Skip to content

Latest commit

 

History

History
117 lines (59 loc) · 8.41 KB

bib.rst

File metadata and controls

117 lines (59 loc) · 8.41 KB

Bibliographie

[ABS]Cooper, M., Advanced Bash-Scripting Guide, 2011, http://tldp.org/LDP/abs/html/
[AdelsteinLubanovic2007]Adelstein, T., Lubanovic, B., Linux System Administration, OReilly, 2007, http://books.google.be/books?id=-jYe2k1p5tIC
[Alagarsamy2003]Alagarsamy, K., Some myths about famous mutual exclusion algorithms. SIGACT News 34, 3 (September 2003), 94-103. http://doi.acm.org/10.1145/945526.945527
[Amdahl1967]Amdahl, G., Validity of the Single-Processor Approach to Achieving Large-Scale Computing Capabilities, Proc. Am. Federation of Information Processing Societies Conf., AFIPS Press, 1967, pp. 483-485, http://dx.doi.org/10.1145/1465482.1465560
[Bashar1997]Bashar, N., Ariane 5: Who Dunnit?, IEEE Software 14(3): 15–16. May 1997. doi:10.1109/MS.1997.589224.
[BovetCesati2005]Bovet, D., Cesati, M, Understanding the Linux Kernel, Third Edition, O'Reilly, 2005, http://my.safaribooksonline.com/book/operating-systems-and-server-administration/linux/0596005652
[C99]http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1256.pdf
[Card+1994]Card, R., Ts’o, T., Tweedie, S, Design and implementation of the second extended filesystem. Proceedings of the First Dutch International Symposium on Linux. ISBN 90-367-0385-9. http://web.mit.edu/tytso/www/linux/ext2intro.html
[Chou2001]Chou, A., Yang, J., Chelf, B., Hallem, S., & Engler, D. (2001, October). An empirical study of operating systems errors. In Proceedings of the eighteenth ACM symposium on Operating systems principles (pp. 73-88).
[Cooper2011]Cooper, M., Advanced Bash-Scripting Guide, http://tldp.org/LDP/abs/html/, 2011
[Courtois+1971]Courtois, P., Heymans, F. and Parnas, D., Concurrent control with “readers” and “writers”. Commun. ACM 14, 10 (October 1971), 667-668. http://doi.acm.org/10.1145/362759.362813
[CPP]C preprocessor manual, http://gcc.gnu.org/onlinedocs/cpp/
[CSyntax]Wikipedia, C syntax, http://en.wikipedia.org/wiki/C_syntax
[DeveloppezMake]Introduction à Makefile, http://gl.developpez.com/tutoriel/outil/makefile/
[Dijkstra1965]Dijkstra, E., Solution of a problem in concurrent programming control. Commun. ACM 8, 9 (September 1965), 569 http://doi.acm.org/10.1145/365559.365617
[Dijkstra1968]Dijkstra, E., Go To Statement Considered Harmful, Communications of the ACM, 11, March 1968, http://www.cs.utexas.edu/~EWD/transcriptions/EWD02xx/EWD215.html Voir aussi [Tribble2005]
[Downey2008]Downey, A., The Little Book of Semaphores, Second Edition, Green Tea Press, 2008,
[Drepper2007]Drepper, U., What every programmer should know about memory, 2007, http://www.akkadia.org/drepper/cpumemory.pdf
[DrepperMolnar2005]Drepper, U., Molnar, I., The Native POSIX Thread Library for Linux, http://www.akkadia.org/drepper/nptl-design.pdf
[Goldberg1991]Goldberg, D., What every computer scientist should know about floating-point arithmetic. ACM Comput. Surv. 23, 1 (March 1991), 5-48. http://doi.acm.org/10.1145/103162.103163 ou http://www.validlab.com/goldberg/paper.pdf
[Goldberg+1996]Goldberg, I., Wagner, D., Randomness and the Netscape Browser, Dr. Dobb's Journal, January 1996, http://www.cs.berkeley.edu/~daw/papers/ddj-netscape.html
[Gove2011]Gove, D., Multicore Application Programming for Windows, Linux and Oracle Solaris, Addison-Wesley, 2011, http://books.google.be/books?id=NF-C2ZQZXekC
[GNUMake]The GNU Make Manual, http://www.gnu.org/software/make/manual/make.html
[GNUPTH]Engelschall, R., GNU Portable Threads, http://www.gnu.org/software/pth/
[Graham+1982]Graham, S., Kessler, P. and Mckusick, M., Gprof: A call graph execution profiler. SIGPLAN Not. 17, 6 (June 1982), 120-126. http://doi.acm.org/10.1145/872726.806987
[Honeyford2006]Honeyford, M., Speed your code with the GNU profiler, http://www.ibm.com/developerworks/library/l-gnuprof.html
[IA32]intel, Intel® 64 and IA-32 Architectures : Software Developer’s Manual, Combined Volumes: 1, 2A, 2B, 2C, 3A, 3B and 3C, December 2011, http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-manual-325462.pdf
[Kamp2011]Kamp, P., The Most Expensive One-byte Mistake, ACM Queue, July 2011, http://queue.acm.org/detail.cfm?id=2010365
[Kerrisk2010]Kerrisk, M., The Linux Programming Interface, No Starch Press, 2010, http://my.safaribooksonline.com/book/programming/linux/9781593272203
[Kernighan]Kernighan, B., Programming in C - A Tutorial, http://cm.bell-labs.com/cm/cs/who/dmr/ctut.pdf
[KernighanRitchie1998]Kernighan, B., and Ritchie, D., The C programming language, second edition, Addison Wesley, 1998, http://cm.bell-labs.com/cm/cs/cbook/
[King2008]King, K., C programming : a modern approach, W. W. Norton & company, 2008
[Krakowiak2011]Krakowiak, S., Le modele d'architecture de von Neumann, http://interstices.info/le-modele-darchitecture-de-von-neumann
[Leroy]Leroy, X., The LinuxThreads library, http://pauillac.inria.fr/~xleroy/linuxthreads/
[McKenney2005]McKenney, P., Memory Ordering in Modern Microprocessors, Part I, Linux Journal, August 2005, http://www.linuxjournal.com/article/8211
[Mecklenburg+2004]Mechklenburg, R., Mecklenburg, R. W., Oram, A., Managing projects with GNU make, O'Reilly, 2004, http://books.google.be/books?id=rL4GthWj9kcC
[Mitchell+2001]Mitchell, M., Oldham, J. and Samuel, A., Advanced Linux Programming, New Riders Publishing, ISBN 0-7357-1043-0, June 2001, http://www.advancedlinuxprogramming.com/
[MorrisThomson1979]Morris, R. and Thompson, K. Password security: a case history. Commun. ACM 22, 11 (November 1979), 594-597. http://doi.acm.org/10.1145/359168.359172
[Nemeth+2010]Nemeth, E., Hein, T., Snyder, G., Whaley, B., Unix and Linux System Administration Handbook, Prentice Hall, 2010, http://books.google.be/books?id=rgFIAnLjb1wC
[Peterson1981]Peterson, G., Myths about the mutual exclusion problem, Inform. Process. Lett. 12 (3) (1981) 115-116
[Palix2011]Palix, N., Thomas, G., Saha, S., Calvès, C., Lawall, J., & Muller, G. (2011, March). Faults in Linux: Ten years later. In Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems (pp. 305-318).
[Stallings2011]Stallings, W., Operating Systems : Internals and Design Principles, Prentice Hall, 2011, http://williamstallings.com/OperatingSystems/index.html
[StevensRago2008]Stevens, R., and Rago, S., Advanced Programming in the UNIX Environment, Addison-Wesley, 2008, http://books.google.be/books?id=wHI8PgAACAAJ
[Stokes2008]Stokes, J., Classic.Ars: Understanding Moore's Law, http://arstechnica.com/hardware/news/2008/09/moore.ars
[Tanenbaum+2009]Tanenbaum, A., Woodhull, A., Operating systems: design and implementation, Prentice Hall, 2009
[Toomey2011]Toomey, W., The Strange Birth and Long Life of Unix, IEEE Spectrum, December 2011, http://spectrum.ieee.org/computing/software/the-strange-birth-and-long-life-of-unix
[Tribble2005]Tribble, D., Go To Statement Considered Harmful: A Retrospective, 2005, http://david.tribble.com/text/goto.html
[Walls2006]Walls, D., How to Use the restrict Qualifier in C. Sun Microsystems, 2006, http://developers.sun.com/solaris/articles/cc_restrict.html