CITATIONS FOR READINGS

Textbooks

Introduction to computer systems

1
Eli M. Noam. Electronics and the dim future of the university. Science, 270 (October, 1995) pages 247-249.

2
Richard P. Gabriel. Worse is better. From LISP: good news, bad news, how to win BIG, AI Expert 6, 6 (June, 1991) pages 33-35.

3
Jerome H. Saltzer. The study of systems. Chapter 1 of The Engineering of Computer Systems, MIT Department of Electrical Engineering and Computer Science (in preparation, February, 1985).

4
Herbert A. Simon. The architecture of complexity. Proceedings American Philosophical Society 106, 6 (December, 1962) pages 467-482. Republished as Part 4, pages 84-118, of The Sciences of the Artificial, MIT Press, 1969. ISBN: 0-262-191051-6 (hardbound) 0-262-69023-3 (paperback).

5
George D. Gopen and Judith A. Swan. The science of scientific writing. American Scientist 78, 6 (November-December, 1990) pages 550-558.

6
Jerome H. Saltzer. Objectives of an information system. Chapter 2 of The Engineering of Computer Systems, MIT Department of Electrical Engineering and Computer Science (in preparation, February, 1985).

7
Nancy G. Leveson and Clark S. Turner. An investigation of the Therac-25 accidents. Computer 26, 7 (July, 1993) pages 18-41.

8
Butler W. Lampson. Hints for computer system design. Proceedings of the Ninth ACM Symposium on Operating Systems Principles, Bretton Woods, New Hampshire (October 10-13, 1983), pages 33-48. Published as Operating Systems Review 17, 5 (1983).

Computer system organization

9
Per Brinch Hansen. The nucleus of a multiprogramming system. Communications of the ACM 13, 4 (April, 1970) pages 238-241,250.

10
Peter D. Varhol. Small kernels hit it big. Byte 19, 1 (January, 1994) pages 119-128.

11
Dawson R. Engler, M. Frans Kaashoek, J. O'Toole Jr. Exokernel: an operating system architecture for application-level resource management. Proceedings of the Fifthteenth ACM Symposium on Operating Systems Principles, December 5-8, 1995, Copper Mountain Resort Colorado In Operating Systems Review 29, 5 (December, 1995) pages 251-266.

12
Robert Scheifler and Jim Getttys. The X window system. ACM Transactions on Graphics 5, 2 (April, 1986) pages 79-109.

Networking

13
Robert H. Halstead, Jr. 6.033 notes on networking and communication. MIT Department of Electrical Engineering and Computer Science, September, 1987.

14
Andrew D. Birrell and Bruce Jay Nelson. Implementing remote procedure calls. ACM Transactions on Computer Systems 2, 1 (February, 1984) pages 39-59.

15
Robert M. Metcalfe and David R. Boggs. Ethernet: Distributed packet switching for local computer networks. Communications of the ACM 19, 7 (July, 1976) pages 395-404.

16
Michael D. Schroeder, Andrew D. Birrell, Michael Burrows, Hal Murray, Roger M. Needham, Thomas L. Rodeheffer, Edwin H. Satterthwaite, and Charles P. Thacker. Autonet: A high-speed, self-configuring local area network using point-to-point Links. IEEE Journal on Selected Areas in Communications 9, 8, (October 1991) pages 1318-1335.

17
J. Ioannidis, D. Duchamp, and G.Q. Maguire Jr. IP-based protocols for mobile internetworking. Proceedings of SIGCOMM `91 Conference on communication architectures and applications, Zurich, Switzerland, (September 1991) pages 235-245.

18
Jerome H. Saltzer, David P. Reed, and David. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems 2, 4 (November, 1984) pages 277-288.

19
Danny Cohen. On holy wars and a plea for peace. IEEE Computer 14, 10 (October, 1981) pages 48-54.

20
Jerome H. Saltzer. Case study: Synchronized file transfer; failure retry. Section 7.5 of The Engineering of Computer Systems, MIT Department of Electrical Engineering and Computer Science (in preparation, December 6, 1983).

Naming

21
Jerome H. Saltzer. Name binding in computer systems. Section 5 of The Engineering of Computer Systems, MIT Department of Electrical Engineering and Computer Science (in preparation, December 6, 1983).

22
Tim Berners-Lee, Robert Cailiau, Ari Luotonen, Henrik Frystyk Nielsen, and Arthur Secret. The World-Wide Web. Communications of the ACM 37, 8 (August 1994) pages 76-82. (see also http://www.w3.org/pub/WWW)

23
James Gosling. Java intermediate bytecodes. Proceedings of ACM SIGPLAN Workshop on Intermediate Representations, San Francisco California. In SIGPLAN Notices 30, 3 (March 1995) pages 111-118. (see also http://java.sun.com/)

Security and society

24
Eugene H. Spafford. Crisis and aftermath. Communications of the ACM 32, 6 (June, 1989) pages 678-687.

25
Steven R. Lerman, James D. Bruce, and Jerome H. Saltzer. Teaching students about responsible use of computers. Communications of the ACM 32, 6 (June, 1989) page 704. The publication omits the names of the first two authors. Note: A more timely set of society-impact papers will be handed out later.

Security

26
Steven P. Miller, B. Clifford Neuman, Jeffrey I. Schiller, and Jerome H. Saltzer. Kerberos authentication and authorization system. Section E.2.1 of Athena Technical Plan, MIT Project Athena, October 27, 1988.

27
Ross. J. Anderson. Why cryptosystems fail. Communicationof the ACM 37, 11 (November 1994) pages 32-40.

28
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Chapter 6 of The Engineering of Computer Systems, MIT Department of Electrical Engineering and Computer Science (in preparation, July, 1975). Also published, omitting appendix 6-A, in Proceedings of the IEEE 63, 9 (September, 1975) pages 1278-1308.

Storage

29
Jeff Rothenberg. Ensuring the longevity of digital documents. Scientific American 272, 1 (January 1995) pages 42-47.

30
Randy H. Katz, Garth A. Gibson, and David A. Patterson. Disk system architectures for high performance computing. Proceedings of the IEEE 77, 12 (December, 1989) pages 1842-1857.

31
Mendel Rosenblum and John K. Ousterhout. The design and implementation of a log-structured file system. Proceedings of the Thirteenth ACM Symposium on Operating Systems Principles, Pacific Grove, California (October 13-16, 1991) pages 1-15. Published as Operating Systems Review 25, 5 (1991). Also appeared in ACM Transactions on Computer Systems 10, 1 (February, 1992) pages 26-52.

32
James J. Kistler and Mahadarev Satyanarayanan. Disconnected operation in the Coda file system. Proceedings of the Thirteenth ACM Symposium on Operating Systems Principles, October 13-16, 1991, Pacific Grove, California. In Operating Systems Review 25, 5 (December, 1991) pages 213-225.

Coordination, atomicity, and failure recovery

33
Jim Gray and Daniel P. Sieworek. High-availability computer systems. Computer 24, 9 (September, 1991) pages 39-48.

34
Alfred Spector and David Gifford. The space shuttle primary computer system. Communications of the ACM 27, 9 (September, 1984) pages 874-900.

35
Henry Petroski. Engineering: History and failure. American Scientist 80, 6 (November-December, 1992) pages 523-526.

36
Phillip J. Plauger. Chocolate. Embedded Systems Programming 7, 3 (March, 1994) pages 81-84.

37
Jim Gray, Paul McJones, Bruce Lindsay, Raymond Lorie, Tom Price, Franco Putzolu, and Irving Traiger. The recovery manager of the System R database manager. ACM Computing Surveys 13, 2 (June, 1981) pages 223-242.

38
David Gifford and Alfred Spector. The CIRRUS banking network. Communications of the ACM 28, 8 (August, 1985) pages 798-807.

39
David Gifford and Alfred Spector. The TWA reservation system. Communications of the ACM 27, 7 (July, 1984) pages 649-665.

40
Effy Oz. When professional standards are lax: the CONFIRM failure and its lessons. Communications of the ACM 37, 10 (October 1994) pages 29-36.

41
James L. Woodward. What makes business programming hard? BYTE 7, 10 (October, 1982) pages 68-72.

Historical perspective

42
Larry Press. Before the Altair: The history of personal computing. Communications of the ACM 36, 9 (September, 1993) pages 27-33.

------------

6.033 Reading list // 2/6/96