[ABS] | Cooper, M., Advanced Bash-Scripting Guide, 2011, http://tldp.org/LDP/abs/html/ |
[AdelsteinLubanovic2007] | Adelstein, T., Lubanovic, B., Linux System Administration, OReilly, 2007, http://books.google.be/books?id=-jYe2k1p5tIC |
[Alagarsamy2003] | Alagarsamy, K., Some myths about famous mutual exclusion algorithms. SIGACT News 34, 3 (September 2003), 94-103. http://doi.acm.org/10.1145/945526.945527 |
[Amdahl1967] | Amdahl, G., Validity of the Single-Processor Approach to Achieving Large-Scale Computing Capabilities, Proc. Am. Federation of Information Processing Societies Conf., AFIPS Press, 1967, pp. 483-485, http://dx.doi.org/10.1145/1465482.1465560 |
[Bashar1997] | Bashar, N., Ariane 5: Who Dunnit?, IEEE Software 14(3): 15–16. May 1997. doi:10.1109/MS.1997.589224. |
[BovetCesati2005] | Bovet, D., Cesati, M, Understanding the Linux Kernel, Third Edition, O'Reilly, 2005, http://my.safaribooksonline.com/book/operating-systems-and-server-administration/linux/0596005652 |
[C99] | http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1256.pdf |
[Card+1994] | Card, R., Ts’o, T., Tweedie, S, Design and implementation of the second extended filesystem. Proceedings of the First Dutch International Symposium on Linux. ISBN 90-367-0385-9. http://web.mit.edu/tytso/www/linux/ext2intro.html |
[Chou2001] | Chou, A., Yang, J., Chelf, B., Hallem, S., & Engler, D. (2001, October). An empirical study of operating systems errors. In Proceedings of the eighteenth ACM symposium on Operating systems principles (pp. 73-88). |
[Cooper2011] | Cooper, M., Advanced Bash-Scripting Guide, http://tldp.org/LDP/abs/html/, 2011 |
[Courtois+1971] | Courtois, P., Heymans, F. and Parnas, D., Concurrent control with “readers” and “writers”. Commun. ACM 14, 10 (October 1971), 667-668. http://doi.acm.org/10.1145/362759.362813 |
[CPP] | C preprocessor manual, http://gcc.gnu.org/onlinedocs/cpp/ |
[CSyntax] | Wikipedia, C syntax, http://en.wikipedia.org/wiki/C_syntax |
[DeveloppezMake] | Introduction à Makefile, http://gl.developpez.com/tutoriel/outil/makefile/ |
[Dijkstra1965] | Dijkstra, E., Solution of a problem in concurrent programming control. Commun. ACM 8, 9 (September 1965), 569 http://doi.acm.org/10.1145/365559.365617 |
[Dijkstra1968] | Dijkstra, E., Go To Statement Considered Harmful, Communications of the ACM, 11, March 1968, http://www.cs.utexas.edu/~EWD/transcriptions/EWD02xx/EWD215.html Voir aussi [Tribble2005] |
[Downey2008] | Downey, A., The Little Book of Semaphores, Second Edition, Green Tea Press, 2008, |
[Drepper2007] | Drepper, U., What every programmer should know about memory, 2007, http://www.akkadia.org/drepper/cpumemory.pdf |
[DrepperMolnar2005] | Drepper, U., Molnar, I., The Native POSIX Thread Library for Linux, http://www.akkadia.org/drepper/nptl-design.pdf |
[Goldberg1991] | Goldberg, D., What every computer scientist should know about floating-point arithmetic. ACM Comput. Surv. 23, 1 (March 1991), 5-48. http://doi.acm.org/10.1145/103162.103163 ou http://www.validlab.com/goldberg/paper.pdf |
[Goldberg+1996] | Goldberg, I., Wagner, D., Randomness and the Netscape Browser, Dr. Dobb's Journal, January 1996, http://www.cs.berkeley.edu/~daw/papers/ddj-netscape.html |
[Gove2011] | Gove, D., Multicore Application Programming for Windows, Linux and Oracle Solaris, Addison-Wesley, 2011, http://books.google.be/books?id=NF-C2ZQZXekC |
[GNUMake] | The GNU Make Manual, http://www.gnu.org/software/make/manual/make.html |
[GNUPTH] | Engelschall, R., GNU Portable Threads, http://www.gnu.org/software/pth/ |
[Graham+1982] | Graham, S., Kessler, P. and Mckusick, M., Gprof: A call graph execution profiler. SIGPLAN Not. 17, 6 (June 1982), 120-126. http://doi.acm.org/10.1145/872726.806987 |
[Honeyford2006] | Honeyford, M., Speed your code with the GNU profiler, http://www.ibm.com/developerworks/library/l-gnuprof.html |
[IA32] | intel, Intel® 64 and IA-32 Architectures : Software Developer’s Manual, Combined Volumes: 1, 2A, 2B, 2C, 3A, 3B and 3C, December 2011, http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-manual-325462.pdf |
[Kamp2011] | Kamp, P., The Most Expensive One-byte Mistake, ACM Queue, July 2011, http://queue.acm.org/detail.cfm?id=2010365 |
[Kerrisk2010] | Kerrisk, M., The Linux Programming Interface, No Starch Press, 2010, http://my.safaribooksonline.com/book/programming/linux/9781593272203 |
[Kernighan] | Kernighan, B., Programming in C - A Tutorial, http://cm.bell-labs.com/cm/cs/who/dmr/ctut.pdf |
[KernighanRitchie1998] | Kernighan, B., and Ritchie, D., The C programming language, second edition, Addison Wesley, 1998, http://cm.bell-labs.com/cm/cs/cbook/ |
[King2008] | King, K., C programming : a modern approach, W. W. Norton & company, 2008 |
[Krakowiak2011] | Krakowiak, S., Le modele d'architecture de von Neumann, http://interstices.info/le-modele-darchitecture-de-von-neumann |
[Leroy] | Leroy, X., The LinuxThreads library, http://pauillac.inria.fr/~xleroy/linuxthreads/ |
[McKenney2005] | McKenney, P., Memory Ordering in Modern Microprocessors, Part I, Linux Journal, August 2005, http://www.linuxjournal.com/article/8211 |
[Mecklenburg+2004] | Mechklenburg, R., Mecklenburg, R. W., Oram, A., Managing projects with GNU make, O'Reilly, 2004, http://books.google.be/books?id=rL4GthWj9kcC |
[Mitchell+2001] | Mitchell, M., Oldham, J. and Samuel, A., Advanced Linux Programming, New Riders Publishing, ISBN 0-7357-1043-0, June 2001, http://www.advancedlinuxprogramming.com/ |
[MorrisThomson1979] | Morris, R. and Thompson, K. Password security: a case history. Commun. ACM 22, 11 (November 1979), 594-597. http://doi.acm.org/10.1145/359168.359172 |
[Nemeth+2010] | Nemeth, E., Hein, T., Snyder, G., Whaley, B., Unix and Linux System Administration Handbook, Prentice Hall, 2010, http://books.google.be/books?id=rgFIAnLjb1wC |
[Peterson1981] | Peterson, G., Myths about the mutual exclusion problem, Inform. Process. Lett. 12 (3) (1981) 115-116 |
[Palix2011] | Palix, N., Thomas, G., Saha, S., Calvès, C., Lawall, J., & Muller, G. (2011, March). Faults in Linux: Ten years later. In Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems (pp. 305-318). |
[Stallings2011] | Stallings, W., Operating Systems : Internals and Design Principles, Prentice Hall, 2011, http://williamstallings.com/OperatingSystems/index.html |
[StevensRago2008] | Stevens, R., and Rago, S., Advanced Programming in the UNIX Environment, Addison-Wesley, 2008, http://books.google.be/books?id=wHI8PgAACAAJ |
[Stokes2008] | Stokes, J., Classic.Ars: Understanding Moore's Law, http://arstechnica.com/hardware/news/2008/09/moore.ars |
[Tanenbaum+2009] | Tanenbaum, A., Woodhull, A., Operating systems: design and implementation, Prentice Hall, 2009 |
[Toomey2011] | Toomey, W., The Strange Birth and Long Life of Unix, IEEE Spectrum, December 2011, http://spectrum.ieee.org/computing/software/the-strange-birth-and-long-life-of-unix |
[Tribble2005] | Tribble, D., Go To Statement Considered Harmful: A Retrospective, 2005, http://david.tribble.com/text/goto.html |
[Walls2006] | Walls, D., How to Use the restrict Qualifier in C. Sun Microsystems, 2006, http://developers.sun.com/solaris/articles/cc_restrict.html |