Gwertzman, James, et al. “The Case for Geographical Push-Caching.” Technical Report HU TR 34-94 (excerpt), Harvard University, DAS, Cambridge, MA 02138, 1994, 2 pgs. |
Grigni, Michelangelo, et al. “Tight Bounds on Minimum Broadcasts Networks.” SIAM Journal of Discrete Mathematics, vol. 4, No. 2, May 1991, pp. 207-222. |
Devine, Robert. “Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm.” In Proceedings of 4th International Conference on Foundations of Data Organizations and Algorithms, 1993, pp. 101-114. |
Deering, Stephen, et al. “Multicast Routing in Datagram Internetworks and Extended LANs.” ACM Transactions on Computer Systems, vol. 8, No. 2, May 1990, pp. 85-110. |
Cormen, Thomas H., et al. Introduction to Algorithms, The MIT Press, Cambridge, Massachusetts, 1994, pp. 219-243, 991-993. |
Naor, Moni, et al. “The Load, Capacity and Availability of Quorum Systems.” In Proceedings of the 35th IEEE Symposium on Foundations of Computer Science, Nov. 1994, pp. 214-225. |
Nisan, Noam. “Psuedorandom Generators for Space-Bounded Computation.” In Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, May 1990, pp. 204-212. |
Palmer, Mark et al. “Fido: A Cache that Learns to Fetch.” In Proceedings of the 17th International Conference on Very Large Data Bases, Sep. 1991, pp. 255-264. |
Peleg, David, et al. “The Availability of Quorum Systems.” Information and Computation 123, 1995, 210-223. |
Rabin, Michael. “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance.” Journal of the ACM, vol. 36, No. 2, Apr. 1989, pp. 335-348. |
Ravi, R., “Rapid Rumor Ramification: Approximating the Minimum Broadcast Time.” In Proceedings of the 35th IEEE Symposium on Foundation of Computer Science, Nov. 1994, pp. 202-213. |
Schmidt, Jeanette, et al. “Chernoff-Hoeffding Bounds for Applications with Limited Independence.” In Proceedings of the 4th ACS-SIAM Symposium on Discrete Algorithms, 1993, pp. 331-340. |
Tarjan, Robert Endre, et al. “Storing a Sparse Table.” Communications of the ACM, vol. 22, No. 11, Nov. 1979, pp. 606-611. |
Wegman, Mark, et al. “New Hash Functions and Their Use in Authentication and Set Equality.” Journal of Computer and System Sciences vol. 22, Jun. 1981, pp. 265-279. |
Vitter, Jeffrey Scott, et al. “Optimal Prefetching via Data Compression.” In Proceedings of 32nd IEEE Symposium on Foundations of Computer Science, Nov. 1991, pp. 121-130. |
Fredman, Michael, et al. “Storing a Sparse Table with 0(1) Worst Case Access Time.” Journal of the Association for Computing Machinery, vol. 31, No. 3, Jul. 1984, pp. 538-544. |
Yao, Andrew Chi-Chih. “Should Tables be Sorted?” Journal of the Association for Computing Machinery, vol. 28, No. 3, Jul. 1981, pp. 615-628. |
Floyd, Sally, et al. “A reliable Multicast Framework for Light-Weight Sessions and Application Level Framing.” In Proceedings of ACM SIGCOMM '95, pp. 342-356. |
Feeley, Michael, et al. “Implementing Global Memory Management in a Workstation Cluster.” In Proceedings of the 15th ACM Symposium on Operating Systems Principles, 1995, pp. 201-212. |
Carter, J. Lawrence, et al. “Universal Classes of Hash Functions.” Journal of Computer and System Sciences, vol. 18, No. 2, Apr. 1979, pp. 143-154. |
Patent Abstracts of Japan, “Electronic Mail Multiplexing System and Communication Control Method in The System.” Jun. 30, 1993, JP 051625293. |
Kim et al., “Experiencess with Tripwire: UsingIntergrity Checkers For Intruosion Detection”, Coast Labs. Dept. of Computer Sciences Purdue University, Feb. 22, 1995, pp. 1-12. |
Kim et al., “The Design and Implementation of Tripwire: A file System Integrity Checker”, Coast Labs. Dept. of Computer Sciences Purdue University, Nov. 19, 1993, pp. 1-21. |