Bibliography

Bibliography

November 21, 2020 | research, bibliography

Some of these bibliographies I’ve been reading for my research and some I find it interesting to keep around my library.

Operating Systems #

Introductory #

Modern Operating Systems #

Bibtex
@book{tanenbaum2014ModenOS,
  author          = {Tanenbaum, Andrew S. and Bos, Herbert},
  title           = {Modern Operating Systems},
  year            = 2014,
  isbn            = {013359162X},
  publisher       = {Prentice Hall Press},
  address         = {USA},
  edition         = {4th},
  abstract        = { Modern Operating Systems, Fourth Edition, is intended for
                  introductory courses in Operating Systems in Computer Science,
                  Computer Engineering, and Electrical Engineering programs. It
                  also serves as a useful reference for OS professionals The
                  widely anticipated revision of this worldwide best-seller
                  incorporates the latest developments in operating systems (OS)
                  technologies. The Fourth Edition includes up-to-date materials
                  on relevantOS. Tanenbaum also provides information on current
                  research based on his experience as an operating systems
                  researcher. Modern Operating Systems, Third Editionwas the
                  recipient of the 2010 McGuffey Longevity Award. The McGuffey
                  Longevity Award recognizes textbooks whose excellence has been
                  demonstrated over time.http://taaonline.net/index.html
                  Teaching and Learning Experience This program will provide a
                  better teaching and learning experiencefor you and your
                  students. It will help: Provide Practical Detail on the Big
                  Picture Concepts: A clear and entertaining writing style
                  outlines the concepts every OS designer needs to master. Keep
                  Your Course Current: This edition includes information on the
                  latest OS technologies and developments Enhance Learning with
                  Student and Instructor Resources: Students will gain hands-on
                  experience using the simulation exercises and lab experiments.
                  }
}

Operating Systems: Internals and Design Principle #

Bibtex
@book{stallings2018OperatingSysInternalAndDesign,
  author          = {Stallings, William},
  title           = {Operating Systems: Internals and Design Principles, 9/e},
  year            = 2018,
  isbn            = 9352866711,
  publisher       = {Pearson IT Certification},
  address         = {Indianapolis, Indiana, USA},
  edition         = {9th},
  abstract        = {Please Read Notes: Brand New, International Softcover
                  Edition, Printed in black and white pages, minor self wear on
                  the cover or pages, Sale restriction may be printed on the
                  book, but Book name, contents, and author are exactly same as
                  Hardcover Edition. Fast delivery through DHL/FedEx express.}
}

Operating Systems Design and Implementation (3rd Edition) #

Bibtex
@book{tanenbaum2005OperatingSysImplementation,
  author          = {Tanenbaum, Andrew S and Woodhull, Albert S},
  title           = {Operating Systems Design and Implementation (3rd Edition)},
  year            = 2005,
  isbn            = 0131429388,
  publisher       = {Prentice-Hall, Inc.},
  address         = {USA}
}

RTOS #

Operating Systems for Low-End Devices in the Internet of Things: A Survey #

Bibtex
@article{Hahm2015OSForLowEndDevice,
  author          = {O. {Hahm} and E. {Baccelli} and H. {Petersen} and N.
                  {Tsiftes}},
  journal         = {IEEE Internet of Things Journal},
  title           = {Operating Systems for Low-End Devices in the Internet of
                  Things: A Survey},
  year            = 2016,
  volume          = 3,
  number          = 5,
  pages           = {720-734},
  abstract        = {The Internet of Things (IoT) is projected to soon
                  interconnect tens of billions of new devices, in large part
                  also connected to the Internet. IoT devices include both
                  high-end devices which can use traditional go-to operating
                  systems (OSs) such as Linux, and low-end devices which cannot,
                  due to stringent resource constraints, e.g., very limited
                  memory, computational power, and power supply. However,
                  large-scale IoT software development, deployment, and
                  maintenance requires an appropriate OS to build upon. In this
                  paper, we thus analyze in detail the specific requirements
                  that an OS should satisfy to run on low-end IoT devices, and
                  we survey applicable OSs, focusing on candidates that could
                  become an equivalent of Linux for such devices, i.e., a
                  one-size-fits-most, open source OS for low-end IoT devices.},
  keywords        = {Internet of Things;mobile computing;operating systems
                  (computers);software maintenance;software maintenance;software
                  deployment;software development;IoT;Internet of Things;low-end
                  device;OS;operating system;Random access
                  memory;Hardware;Internet of things;Operating
                  systems;Standards;Embedded software;Internet of Things
                  (IoT);low-power electronics;operating system (OS)},
  doi             = {10.1109/JIOT.2015.2505901},
  ISSN            = {2327-4662},
  month           = {Oct},
}

Synchronization #

Little book of semaphores #

Bibtex
@book{LittleBookOfSemaphores,
  title           = {The little book of semaphores},
  author          = {Downey, Allen},
  volume          = 2,
  number          = 2,
  year            = 2008,
  publisher       = {Green Tea Press},
  url             = "https://github.com/AllenDowney/LittleBookOfSemaphores",
}

Computer Architecture #

Network-On-Chip (NoC) #

Redes-em-Chip: arquiteturas e modelos para avaliação de área e desempenho #

Bibtex
@phdthesis{RedesEmChipArquiteturasEmodelosParaAvaliacaoDeAreaEdesempenho,
  author          = {Cesar Albenes Zeferino},
  title           = {Redes-em-Chip: arquiteturas e modelos para avaliação de
                  área e desempenho},
  year            = 2003,
  school          = {Universidade Federal do Rio Grande do Sul},
  address         = {Porto Alegre, RS, Brasil},
  abstract        = {Com o advento dos processos submicrônicos, a capacidade de
                  integração de transistores tem atingido níveis que
                  possibilitam a construção de um sistema completo em uma única
                  pastilha de silício. Esses sistemas, denominados sistemas
                  integrados, baseiam-se no reuso de blocos previamente
                  projetados e verificados, os quais são chamados de núcleos ou
                  blocos de propriedade intelectual. Os sistemas integrados
                  atuais incluem algumas poucas dezenas de núcleos, os quais são
                  interconectados por meio de arquiteturas de comunicação
                  baseadas em estruturas dedicadas de canais ponto-a-ponto ou em
                  estruturas reutilizáveis constituídas por canais multiponto,
                  denominadas barramentos. Os futuros sistemas integrados irão
                  incluir de dezenas a centenas de núcleos em um mesmo chip com
                  até alguns bilhões de transistores, sendo que, para atender às
                  pressões do mercado e amortizar os custos de projeto entre
                  vários sistemas, é importante que todos os seus componentes
                  sejam reutilizáveis, incluindo a arquitetura de comunicação.
                  Das arquiteturas utilizadas atualmente, o barramento é a única
                  que oferece reusabilidade. Porém, o seu desempenho em
                  comunicação e o seu consumo de energia degradam com o
                  crescimento do sistema. Para atender aos requisitos dos
                  futuros sistemas integrados, uma nova alternativa de
                  arquitetura de comunicação tem sido proposta na comunidade
                  acadêmica. Essa arquitetura, denominada rede-em-chip,
                  baseia-se nos conceitos utilizados nas redes de interconexão
                  para computadores paralelos. Esta tese se situa nesse contexto
                  e apresenta uma arquitetura de rede-em-chip e um conjunto de
                  modelos para a avaliação de área e desempenho de arquiteturas
                  de comunicação para sistemas integrados. A arquitetura
                  apresentada é denominada SoCIN (System-on-Chip Interconnection
                  Network) e apresenta como diferencial o fato de poder ser
                  dimensionada de modo a atender a requisitos de custo e
                  desempenho da aplicação alvo. Os modelos desenvolvidos
                  permitem a estimativa em alto nível da área em silício e do
                  desempenho de arquiteturas de comunicação do tipo barramento e
                  rede-em-chip. São apresentados resultados que demonstram a
                  efetividade das redes-em-chip e indicam as condições que
                  definem a aplicabilidade das mesmas.},
}

Principles and Practices of Interconnection Network #

Bibtex
@book{principelsAndPracticesOfInterconnectionNetworks,
  author          = {Dally, William James and Towles, Brian Patrick},
  title           = {Principles and Practices of Interconnection Networks},
  year            = 2004,
  isbn            = 9780080497808,
  publisher       = {Morgan Kaufmann Publishers Inc.},
  address         = {San Francisco, CA, USA},
  abstract        = {One of the greatest challenges faced by designers of
                  digital systems is optimizing the communication and
                  interconnection between system components. Interconnection
                  networks offer an attractive and economical solution to this
                  communication crisis and are fast becoming pervasive in
                  digital systems. Current trends suggest that this
                  communication bottleneck will be even more problematic when
                  designing future generations of machines. Consequently, the
                  anatomy of an interconnection network router and science of
                  interconnection network design will only grow in importance in
                  the coming years. This book offers a detailed and
                  comprehensive presentation of the basic principles of
                  interconnection network design, clearly illustrating them with
                  numerous examples, chapter exercises, and case studies. It
                  incorporates hardware-level descriptions of concepts, allowing
                  a designer to see all the steps of the process from abstract
                  design to concrete implementation. ·Case studies throughout
                  the book draw on extensive author experience in designing
                  interconnection networks over a period of more than twenty
                  years, providing real world examples of what works, and what
                  doesn't. ·Tightly couples concepts with implementation costs
                  to facilitate a deeper understanding of the tradeoffs in the
                  design of a practical network. ·A set of examples and
                  exercises in every chapter help the reader to fully understand
                  all the implications of every design decision. Table of
                  Contents Chapter 1 Introduction to Interconnection Networks
                  1.1 Three Questions About Interconnection Networks 1.2 Uses of
                  Interconnection Networks 1.3 Network Basics 1.4 History 1.5
                  Organization of this Book Chapter 2 A Simple Interconnection
                  Network 2.1 Network Specifications and Constraints 2.2
                  Topology 2.3 Routing 2.4 Flow Control 2.5 Router Design 2.6
                  Performance Analysis 2.7 Exercises Chapter 3 Topology Basics
                  3.1 Nomenclature 3.2 Traffic Patterns 3.3 Performance 3.4
                  Packaging Cost 3.5 Case Study: The SGI Origin 2000 3.6
                  Bibliographic Notes 3.7 Exercises Chapter 4 Butterfly Networks
                  4.1 The Structure of Butterfly Networks 4.2 Isomorphic
                  Butterflies 4.3 Performance and Packaging Cost 4.4 Path
                  Diversity and Extra Stages 4.5 Case Study: The BBN Butterfly
                  4.6 Bibliographic Notes 4.7 Exercises Chapter 5 Torus Networks
                  5.1 The Structure of Torus Networks 5.2 Performance 5.3
                  Building Mesh and Torus Networks 5.4 Express Cubes 5.5 Case
                  Study: The MIT J-Machine 5.6 Bibliographic Notes 5.7 Exercises
                  Chapter 6 Non-Blocking Networks 6.1 Non-Blocking vs.
                  Non-Interfering Networks 6.2 Crossbar Networks 6.3 Clos
                  Networks 6.4 Benes Networks 6.5 Sorting Networks 6.6 Case
                  Study: The Velio VC2002 (Zeus) Grooming Switch 6.7
                  Bibliographic Notes 6.8 Exercises Chapter 7 Slicing and Dicing
                  7.1 Concentrators and Distributors 7.2 Slicing and Dicing 7.3
                  Slicing Multistage Networks 7.4 Case Study: Bit Slicing in the
                  Tiny Tera 7.5 Bibliographic Notes 7.6 Exercises Chapter 8
                  Routing Basics 8.1 A Routing Example 8.2 Taxonomy of Routing
                  Algorithms 8.3 The Routing Relation 8.4 Deterministic Routing
                  8.5 Case Study: Dimension-Order Routing in the Cray T3D 8.6
                  Bibliographic Notes 8.7 Exercises Chapter 9 Oblivious Routing
                  9.1 Valiant's Randomized Routing Algorithm 9.2 Minimal
                  Oblivious Routing 9.3 Load-Balanced Oblivious Routing 9.4
                  Analysis of Oblivious Routing 9.5 Case Study: Oblivious
                  Routing in the Avici Terabit Switch Router(TSR) 9.6
                  Bibliographic Notes 9.7 Exercises Chapter 10 Adaptive Routing
                  10.1 Adaptive Routing Basics 10.2 Minimal Adaptive Routing
                  10.3 Fully Adaptive Routing 10.4 Load-Balanced Adaptive
                  Routing 10.5 Search-Based Routing 10.6 Case Study: Adaptive
                  Routing in the Thinking Machines CM-5 10.7 Bibliographic Notes
                  10.8 Exercises Chapter 11 Routing Mechanics 11.1 Table-Based
                  Routing 11.2 Algorithmic Routing 11.3 Case Study: Oblivious
                  Source Routing in the IBM Vulcan Network 11.4 Bibliographic
                  Notes 11.5 Exercises Chapter 12 Flow Control Basics 12.1
                  Resources and Allocation Units 12.2 Bufferless Flow Control
                  12.3 Circuit Switching 12.4 Bibliographic Notes 12.5 Exercises
                  Chapter 13 Buffered Flow Control 13.1 Packet-Buffer Flow
                  Control 13.2 Flit-Buffer Flow Control 13.3 Buffer Management
                  and Backpressure 13.4 Flit-Reservation Flow Control 13.5
                  Bibliographic Notes 13.6 Exercises Chapter 14 Deadlock and
                  Livelock 14.1 Deadlock 14.2 Deadlock Avoidance 14.3 Adaptive
                  Routing 14.4 Deadlock Recovery 14.5 Livelock 14.6 Case Study:
                  Deadlock Avoidance in the Cray T3E 14.7 Bibliographic Notes
                  14.8 Exercises Chapter 15 Quality of Service 15.1 Service
                  Classes and Service Contracts 15.2 Burstiness and Network
                  Delays 15.3 Implementation of Guaranteed Services 15.4
                  Implementation of Best-Effort Services 15.5 Separation of
                  Resources 15.6 Case Study: ATM Service Classes 15.7 Case
                  Study: Virtual Networks in the Avici TSR 15.8 Bibliographic
                  Notes 15.9 Exercises Chapter 16 Router Architecture 16.1 Basic
                  Router Architecture 16.2 Stalls 16.3 Closing the Loop with
                  Credits 16.4 Reallocating a Channel 16.5 Speculation and
                  Lookahead 16.6 Flit and Credit Encoding 16.7 Case Study: The
                  Alpha 21364 Router 16.8 Bibliographic Notes 16.9 Exercises
                  Chapter 17 Router Datapath Components 17.1 Input Buffer
                  Organization 17.2 Switches 17.3 Output Organization 17.4 Case
                  Study: The Datapath of the IBM Colony Router 17.5
                  Bibliographic Notes 17.6 Exercises Chapter 18 Arbitration 18.1
                  Arbitration Timing 18.2 Fairness 18.3 Fixed Priority Arbiter
                  18.4 Variable Priority Iterative Arbiters 18.5 Matrix Arbiter
                  18.6 Queuing Arbiter 18.7 Exercises Chapter 19 Allocation 19.1
                  Representations 19.2 Exact Algorithms 19.3 Separable
                  Allocators 19.4 Wavefront Allocator 19.5 Incremental vs. Batch
                  Allocation 19.6 Multistage Allocation 19.7 Performance of
                  Allocators 19.8 Case Study: The Tiny Tera Allocator 19.9
                  Bibliographic Notes 19.10 Exercises Chapter 20 Network
                  Interfaces 20.1 Processor-Network Interface 20.2 Shared-Memory
                  Interface 20.3 Line-Fabric Interface 20.4 Case Study: The MIT
                  M-Machine Network Interface 20.5 Bibliographic Notes 20.6
                  Exercises Chapter 21 Error Control 411 21.1 Know Thy Enemy:
                  Failure Modes and Fault Models 21.2 The Error Control Process:
                  Detection, Containment, and Recovery 21.3 Link Level Error
                  Control 21.4 Router Error Control 21.5 Network-Level Error
                  Control 21.6 End-to-end Error Control 21.7 Bibliographic Notes
                  21.8 Exercises Chapter 22 Buses 22.1 Bus Basics 22.2 Bus
                  Arbitration 22.3 High Performance Bus Protocol 22.4 From Buses
                  to Networks 22.5 Case Study: The PCI Bus 22.6 Bibliographic
                  Notes 22.7 Exercises Chapter 23 Performance Analysis 23.1
                  Measures of Interconnection Network Performance 23.2 Analysis
                  23.3 Validation 23.4 Case Study: Efficiency and Loss in the
                  BBN Monarch Network 23.5 Bibliographic Notes 23.6 Exercises
                  Chapter 24 Simulation 24.1 Levels of Detail 24.2 Network
                  Workloads 24.3 Simulation Measurements 24.4 Simulator Design
                  24.5 Bibliographic Notes 24.6 Exercises Chapter 25 Simulation
                  Examples 495 25.1 Routing 25.2 Flow Control Performance 25.3
                  Fault Tolerance Appendix A Nomenclature Appendix B Glossary
                  Appendix C Network Simulator}
}

Fault tolerance #

Fault Tolerant Computer Architecture (Synthesis Lectures on Computer Architecture) #

Bibtex
@book{Sorin2009FaultTolerantComputerArchitecture,
  author          = {Sorin, Daniel J.},
  title           = {Fault Tolerant Computer Architecture},
  year            = 2009,
  isbn            = 1598299530,
  publisher       = {Morgan and Claypool Publishers},
  abstract        = {For many years, most computer architects have pursued one
                  primary goal: performance. Architects have translated the
                  ever-increasing abundance of ever-faster transistors provided
                  by Moore's law into remarkable increases in performance.
                  Recently, however, the bounty provided by Moore's law has been
                  accompanied by several challenges that have arisen as devices
                  have become smaller, including a decrease in dependability due
                  to physical faults. In this book, we focus on the
                  dependability challenge and the fault tolerance solutions that
                  architects are developing to overcome it. The two main
                  purposes of this book are to explore the key ideas in
                  fault-tolerant computer architecture and to present the
                  current state-of-the-art - over approximately the past 10
                  years - in academia and industry. Table of Contents:
                  Introduction / Error Detection / Error Recovery / Diagnosis /
                  Self-Repair / The Future}
}

Single event effects in aerospace #

Bibtex
@book{Petersen2011SingleEventEfefctsInAerospace,
  author          = {Petersen, Edward},
  address         = {Piscataway, N.J.?},
  booktitle       = {Single event effects in aerospace},
  isbn            = 9780470767498,
  publisher       = {IEEE Press},
  keywords        = {Astrionics -- Protection},
  language        = {eng},
  lccn            = 2011002191,
  title           = {Single event effects in aerospace / Edward Petersen.},
}

Overview of single event effects #

Bibtex
@book{buchner2015overview,
  title           = {Overview of single event effects},
  author          = {Buchner, S},
  booktitle       = {Proc. 11th Int. School Effects Radiation Embedded Syst.
                  Space Appl.(SERESSA)},
  pages           = {62--69},
  year            = 2015
}

Draft - Single Event Effects Specification #

Bibtex
@online{NASARadEff,
  title           = {Draft - Single Event Effects Specification},
  author          = {{The Radiation Effects and Analysis Group (REAG)}},
  shortauthor     = {REAG},
  organization    = {{National Aeronautics and Space Administration (NASA)}},
  year            = 2017,
  url             = "https://radhome.gsfc.nasa.gov/radhome/papers/seespec.htm",
  note            = {last accessed on 24/01/2021},
}

Single event effects mitigation techniques report #

Bibtex
@article{mutuel2016single,
  title           = {Single event effects mitigation techniques report},
  author          = {Mutuel, LH},
  journal         = {Federal Aviation Administration, William J. Hughes
                  Technical Center, Aviation Research Division, Atlantic City
                  International Airport, Final report DOT/FAA/TC-15/62},
  year            = 2016
}

Circuit Level Design Methods to Mitigate Soft Errors #

Bibtex
@inproceedings{reis2020CircutLevelDesignmethods,
  author          = {R. {Reis} and C. {Meinhardt} and A. L. {Zimpeck} and L. H.
                  {Brendler} and L. {Moraes}},
  booktitle       = {2020 IEEE Latin-American Test Symposium (LATS)},
  title           = {Circuit Level Design Methods to Mitigate Soft Errors},
  year            = 2020,
  pages           = {1-3},
  doi             = {10.1109/LATS49555.2020.9093683}
}

SWIFT: software implemented fault tolerance #

Bibtex
@INPROCEEDINGS{reis2005SwitfSoftware,
  author          = {G. A. {Reis} and J. {Chang} and N. {Vachharajani} and R.
                  {Rangan} and D. I. {August}},
  booktitle       = {International Symposium on Code Generation and
                  Optimization},
  title           = {SWIFT: software implemented fault tolerance},
  year            = 2005,
  pages           = {243-254},
  doi             = {10.1109/CGO.2005.34}
}

Applying Compiler-Automated Software Fault Tolerance to Multiple Processor Platforms #

Bibtex
@article{james2019applying,
  title           = {Applying Compiler-Automated Software Fault Tolerance to
                  Multiple Processor Platforms},
  author          = {James, Benjamin and Quinn, Heather and Wirthlin, Michael
                  and Goeders, Jeffrey},
  journal         = {IEEE Transactions on Nuclear Science},
  volume          = 67,
  number          = 1,
  pages           = {321--327},
  year            = 2019,
  publisher       = {IEEE}
}

CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: An Empirical Study #

Bibtex
@inproceedings{thati2018ComparisonOfDataFlowError,
  author          = {Thati, Venu Babu and Vankeirsbilck, Jens and Penneman,
                  Niels and Pissoort, Davy and Boydens, Jeroen},
  title           = {CDFEDT: Comparison of Data Flow Error Detection Techniques
                  in Embedded Systems: An Empirical Study},
  year            = 2018,
  isbn            = 9781450364485,
  publisher       = {Association for Computing Machinery},
  address         = {New York, NY, USA},
  url             = {https://doi.org/10.1145/3230833.3230854},
  doi             = {10.1145/3230833.3230854},
  abstract        = {Embedded systems used in harsh environments are susceptible
                  to bit-flips, which can cause data flow errors. In order to
                  increase the reliability of embedded systems, numerous data
                  flow error detection techniques have already been developed.
                  It is, however, difficult to identify the best technique to
                  apply, due to differences in the way they are evaluated in
                  current literature.This paper presents an empirical
                  comparative study of seven existing techniques. We measured
                  fault coverage, execution time overhead, and code size
                  overhead. We conclude that soft error detection using software
                  redundancy (SEDSR) and error detection by duplicated
                  instructions (EDDI) have a better trade-off between fault
                  coverage and overheads than software-implemented fault
                  tolerance (SWIFT), critical block duplication (CBD), and
                  overhead reduction (VAR3+). Error detection by diverse data
                  and duplicated instructions (ED4I or EDDDDI) and software
                  approach (SA) had better fault coverage at the expense of
                  execution time and code size usage.},
  booktitle       = {Proceedings of the 13th International Conference on
                  Availability, Reliability and Security},
  articleno       = 23,
  numpages        = 9,
  keywords        = {Fault tolerance, Fault coverage, Bit-flips, Data flow error
                  detection, Comparison},
  location        = {Hamburg, Germany},
  series          = {ARES 2018}
}

Introductory #

Structured Computer Organization (5th Edition) #

Bibtex
@book{tanenbaum2005structuredorg,
  author          = {Tanenbaum, Andrew S.},
  title           = {Structured Computer Organization (5th Edition)},
  year            = 2005,
  isbn            = 0131485210,
  publisher       = {Prentice-Hall, Inc.},
  address         = {USA}
}

Computer Organization and Design, Fifth Edition: The Hardware/Software Interface #

Bibtex
@book{patterson2013ComputerOrg,
  author          = {Patterson, David A. and Hennessy, John L.},
  title           = {Computer Organization and Design, Fifth Edition: The
                  Hardware/Software Interface},
  year            = 2013,
  isbn            = 0124077269,
  publisher       = {Morgan Kaufmann Publishers Inc.},
  address         = {San Francisco, CA, USA},
  edition         = {5th},
  abstract        = {The 5th edition of Computer Organization and Design moves
                  forward into the post-PC era with new examples, exercises, and
                  material highlighting the emergence of mobile computing and
                  the cloud. This generational change is emphasized and explored
                  with updated content featuring tablet computers, cloud
                  infrastructure, and the ARM (mobile computing devices) and x86
                  (cloud computing) architectures. Because an understanding of
                  modern hardware is essential to achieving good performance and
                  energy efficiency, this edition adds a new concrete example,
                  "Going Faster," used throughout the text to demonstrate
                  extremely effective optimization techniques. Also new to this
                  edition is discussion of the "Eight Great Ideas" of computer
                  architecture. As with previous editions, a MIPS processor is
                  the core used to present the fundamentals of hardware
                  technologies, assembly language, computer arithmetic,
                  pipelining, memory hierarchies and I/O. Instructors looking
                  for4th Edition teaching materials should e-mail
                  textbook@elsevier.com. Includes new examples, exercises, and
                  material highlighting the emergence of mobile computing and
                  the Cloud. Covers parallelism in depth with examples and
                  content highlighting parallel hardware and software topics
                  Features the Intel Core i7, ARM Cortex-A8 and NVIDIA Fermi GPU
                  as real-world examples throughout the book Adds a new concrete
                  example, "Going Faster," to demonstrate how understanding
                  hardware can inspire software optimizations that improve
                  performance by 200 times. Discusses and highlights the "Eight
                  Great Ideas" of computer architecture: Performance via
                  Parallelism; Performance via Pipelining; Performance via
                  Prediction; Design for Moore's Law; Hierarchy of Memories;
                  Abstraction to Simplify Design; Make the Common Case Fast; and
                  Dependability via Redundancy. Includes a full set of updated
                  and improved exercises.}
}

Computer Organization and Architecture: Designing for Performance #

Bibtex
@book{stallings2009ComputerOrgPerf,
  author          = {Stallings, William},
  title           = {Computer Organization and Architecture: Designing for
                  Performance},
  year            = 2009,
  isbn            = 9780136073734,
  publisher       = {Prentice Hall Press},
  address         = {USA},
  edition         = {8th},
  abstract        = {KEY BENEFIT: Learn the fundamentals of processor and
                  computer design from the newest edition of this award winning
                  text. KEY TOPICS: Introduction; Computer Evolution and
                  Performance; A Top-Level View of Computer Function and
                  Interconnection; Cache Memory; Internal Memory Technology;
                  External Memory; I/O; Operating System Support; Computer
                  Arithmetic; Instruction Sets: Characteristics and Functions;
                  Instruction Sets: Addressing Modes and Formats; CPU Structure
                  and Function; RISCs; Instruction-Level Parallelism and
                  Superscalar Processors; Control Unit Operation;
                  Microprogrammed Control; Parallel Processing; Multicore
                  Architecture. Online Chapters: Number Systems; Digital Logic;
                  Assembly Language, Assemblers, and Compilers; The IA-64
                  Architecture. MARKET: Ideal for professionals in computer
                  science, computer engineering, and electrical engineering.}
}

RISC-V #

The RISC-V Instruction Set Manual Volume II: Privileged Architecture Version v.20190608 #

Bibtex
@techreport{riscv2019PrivilegeArchitecture,
    Author = {Waterman, Andrew and Lee, Yunsup and Avizienis, Rimas and Patterson, David A. and Asanović, Krste},
    Title = {The RISC-V Instruction Set Manual Volume II: Privileged Architecture Ratified Version 1.11},
    Institution = {EECS Department, University of California, Berkeley},
    Year = {2019},
    Month = {Jun},
    URL = {https://github.com/riscv/riscv-isa-manual/releases/download/Ratified-IMFDQC-and-Priv-v1.11/riscv-privileged-20190608.pdf},
    Number = {v.20190608}
}

The Case for RISC-V in Space #

Bibtex
@inproceedings{ottavi2019TheCaseForRiscvInSpace,
  author          = "Di Mascio, Stefano and Menicucci, Alessandra and Furano,
                  Gianluca and Monteleone, Claudio and Ottavi, Marco",
  editor          = "Saponara, Sergio and De Gloria, Alessandro",
  title           = "The Case for RISC-V in Space",
  booktitle       = "Applications in Electronics Pervading Industry, Environment
                  and Society",
  year            = 2019,
  publisher       = "Springer International Publishing",
  address         = "Cham",
  pages           = "319--325",
  abstract        = "This paper presentsDi Mascio, Stefano preliminary position
                  on theMenicucci, Alessandra use of the novel, free and open
                  RISC-V Instruction Set Architecture (ISA) for on-boardFurano,
                  Gianluca electronics in space. The modular nature of this ISA,
                  the availability of a rich software ecosystem, a rapidly
                  growing communityMonteleone, Claudio and a pool of open-source
                  IP cores will allow Space Industry to spin-in developments
                  from terrestrial fields (in terms of security, artificial
                  intelligence, support forOttavi, Marco operating systems,
                  hardware acceleration etc.) while focusing its efforts mainly
                  on aspects related to the specific needs of on-board
                  electronics for space applications (e.g. fault tolerance,
                  observability, error signaling, etc.). This will improve reuse
                  and avoid the necessity of developments from scratch when not
                  strategically needed, eventually increasing productivity and
                  reducing costs. The use of an open, non proprietary ISA will
                  allow ad-hoc design of microarchitecture-level soft error
                  countermeasures that can greatly increase the robustness of
                  Application Specific Standard Products (ASSP) and FPGA
                  implementations.",
  isbn            = "978-3-030-11973-7"
}

The RISC-V Reader: An Open Architecture Atlas #

Bibtex
@book{patterson2017RiscvAtlas,
  author          = {Patterson, David and Waterman, Andrew},
  title           = {The RISC-V Reader: An Open Architecture Atlas},
  year            = 2017,
  isbn            = 0999249118,
  publisher       = {Strawberry Canyon},
  edition         = {1st},
  abstract        = {The RISC-V Reader is a concise introduction and reference
                  for embedded systems programmers, students, and the curious to
                  a modern, popular, open architecture. RISC-V spans from the
                  cheapest 32-bit embedded microcontroller to the fastest 64-bit
                  cloud computer. The text shows how RISC-V followed the good
                  ideas of past architectures while avoiding their mistake.
                  Highlights include: Introduces the RISC-V instruction set in
                  only 100 pages, including 75 figures An Instruction Translator
                  Guide to help translate assembly language programs from ARM-32
                  and x86-32 instruction sets to RISC-V 2-page RISC-V Reference
                  Card that summarizes all instructions 50-page Instruction
                  Glossary that defines every instruction in detail 75
                  spotlights of good architecture design using margin icons 50
                  sidebars with interesting commentary and RISC-V history 25
                  quotes to pass along wisdom of noted scientists and engineers
                  Ten chapters introduce each component of the modular RISC-V
                  instruction set--often contrasting code compiled from C to
                  RISC-V versus the older ARM, Intel, and MIPS
                  architectures--but readers can start programming after Chapter
                  2. Praise for The RISC-V Reader: This timely book concisely
                  describes the simple, free and open RISC-V ISA that is
                  experiencing rapid uptake in many different computing sectors.
                  Krste Asanovic, University of California, Berkeley, one of the
                  four architects of RISC-V I like RISC-V and this book as they
                  are elegantbrief, to the point, and complete. C. Gordon Bell,
                  a computer architecture pioneer This handy little book
                  effortlessly summarizes all the essential elements of the
                  RISC-V Instruction Set Architecture, a perfect reference guide
                  for students and practitioners alike. Professor Randy Katz,
                  University of California, Berkeley, one of the inventors of
                  RAID storage systems This clearly-written book offers a good
                  introduction to RISC-V, augmented with insightful comments on
                  its evolutionary history and comparisons with other familiar
                  architectures. John Mashey, one of the designers of the MIPS
                  architecture This book tells what RISC-V can do and why its
                  designers chose to endow it with those abilities. Ivan
                  Sutherland, the father of computer graphics RISC-V will change
                  the world, and this book will help you become part of that
                  change. Professor Michael B. Taylor, University of Washington
                  This book will be an invaluable reference for anyone working
                  with the RISC-V ISA. Megan Wachs, PhD, SiFive Engineer}
}

The RISC-V Instruction Set Manual (2014) #

Bibtex
@misc{Waterman14therisc-v,
  author          = {Andrew Waterman and Yunsup Lee and David A. Patterson and
                  Krste Asanovic and Volume I User-level Isa and Andrew Waterman
                  and Yunsup Lee and David Patterson},
  title           = {The RISC-V Instruction Set Manual},
  year            = 2014
}

Computer Organization and Design RISC-V Edition: The Hardware Software Interface #

Bibtex
@book{patterson2017ComputerOrgRiscvEdition,
  author          = {Patterson, David A. and Hennessy, John L.},
  title           = {Computer Organization and Design RISC-V Edition: The
                  Hardware Software Interface},
  year            = 2017,
  isbn            = 0128122757,
  publisher       = {Morgan Kaufmann Publishers Inc.},
  address         = {San Francisco, CA, USA},
  edition         = {1st},
  abstract        = {The new RISC-V Edition of Computer Organization and Design
                  features the RISC-V open source instruction set architecture,
                  the first open source architecture designed to be used in
                  modern computing environments such as cloud computing, mobile
                  devices, and other embedded systems. With the post-PC era now
                  upon us, Computer Organization and Design moves forward to
                  explore this generational change with examples, exercises, and
                  material highlighting the emergence of mobile computing and
                  the Cloud. Updated content featuring tablet computers, Cloud
                  infrastructure, and the x86 (cloud computing) and ARM (mobile
                  computing devices) architectures is included. An online
                  companion Web site provides advanced content for further
                  study, appendices, glossary, references, and recommended
                  reading. Features RISC-V, the first such architecture designed
                  to be used in modern computing environments, such as cloud
                  computing, mobile devices, and other embedded systems Includes
                  relevant examples, exercises, and material highlighting the
                  emergence of mobile computing and the cloud}
}

Software Engineering #

Embedded systems #

Modeling C-based embedded system using UML design #

Bibtex
@inproceedings{wang2009modeling,
  author          = { {Guoping Wang}},
  booktitle       = {2009 International Conference on Mechatronics and
                  Automation},
  title           = {Modeling C-based embedded system using UML design},
  year            = 2009,
  pages           = {2973-2977},
  abstract        = {Unified Modeling Language (UML) 2.0 is emerging in the area
                  of modeling the design of embedded system. The most common
                  implementation for the embedded-system models has been C++. On
                  one hand, the most common programming language for embedded
                  system overall by far is the functional language C. On the
                  other hand, the UML is used almost exclusively for
                  object-oriented systems development. This paper present an
                  approach of applying UML in the functionally-oriented embedded
                  systems design. This approach is illustrated using a stopwatch
                  design example.},
  keywords        = {C++ language;embedded systems;functional languages;Unified
                  Modeling Language;modeling C-based embedded system;UML
                  design;Unified Modeling Language;UML 2.0;C++;programming
                  language;functional language C;object-oriented systems
                  development;functionally-oriented embedded systems
                  design;stopwatch design;Embedded system;Unified modeling
                  language;Object oriented modeling;Computer languages;Embedded
                  computing;Real time systems;Costs;Energy
                  consumption;Mechatronics;Design automation;UML
                  modeling;embedded system
                  design;object-oriented;function-oriented},
  doi             = {10.1109/ICMA.2009.5246023},
  ISSN            = {2152-744X},
  month           = {Aug},
}

Fault tolerant #

Basic concepts and taxonomy of dependable and secure computing #

Bibtex
@article{avizienis2004ConceptsOfSecureComputing,
  author          = {A. {Avizienis} and J. -. {Laprie} and B. {Randell} and C.
                  {Landwehr}},
  journal         = {IEEE Transactions on Dependable and Secure Computing},
  title           = {Basic concepts and taxonomy of dependable and secure
                  computing},
  year            = 2004,
  volume          = 1,
  number          = 1,
  pages           = {11-33},
  abstract        = {This paper gives the main definitions relating to
                  dependability, a generic concept including a special case of
                  such attributes as reliability, availability, safety,
                  integrity, maintainability, etc. Security brings in concerns
                  for confidentiality, in addition to availability and
                  integrity. Basic definitions are given first. They are then
                  commented upon, and supplemented by additional definitions,
                  which address the threats to dependability and security
                  (faults, errors, failures), their attributes, and the means
                  for their achievement (fault prevention, fault tolerance,
                  fault removal, fault forecasting). The aim is to explicate a
                  set of general concepts, of relevance across a wide range of
                  situations and, therefore, helping communication and
                  cooperation among a number of scientific and technical
                  communities, including ones that are concentrating on
                  particular types of system, of system failures, or of causes
                  of system failures.},
  keywords        = {fault tolerant computing;data privacy;security of
                  data;system recovery;software reliability;taxonomy;dependable
                  computing;secure computing;system reliability;system
                  availability;system safety;system integrity;system
                  maintainability;fault prevention;fault tolerance;fault
                  removal;fault forecasting;system security;system
                  failures;system vulnerabilities;system
                  attacks;Taxonomy;Availability;Fault
                  tolerance;Safety;Maintenance;Communication system
                  security;Uncertainty;Standardization;Books;Index Terms-
                  Dependability;security;trust;faults;errors;failures;vulnerabilities;attacks;fault
                  tolerance;fault removal;fault forecasting.},
  doi             = {10.1109/TDSC.2004.2},
  ISSN            = {1941-0018},
  month           = {Jan},
}

System structure for Software Fault Tolerance #

Bibtex
@ARTICLE{RandellSysStructureForSoftwareFaultTolerance,
  author          = {Randell, Brian},
  journal         = {IEEE Transactions on Software Engineering},
  title           = {System structure for software fault tolerance},
  year            = 1975,
  volume          = {SE-1},
  number          = 2,
  pages           = {220-232},
  abstract        = {Presents and discusses the rationale behind a method for
                  structuring complex computing systems by the use of what is
                  termed `recovery blocks,' `conversations,' and `fault-tolerant
                  interfaces.' The aim is to facilitate the provision of
                  dependable error detection and recovery facilities which can
                  cope with errors caused by residual design inadequacies,
                  particularly in the system software, rather than merely the
                  occasional malfunctioning of hardware components.},
  doi             = {10.1109/TSE.1975.6312842},
  ISSN            = {1939-3520},
  month           = {June},
}

Mathematics #

Binary #

Bit Twiddling Hacks #

Bibtex
@misc{sean2005BitTwiddlingHacks,
  title           = { Bit Twiddling Hacks },
  url             = {https://graphics.stanford.edu/~seander/bithacks.html},
  journal         = {Bit Twiddling Hacks},
  author          = {Sean Eron Anderson}
}

Binary number representation #

Bibtex
@misc{binaryNumberRepresentation,
  title           = {Unsigned Binary Integer},
  url             =
                  {https://www.mathcs.emory.edu/~cheung/Courses/255/others/BinNumReps.html},
  journal         = {Binary Number Representations}
}

What are bitwise shift (bit-shift) operators and how do they work? #

Bibtex
@misc{derekpark2008WhatAreBitwiseShift,
  title           = {What are bitwise shift (bit-shift) operators and how do
                  they work?},
  url             = {https://stackoverflow.com/a/141873},
  journal         = {What are bitwise shift (bit-shift) operators and how do
                  they work},
  publisher       = {Stackoverflow},
  author          = {Derek Park},
  year            = 2008,
  month           = {Sep}
}

Database #

SQL databases v. NoSQL databases #

Bibtex
@article{stonerbraker2020SQLDatabasesvNoSQLDatabases,
  author          = {Stonebraker, Michael},
  title           = {SQL Databases v. NoSQL Databases},
  year            = 2010,
  issue_date      = {April 2010},
  publisher       = {Association for Computing Machinery},
  address         = {New York, NY, USA},
  volume          = 53,
  number          = 4,
  issn            = {0001-0782},
  url             = {https://doi.org/10.1145/1721654.1721659},
  doi             = {10.1145/1721654.1721659},
  abstract        = {The Communications Web site, http://cacm.acm.org, features
                  more than a dozen bloggers in the BLOG@CACM community. In each
                  issue of Communications, we'll publish excerpts from selected
                  posts.twitterFollow us on Twitter at
                  http://twitter.com/blogCACMMichael Stonebraker considers
                  several performance arguments in favor of NoSQL
                  databases---and finds them insufficient.},
  journal         = {Commun. ACM},
  month           = apr,
  pages           = {10–11},
  numpages        = 2
}

Algorithms #

Lock-Free Red-Black Trees Using CAS #

Bibtex
@inproceedings{Kim2011LockFreeRT,
  title={Lock-Free Red-Black Trees Using CAS},
  author={Jong Ho Kim and Helen Cameron and Peter C. J. Graham},
  year={2011}
}

Parallel algorithms for red–black trees #

Bibtex
@article{park2001ParallelAlgorithms,
  title           = {Parallel algorithms for red–black trees},
  journal         = {Theoretical Computer Science},
  volume          = 262,
  number          = 1,
  pages           = {415-435},
  year            = 2001,
  issn            = {0304-3975},
  doi             = {https://doi.org/10.1016/S0304-3975(00)00287-5},
  url             = {https://www.sciencedirect.com/science/article/pii/S0304397500002875},
  author          = {Heejin Park and Kunsoo Park},
  keywords        = {Red–black trees, Balanced search trees, Parallel
                  algorithms, Dictionary operations},
  abstract        = {We present parallel algorithms for the following four
                  operations on red–black trees: construction, search,
                  insertion, and deletion. Our parallel algorithm for
                  constructing a red–black tree from a sorted list of n items
                  runs in O(1) time with n processors on the CRCW PRAM and runs
                  in O(loglogn) time with n/loglogn processors on the EREW PRAM.
                  Our construction algorithm does not require the assumptions
                  that previous construction algorithms used. Each of our
                  parallel algorithms for search, insertion, and deletion in
                  red–black trees runs in O(logn+logk) time with k processors on
                  the EREW PRAM, where k is the number of unsorted items to
                  search for, insert, or delete and n is the number of nodes in
                  a red–black tree.}
}

Introduction to algorithms #

Bibtex
@book{introToAlgorithms2009,
  author          = {Cormen, Thomas H. and Leiserson, Charles E. and Rivest,
                  Ronald L. and Stein, Clifford},
  title           = {Introduction to Algorithms, Third Edition},
  year            = 2009,
  isbn            = 0262033844,
  publisher       = {The MIT Press},
  edition         = {3rd},
  abstract        = {If you had to buy just one text on algorithms, Introduction
                  to Algorithms is a magnificent choice. The book begins by
                  considering the mathematical foundations of the analysis of
                  algorithms and maintains this mathematical rigor throughout
                  the work. The tools developed in these opening sections are
                  then applied to sorting, data structures, graphs, and a
                  variety of selected algorithms including computational
                  geometry, string algorithms, parallel models of computation,
                  fast Fourier transforms (FFTs), and more. This book's strength
                  lies in its encyclopedic range, clear exposition, and powerful
                  analysis. Pseudo-code explanation of the algorithms coupled
                  with proof of their accuracy makes this book is a great
                  resource on the basic tools used to analyze the performance of
                  algorithms.}
}

Toward a Unique Representation for AVL and Red-Black Trees #

Bibtex
@article{BOUNIF2019,
  title           = {{Toward a Unique Representation for AVL and Red-Black
                  Trees}},
  journal         = {{Computaci\~A\textthreesuperiorn y Sistemas}},
  author          = {Bounif, Lynda AND Zegour, Djamel Eddine},
  ISSN            = {1405-5546},
  language        = {en},
  URL             = {http://www.scielo.org.mx/scielo.php?script=sci_arttext&pid=S1405-55462019000200435&nrm=iso},
  volume          = 23,
  year            = 2019,
  month           = 06,
  pages           = {435 - 450},
  publisher       = {scielomx},
  crossref        = {10.13053/cys-23-2-2840},
}

Problemas Dinâmicos de Coleta e Entrega Com Janelas de Tempo #

Bibtex
@inproceedings{problemasDinamicosDeColetaEEntregaComJanelasDeTempo,
  author          = {Eccel, Renan and Carlson, Rodrigo},
  year            = 2019,
  month           = 11,
  title           = {PROBLEMAS DINÂMICOS DE COLETA E ENTREGA COM JANELAS DE
                  TEMPO: ANÁLISE DAS INSTÂNCIAS DE BENCHMARK}
}

Concurrent, lock-free insertion in red-black trees #

Bibtex
@article{ma2004concurrent,
  title           = {Concurrent, lock-free insertion in red-black trees},
  author          = {Ma, Jianwen},
  year            = 2004
}


No notes link to this note