. "expect: Curing Those Uncontrollable Fits of Interaction," Proceedings of the 1990 Summer USENIX Conference, pp. 183192, Anaheim, CA. Libes, D. 1991. "expect: Scripts for Controlling Interactive Processes," Computing Systems, vol. 4, no. 2, pp. 99125 (Spring). Libes, D. 1994. Exploring Expect. O'Reilly & Associates, Sebastopol, CA. Lions, J. 1977. A Commentary on the UNIX Operating System. AT&T Bell Laboratories, Murray Hill, NJ. Lions, J. 1996. Lions' Commentary on UNIX 6th Edition. Peer-to-Peer Communications, San Jose, CA. Litwin, W. 1980. "Linear Hashing: A New Tool for File and Table Addressing," Proceedings of the 6th International Conference on Very Large Databases, pp. 212223, Montreal, Canada. McKusick, M. K., Bostic, K., Karels, M. J., and Quarterman, J. S. 1996. The Design and Implementation of the 4.4BSD Operating System. Addison-Wesley, Reading, MA. McKusick, M. K., and Neville-Neil, G. V. 2005. The Design and Implementation of the FreeBSD Operating System. Addison-Wesley, Boston, MA. Mauro, J., and McDougall, R. 2001. Solaris Internals. Prentice-Hall, Upper Saddle River, NJ. Morris, R., and Thompson, K. 1979. "UNIX Password Security," Communications of the ACM, vol. 22, no. 11, pp. 594597 (Nov.). Nemeth, E., Snyder, G., Seebass, S., and Hein, T. R. 2001. UNIX System Administration Handbook, Third Edition. Prentice-Hall, Upper Saddle River, NJ. Olander, D. J., McGrath, G. J., and Israel, R. K. 1986. "A Framework for Networking in System V," Proceedings of the 1986 Summer USENIX Conference, pp. 3845, Atlanta, GA. The Open Group. 2004. The Single UNIX Specification, Version 3. The Open Group, Berkshire, UK. Pike, R., Presotto, D., Dorward, S., Flandrena, B., Thompson, K., Trickey, H., and Winterbottom, P. 1995. "Plan 9 from Bell Labs," Plan 9 Programmer's Manual Volume 2. AT&T, Reading, MA. Plauger, P. J. 1992. The Standard C Library. Prentice-Hall, Englewood Cliffs, NJ. Presotto, D. L., and Ritchie, D. M. 1990. "Interprocess Communication in the Ninth Edition UNIX System," Software Practice and Experience, vol. 20, no. S1, pp. S1/3S1/17 (June). Rago, S. A. 1993. UNIX System V Network Programming. Addison-Wesley, Reading, MA. Raymond, E. S., ed. 1996. The New Hacker's Dictionary, Third Edition. MIT Press, Cambridge, MA. Ritchie, D. M. 1984. "A Stream Input-Output System," AT&T Bell Laboratories Technical Journal, vol. 63, no. 8, pp. 18971910 (Oct.). Salus, P. H. 1994. A Quarter Century of UNIX. Addison-Wesley, Reading, MA. Seltzer, M., and Olson, M. 1992. "LIBTP: Portable Modular Transactions for UNIX," Proceedings of the 1992 Winter USENIX Conference, pp. 925, San Francisco, CA. Seltzer, M., and Yigit, O. 1991. "A New Hashing Package for UNIX," Proceedings of the 1991 Winter USENIX Conference, pp. 173184, Dallas, TX. Stevens, W. R. 1990. UNIX Network Programming. Prentice-Hall, Englewood Cliffs, NJ. Stevens, W. R., Fenner, B., and Rudoff, A. M. 2004. UNIX Network Programming, Volume 1, Third Edition. Addison-Wesley, Boston, MA. Stonebraker, M. R. 1981. "Operating System Support for Database Management," Communications of the ACM, vol. 24, no. 7, pp. 412418 (July). Strang, J. 1986. Programming with curses. O'Reilly & Associates, Sebastopol, CA. Strang, J., Mui, L., and O'Reilly, T. 1988. termcap & terminfo, Third Edition. O'Reilly & Associates, Sebastopol, CA. Sun Microsystems. 2002. STREAMS Programming Guide. Sun Microsystems, Santa Clara, CA. Thompson, K. 1978. "UNIX Implementation," The Bell System Technical Journal, vol. 57, no. 6, pp. 19311946 (JulyAug.). Vo, Kiem-Phong. 1996. "Vmalloc: A General and Efficient Memory Allocator," Software Practice and Experience, vol. 26, no. 3, pp. 357374. Weinberger, P. J. 1982. "Making UNIX Operating Systems Safe for Databases," The Bell System Technical Journal, vol. 61, no. 9, pp. 24072422 (Nov.). Weinstock, C. B., and Wulf, W. A. 1988. "Quick Fit: An Efficient Algorithm for Heap Storage Allocation," SIGPLAN Notices, vol. 23, no. 10, pp. 141148. Williams, T. 1989. "Session Management in System V Release 4," Proceedings of the 1989 Winter USENIX Conference, pp. 365375, San Diego, CA. X/Open. 1989. X/Open Portability Guide. Prentice-Hall, Englewood Cliffs, NJ. |