| |
| |
Distributed Operating Systems | |
| |
| |
Operating System Fundamentals | |
| |
| |
Evolution of Modern Operating Systems | |
| |
| |
Centralized Operating System Overview | |
| |
| |
Network Operating Systems | |
| |
| |
Distributed Operating Systems | |
| |
| |
Cooperative Autonomous Systems | |
| |
| |
Distributed Algorithms | |
| |
| |
Systems: Concepts and Architecture's | |
| |
| |
Goals | |
| |
| |
Transparency | |
| |
| |
Services | |
| |
| |
Architecture Models | |
| |
| |
Network Communication Protocols Major Design Issues | |
| |
| |
Distributed Computing Environment (DCE) | |
| |
| |
Concurrent Processes and Programming | |
| |
| |
Processes and Threads | |
| |
| |
Graph Models for Process Representation | |
| |
| |
The Client/Server Model Time Services | |
| |
| |
Language Mechanisms for Synchronization | |
| |
| |
Object Model Resource Servers Concurrent Programming Languages | |
| |
| |
Distributed and Network Programming Languages | |
| |
| |
Interprocess Communication and Coordination | |
| |
| |
Message Passing Communication | |
| |
| |
Request/Reply Communication | |
| |
| |
Transaction Communication | |
| |
| |
Name and Directory Services | |
| |
| |
Distributed Mutual Exclusion | |
| |
| |
Leader Election | |
| |
| |
Distributed Process Scheduling | |
| |
| |
A System Performance Model | |
| |
| |
Static Process Scheduling with Communication | |
| |
| |
Dynamic Load Sharing and Balancing | |
| |
| |
Distributed process Implementation | |
| |
| |
Real-time Scheduling | |
| |
| |
Distributed File Systems | |
| |
| |
Transparencies and Characteristics of DFS | |
| |
| |
DFS Design and Implementation | |
| |
| |
Transaction Service and Concurrency Control | |
| |
| |
Data and File Replication | |
| |
| |
Distributed Shared Memory | |
| |
| |
Non-Uniform Memory Access Architecture's | |
| |
| |
Memory Consistency Models | |
| |
| |
Multiprocessor Cache Systems | |
| |
| |
Distributed Shared Memory | |
| |
| |
Implementation of DSM systems | |
| |
| |
Distributed Computer Security | |
| |
| |
Fundamentals of Computer Security | |
| |
| |
Discretionary Access Control Models | |
| |
| |
Mandatory Flow Control Models | |
| |
| |
Cryptography | |
| |
| |
Distributed Authentication and Key Distribution Issues Relevant to Distributed Security | |
| |
| |
Distributed Algorithm | |
| |
| |
Models of Distributed Computation | |
| |
| |
Preliminaries | |
| |
| |
Causality | |
| |
| |
Distributed Snapshots | |
| |
| |
Modeling a Distributed Computation Failures in a Distributed System | |
| |
| |
Synchronization and Election | |
| |
| |
Distributed Mutual Exclusion | |
| |
| |
Election | |
| |
| |
Distributed Agreement | |
| |
| |
Adversaries | |
| |
| |
Byzantine Agreement | |
| |
| |
Impossibility of Consensus | |
| |
| |
Randomized Distributed Agreement | |
| |
| |
Replicated Data Management | |
| |
| |
Database Techniques | |
| |
| |
Atomic Multicast | |
| |
| |
Update Propagation | |
| |
| |
Checkpointing and Recovery | |
| |
| |
Problems in Rollback | |
| |
| |
Incarnation Numbers | |
| |
| |
Taxonomy of Solution Techniques Uncoordinated Checkpointing | |
| |
| |
Coordinated Checkpointing | |
| |
| |
Synchronous Logging Asynchronous Logging | |
| |
| |
Adaptive Logging. 0201498383T04062001 | |