did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387201702

Computer Systems: Theory, Technology, and Applications : A Tribute to Roger Needham

by ; ;
  • ISBN13:

    9780387201702

  • ISBN10:

    038720170X

  • Format: Hardcover
  • Copyright: 2004-02-26
  • Publisher: Springer-Verlag New York Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $109.00 Save up to $90.44
  • Buy Used
    $81.75
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research. From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are based upon Needham's pioneering research work. A critical collection of edited-survey research papers spanning the entire range of Roger Needham's distinguished scientific career, from operating systems to distributed computing and security. Many of the world's leading researchers survey their topics' latest developments and acknowledge the theoretical foundations of Needham's work. Introduction to book written by Rick Rashid, Director of Microsoft Research Worldwide.

Table of Contents

Preface xi
Roger Needham: 50 + 5 Meeting Programme xiii
Contributors xv
Introduction: Roger Needham
Rick Rashid
1(8)
1 On Access Control, Data Integration, and Their Languages
Martin Abadi
9(6)
2 Protocol Analysis, Composability and Computation
Ross Anderson, Michael Bond
15(6)
3 Access Control in Distributed Systems
Jean Bacon, Ken Moody
21(8)
4 Implementing Condition Variables with Semaphores
Andrew D. Birrell
29(10)
5 Clumps, Clusters and Classification
Christopher M. Bishop
39(12)
6 How to Implement Unnecessary Mutexes
Mike Burrows
51(8)
7 Bioware Languages
Luca Cardelli
59(8)
8 The Economics of Open Systems
David D. Clark
67(6)
9 From Universe to Global Internet
Jon Crowcroft
73(4)
10 Needham-Schroeder Goes to Court
Dorothy E. Denning
77(2)
11 The Design of Reliable Operating Systems
Peter Denning
79(6)
12 An Historical Connection between Time-Sharing and Virtual Circuits
Sandy Fraser
85(4)
13 On Cross-Platform Security
Li Gong
89(4)
14 Distributed Computing Economics
Jim Gray
93(10)
15 The Titan Influence
David Hartley
103(6)
16 Middleware? Muddleware?
Andrew Herbert
109(8)
17 Grand Challenges for Computing Research
Tony Hoare
117(8)
18 Sentient Computing
Andy Hopper
125(8)
19 Cyber Security in Open Systems
Anita Jones
133(4)
20 Software Components: Only the Giants Survive
Butler W. Lampson
137(10)
21 Security Protocols: Who Knows What Exactly?
Peter Landrock
147(6)
22 Volume Rendering by Ray-Casting in Shear-Image Order
Hugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler
153(12)
23 A Conceptual Authorization Model for Web Services
Paul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward
165(8)
24 The Trouble with Standards
E. Stewart Lee
173(4)
25 Novelty in the Nemesis Operating System
Ian Leslie
177(8)
26 A Technology Transfer Retrospective
Roy Levin
185(10)
27 An Optical LAN
Derek McAuley
195(10)
28 What's in a Name?
Robin Milner
205(6)
29 The Cryptographic Role of the Cleaning Lady
Bob Morris
211(2)
30 Real Time in a Real Operating System
Sape J. Mullender, Pierre G. Jansen
213(10)
31 Zen and the Art of Research Management
John Naughton, Robert W. Taylor
223(2)
32 The Descent of BAN
Lawrence C. Paulson
225(4)
33 Brief Encounters
Brian Randell
229(8)
34 Retrieval System Models: What's New?
Stephen Robertson, Karen Spärck Jones
237(6)
35 Slammer: Au Urgent Wake-Up Call
Jerome H. Saltzer
243(6)
36 Caching Trust Rather Than Content
M. Satyanarayanan
249(4)
37 Least Privilege and More
Fred B. Schneider
253(6)
38 Using Sharing to Simplify System Management
Michael D. Schroeder
259(10)
39 An RSA-Related Number-Theoretic Surprise
Gustavus J. Simmons
269(4)
40 Application-Private Networks
Jonathan M. Smith
273(6)
41 Using the CORAL System to Discover Attacks on Security Protocols
Graham Steel, Alan Bundy, Ewen Denney
279(8)
42 On the Role of Binding and Rate Adaptation in Packet Networks
David Tennenhouse
287(8)
43 Technologies for Portable Computing
Chuck Thacker
295(10)
44 Multiple Alternative Voting
David Wheeler
305(6)
45 The Semiotics of Umbrellas
John Wilkes
311(6)
46 Computers for Specialized Application Areas
Maurice Wilkes
317(2)
Computer Security?
Roger Needham
319(8)
Roger Needham: Publications
Karen Spärck Jones
327

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program