mirror of
https://github.com/papers-we-love/papers-we-love.git
synced 2025-06-13 12:54:28 +00:00
commit
dd6775b162
@ -9,3 +9,4 @@
|
|||||||
* :scroll: [An Axiomatic Basis for Computer Programming](axiomatic-basis-computer-programming.pdf) by C. A. R. HOARE
|
* :scroll: [An Axiomatic Basis for Computer Programming](axiomatic-basis-computer-programming.pdf) by C. A. R. HOARE
|
||||||
* [On the Computational Complexity of Algorithims](http://www.ams.org/journals/tran/1965-117-00/S0002-9947-1965-0170805-7/S0002-9947-1965-0170805-7.pdf) by J. HARTMANIS AND R. E. STEARNS
|
* [On the Computational Complexity of Algorithims](http://www.ams.org/journals/tran/1965-117-00/S0002-9947-1965-0170805-7/S0002-9947-1965-0170805-7.pdf) by J. HARTMANIS AND R. E. STEARNS
|
||||||
* :scroll: [Hints for Computer System Design](hints-for-computer-system-design.pdf)
|
* :scroll: [Hints for Computer System Design](hints-for-computer-system-design.pdf)
|
||||||
|
* :scroll: [Early Lisp History: 1956-1959](early-lisp-history-1956-1959-herbert-stoyan-html-rendering.pdf) by Herbert Stoyan. This is a pdf rendering of the HTML page available at Archive.org.
|
||||||
|
Binary file not shown.
@ -2,14 +2,26 @@
|
|||||||
|
|
||||||
* :scroll: [The UNIX Time-Sharing System](unix-time-sharing-system.pdf)
|
* :scroll: [The UNIX Time-Sharing System](unix-time-sharing-system.pdf)
|
||||||
|
|
||||||
* [Xen and the Art of Virtualization](http://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf)
|
|
||||||
|
|
||||||
* [The operating system: should there be one?](http://plosworkshop.org/2013/preprint/kell.pdf)
|
* [The operating system: should there be one?](http://plosworkshop.org/2013/preprint/kell.pdf)
|
||||||
|
|
||||||
* [The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors](https://people.csail.mit.edu/nickolai/papers/clements-sc.pdf)
|
* [The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors](https://people.csail.mit.edu/nickolai/papers/clements-sc.pdf)
|
||||||
|
|
||||||
|
## System Virtualization
|
||||||
|
|
||||||
|
* [Xen and the Art of Virtualization](http://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf)
|
||||||
|
|
||||||
|
* :scroll: [kvm: the Linux Virtual Machine Monitor](kvm-linux-virtual-machines-monitor.pdf)
|
||||||
|
|
||||||
|
### Live migration of Virtual Machines
|
||||||
|
|
||||||
* :scroll: [Live Migration of Virtual Machines](live-migration-of-virtual-machines.pdf)
|
* :scroll: [Live Migration of Virtual Machines](live-migration-of-virtual-machines.pdf)
|
||||||
|
|
||||||
|
## Jails and containers
|
||||||
|
|
||||||
* :scroll: [Jails: Confining the omnipotent root.](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf)
|
* :scroll: [Jails: Confining the omnipotent root.](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf)
|
||||||
|
|
||||||
* :scroll: [Solaris Zones: Operating System Support for Consolidating Commercial Workloads](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf)
|
* :scroll: [Solaris Zones: Operating System Support for Consolidating Commercial Workloads](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
BIN
operating_systems/kvm-linux-virtual-machines-monitor.pdf
Normal file
BIN
operating_systems/kvm-linux-virtual-machines-monitor.pdf
Normal file
Binary file not shown.
@ -5,3 +5,5 @@
|
|||||||
* [:scroll:](advance_in_quantum_machine_learning.pdf) [Advances in quantum machine learning (2015)](https://arxiv.org/abs/1514.02900) (Jeremy Adcock, Euan Allen, Matthew Day, Stefan Frick, Janna Hinchliff, Mack Johnson, Sam Morley-Short, Sam Pallister, Alasdair Price, Stasja Stanisic)
|
* [:scroll:](advance_in_quantum_machine_learning.pdf) [Advances in quantum machine learning (2015)](https://arxiv.org/abs/1514.02900) (Jeremy Adcock, Euan Allen, Matthew Day, Stefan Frick, Janna Hinchliff, Mack Johnson, Sam Morley-Short, Sam Pallister, Alasdair Price, Stasja Stanisic)
|
||||||
|
|
||||||
* [:scroll:](shors_algorithm.pdf) [Shors algorithm for polynomial time prime factorization (1995)](https://arxiv.org/pdf/quant-ph/9508027.pdf) (Peter W Shor)
|
* [:scroll:](shors_algorithm.pdf) [Shors algorithm for polynomial time prime factorization (1995)](https://arxiv.org/pdf/quant-ph/9508027.pdf) (Peter W Shor)
|
||||||
|
|
||||||
|
* [:scroll:](grovers_algorithm.pdf) [A fast quantum mechanical algorithm for database search](https://arxiv.org/pdf/quant-ph/9605043.pdf) (Lov K. Grover)
|
||||||
|
BIN
quantum_computing/grovers_algorithm.pdf
Normal file
BIN
quantum_computing/grovers_algorithm.pdf
Normal file
Binary file not shown.
@ -1,7 +1,7 @@
|
|||||||
## Security
|
## Security
|
||||||
|
|
||||||
* [Reflections on Trusting Trust (1984)](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf)
|
* [Reflections on Trusting Trust (1984)](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf)
|
||||||
* [Internet Census via Insecure Routers (2012)](http://internetcensus2012.bitbucket.org/paper.html)
|
* [Internet Census via Insecure Routers (2012)](https://internetcensus2012.bitbucket.io/paper.html)
|
||||||
* [Looking inside the (Drop) Box (2013)](https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdf)
|
* [Looking inside the (Drop) Box (2013)](https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdf)
|
||||||
* [Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011)](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf)
|
* [Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011)](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf)
|
||||||
* [Breach: Reviving The Crime Attack (2013)](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf)
|
* [Breach: Reviving The Crime Attack (2013)](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf)
|
||||||
|
Loading…
Reference in New Issue
Block a user