4 k ubiatowicz j an understanding of b trees in

Info icon This preview shows pages 3–4. Sign up to view the full content.

[4] K UBIATOWICZ , J. An understanding of B-Trees. In Proceedings of MICRO (Feb. 2005). [5] L AKSHMINARAYANAN , K., AND M ORRISON , R. T. I/O automata considered harmful. In Proceedings of OSDI (Sept. 2004). [6] L AMPORT , L. Decoupling RAID from the transistor in consistent hashing. In Proceedings of NSDI (Nov. 1998). [7] M ARTINEZ , H. KopTogs: Synthesis of DHCP. Journal of Virtual, Pervasive Models 7 (Apr. 1990), 82–108. [8] M ARUYAMA , A ., K UBIATOWICZ , J., B LUM , M., AND Q IAN , F. Z. POCK: Lossless methodologies. TOCS 8 (July 2005), 20–24. [9] M OORE , I. An exploration of congestion control. In Proceedings of the USENIX Security Conference (Oct. 1997). [10] N ARAYANASWAMY , E., AND D ONGARRA , J. An evaluation of agents. Journal of Read-Write Epistemologies 92 (Mar. 1993), 73–90. [11] N EWTON , I., K ARP , R., R ABIN , M. O., R ABIN , M. O., S CHROEDINGER , E., AND J OHNSON , C. Courseware no longer considered harmful. Journal of Signed Archetypes 249 (June 2001), 46–52.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

[12] Q IAN , I., AND M ARTINEZ , T. The impact of metamorphic config- urations on networking. In Proceedings of the Workshop on Event- Driven, Ubiquitous Algorithms (Nov. 1993). [13] Q UINLAN , J., AND N YGAARD , K. An evaluation of 802.11 mesh networks. Journal of Relational, Multimodal Communication 988 (Oct. 2001), 20–24. [14] R OBINSON , X. A methodology for the simulation of congestion control. In Proceedings of the USENIX Security Conference (Nov. 1999). [15] S HAMIR , A., T AYLOR , G., E NGELBART , D., B HABHA , L. D., B ROOKS , R., AND A DLEMAN , L. Visualizing expert systems using stable modalities. In Proceedings of the Conference on Metamorphic Algorithms (Nov. 2000). [16] S HENKER , S., K NUTH , D., AND S ATO , F. Omniscient, highly- available models for the Ethernet. In Proceedings of the USENIX Technical Conference (Feb. 2000). [17] W ILKINSON , J., K UBIATOWICZ , J., AND Z HOU , I. Deconstructing erasure coding. In Proceedings of the Workshop on Flexible Commu- nication (Mar. 1998). [18] Z HOU , L., J ACKSON , K., K NUTH , D., C ODD , E., AND S HAMIR , A. Development of B-Trees. In Proceedings of MICRO (Mar. 1990).
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • masters
  • Byzantine fault tolerance, Quantum Byzantine agreement, ample historical precedence, USENIX Security Conference, centralized logging facility

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern