Complex and ordered data structures | Network programming stuff | The basic components of bovine B | Middleware is important | Highly distributed | Close to the original LinuxOS | Read the tool |
---|---|---|---|---|---|---|
🔨 | 🌐 | 🐮 | ✈ | 🖧 | 🖥 | 🧰 |
🔥The original link
🔨 Complex and ordered data structures
No. | Title | Translation (reference) | Company |
---|---|---|---|
1 | A Declarative Query Language for Data Provenance | Declarative Query Language for Data Sources | Foss – Computer Science Institute |
2 | A Hierarchical Bloom Filter Index with Applications to Distributed Data Provenance | Index of Layered Bloom Filters for Distributed Data Sources | United States Naval Academy |
3 | A Model for Learned Bloom Filters,and Optimizing by Sandwiching | Learning bloem’s filter model and Optimizing through Sandwiches | Harvard University, |
4 | A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services | “A Multi-attribute Data Structure with Parallel Bloom Filters for Web Services” | Huazhong University of Science and Technology |
5 | Accelerating Braided B+ Tree Searches on a GPU with CUDA | Accelerating Braided B+ Tree Search on gpus with CUDA | University of Virginia, Department of Computer Science |
6 | Acoustics to the Rescue Physical Key Inference Attack Revisited | Rediscussion of Acoustic Reasoning Attack on Rescue Physical Key | National University of Singapore |
7 | Adaptive Learned Bloom Filter (ADA-BF) Efficient Utilization of the Classifier with Application to real-time Information Filtering on the Web | “Efficient Use of Adaptive Learning Bloom Filter (ADA-BF) Classifier and Its Application in Web Real-time Information Filtering” | Rice university |
8 | An Improved Construction for Counting Bloom Filters | “An improved structure for computing Bloom filters” | Harvard University, |
9 | An Introduction to Bε-trees and Write-Optimization | Introduction to B + Trees and Writing Optimization | |
10 | Analysis of Encryption Algorithms to Basic Operations on Outsourced B+ Data Privacy | Analysis of Encryption Algorithms for Outsourcing B+ Basic Data Privacy Operations | |
11 | Analysis of B tree Data Structure and Its Usage in Computer Forensics | B-tree Data Structure Analysis and Its Application in Computer Forensics | University of Zagreb |
11 | “B + TREES” | The B + tree | Microsoft |
12 | Benchmarking a B-tree Compression Method | “Benchmarking b-tree Compression Methods” | Technical University of Ostrava |
13 | Blitz Secure Multi-Hop Payments Without Two-Phase Commits | Blitzkrieg secure Multi-hop payout without two-stage commit | |
14 | Bloom Filters — Short Tutorial | Bloem Filters – A Short Tutorial | |
15 | Bloom Filters Design Innovations and Novel Applications | Design Innovation and Novel Application of Bloom Filter | Stanford University |
16 | Bloom Filters in Adversarial Environments | Bloom filters in hostile Environments | |
17 | The Bloom Filters” | Bloom’s Filter | |
18 | B+ Tree A Predictive B+-Tree for Reducing Writes on Phase Change Memory | “Predictive B+ trees for reducing write operations on phase-change Memory” | Alibaba |
19 | Cache Efficient Bloom Filters for Shared Memory Machines | Caching efficient Bloom Filters for Shared Memory Machines | Massachusetts Institute of Technology |
20 | Cache-, Hash- and Space-efficient Bloom Filters | Caching, Hashing, and Spatial Efficiency Bloom Filters | Amazon |
21 | Caches and Hash Trees for Efficient Memory Integrity Verification | Efficient Memory Integrity Verification for Caches and Hash trees | Massachusetts Institute of Technology |
21 | Compressed Bloom Filters | Compressed Bloom Filter | Harvard University, |
23 | Constructing Red-Black Trees | Building a Red-Black Tree | Amazon |
24 | “Cuckoo Filter Practically Better Than Bloom” | Cuckoo Filters Are Actually Better than Bloom | Harvard University, |
25 | Data Step Hash Objects as Programming Tools | Data Step Hash Object as a Programming tool | |
26 | Deletion The Curse of The Red-black Tree | Deleting the Curse of the Red-black Tree | The university of Utah |
27 | Detailed Provenance Metadata from Statistical Analysis Software | Detailed Source metadata from Statistical Analysis Software | University of Michigan |
28 | Efficient Sparse Merkle Tree Caching Strategies and Secure (non-) Membership Proofs | Efficient Sparse Merkle Tree Caching Strategy and Secure (Non-) Membership Proof | Organic Electronics Research Center, Yamagata University |
29 | Efficient Update Control of Bloom Filter Replicas in Distributed Systems | Effective Update Control of Bloom Filter Replicas in Distributed Systems | At the university of Maine |
30 | Enhancing the B Tree by Dynamic Node Popularity Caching | “Enhancing B-trees through Dynamic Node Popularity Caching” | University of Melbourne |
31 | Experimental B+-tree for GPU | Experimental B+ trees for Gpus | Warsaw University of Technology |
32 | Feature Hashing for Large Scale Multitask Learning | “Feature Hashing for Large-scale multitasking learning” | Yahoo |
33 | Hash, Displace, and Compress | Hashing, Permutation, and Compression | Technical University of Ilmenau |
34 | Hash routing Schemes for Information Centric Networking Hash Join Algorithms for Multi-Core CPUs | Hashing Algorithms for Multi-core cpus | University of Wisconsin-Madison |
35 | Hashing Routing Schemes for Information Centric Networking | Hashing Routing Schemes for Information Center Networks | University of London |
36 | How to Break MD5 and Other Hash Functions | How to Break MD5 and Other Hash Functions | Shandong university, |
37 | 171 HyperChromatic trees A Fine-Grained Approach to Distributed algorithms on RedBlack Trees | “Hypercoloring tree is a Fine-grained approach to distributed algorithms on red-black trees” | Polytechnic University of Catalonia |
38 | Ideal Hash Trees | The Ideal Hash Tree | |
39 | Implementing Deletion in B+ -trees | “Implementing deletion in B+- trees” | Stanford University |
40 | Incrementally Distributed B+ Challenges | B+ Challenges for Incremental Distributions | University of Mississippi |
41 | Hostels Brainwave Authentication New Techniques and Insights on User Acceptance | Cheap Brainwave Authentication New Technology and User Acceptance insights | University of Mannheim |
42 | Introduction to Red Black Trees | Introduction to red Black Trees | unknown |
43 | Jungle Towards Creating Key-Value Store by Combining Lsm-tree and Copy-On-Write B+ -tree | Dynamic Key-value Storage by combining LSM-tree and copy-on-write B+ -tree | |
44 | Learned Hashing -Index A Collision Competition | “Learning hash Index A Collision Contest” | baidu |
45 | Left-leaning Red-Black Trees | The Left-leaning Red Black Tree | Princeton University |
46 | Lock-free Red-black Trees Using CAS | Lockless red-black trees with CAS | Natural Sciences and Engineering Research Council of Canada |
47 | Making B+-Trees Cache Conscious in Main Memory | “Making B+ -trees cache conscious in main memory” | Columbia University |
48 | MilliSort and MilliQuery large-scale Data-intensive Computing in Milliseconds | “Large-scale Data-intensive computing in milliseconds” | Stanford University |
49 | Modern B-Tree Techniques | Modern B-tree Technology | Dolby LABS |
50 | Network Applications of Bloom Filters A Survey | Overview of Network Applications of Bloom Filters | |
51 | Obfuscation-Resilient Executable Payload Extraction From Packed Malware | “Extracting Fuzzy Elastic Executable Payloads from Packaged Malware” | University of Texas |
52 | Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees | “Optimal Parameter Selection for Efficient Memory Integrity Verification Based on Merkle Hash Trees” | Cornell University |
53 | Persistent B+ -trees in Non-volatile Main Memory | Persistent B+ trees in nonvolatile main memory | Renmin University of China |
54 | Persistent Bloom Filter Membership Testing for the Entire History | Persistent Blossom Filter Membership Test for entire history | University of Utah, East China Normal University |
55 | Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables | Refix Hash Tree is an index data structure on a distributed Hash table | University of California |
56 | Provenance Expresmarking on Non-Deterministic Executions | Source Expressiveness Benchmarks for Nondeterministic Execution | Heriot-watt University |
57 | Red Black Tree | Red Black Tree | |
58 | Red Black Tree Final | Red Black Tree Final | |
59 | Red-black and AA Trees | Red and Black and the AA Tree | |
60 | Red-black Trees CSS230 | “Red-black” Tree CSS230 | |
61 | Red-black Trees with Relative Node Keys | “Red-black trees with Relative Nodal Keys” | Eindhoven University of Technology |
62 | Red-black Trees with Types | Red Black Trees with Types | University of Kent, Canterbury |
63 | The Red – Black trees” | Red Black Tree | unknown |
64 | Relaxed Red-black Trees with Group Updates | Relaxed Red Black Tree and Group Update | Department of Mathematics and Computer Science, University of Southern Denmark |
65 | Role of Bloom Filter in Big Data Research A Survey | Review of Bloom Filter’s Role in Big Data Research | Silchal National Institute of Technology |
66 | Scalable Bloom Filters | Retractable Bloom filter | University of Minho |
67 | Selecting a Hashing Algorithm | Selection hashing Algorithm | Department of Computer Science, University of Canterbury |
68 | Social Hash Partitioner A Scalable Distributed Hypergraph Partitioner | “Social Hash partitioner: a scalable distributed hypergraph partitioner” | |
69 | Specification of Red-Black Trees | Red-black Tree Specification | Laboratory Symposium, Edinburgh |
70 | Swiped Analyzing Ground-Truth Data of a Marketplace for Stolen Debit and Credit Cards | Swiped Analyzes stolen Debit and Credit Card Market Truth Data | New York university, |
71 | The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases | Adaptive Cardinality Trees: Art Indexing of Main Memory Databases | Singapore Polytechnic University |
72 | The BW-tree A B-tree for New Hardware Platforms | B-trees for New Hardware Platforms | Microsoft |
73 | The Ubiquitous B-Tree | The Ubiquitous B-Tree | Department of Computer Science, Purdue University |
74 | The Red – Black Trees” | Red Black Tree | unknown |
75 | Trie An Alternative Data Structure for Data Mining Algorithms | “Trying another Data Structure for Data Mining Algorithms” | Institute of Computer and Automation, Hungarian Academy of Sciences |
76 | Type-safe Modular Hash-Consing | “Type-safe Modular Hash-consing” | University of Paris |
77 | Understanding Bloom Filter Intersection Caching Strategies and Secure (non-) Membership Proofs | Understanding Bloom Filter Intersection Caching Policies and Secure (Non-) Membership Proofs | University of Toronto |
78 | Verification of B+ Trees An Experiment Combining Shape Analysis and Interactive SPECIAL Proving | Verification of B+ trees — Experiments combining Shape Analysis and Interaction Theorem Proving | Augsburg University, Germany |
79 | The Verkle Trees” | The tree of Verkle | unknown |
80 | Weaponizing Middleboxes for TCP Reflected Amplification | “TCP Reflection amplification weaponized Middleware” | University of Maryland |
81 | Weighted Bloom Filter | Weighted Bloom filter | Department of Electrical Engineering, Caltech |
82 | Workload Aware B+ Trees | Workload Awareness B+ Tree | unknown |
83 | YARIX Scalable Yara-based Malware Intelligence | Scalable Malware Intelligence based on YARIX | Helmholtz Information Security Center |
🌐 web programming stuff
No. | Title | Translation (reference) | Company |
---|---|---|---|
1 | A Component-based Approach to the Design of Networked Control Systems | “A Component-based Networked Control System Design Method” | unknown |
2 | A decision-analytic Approach for P2P Cooperation Policy Setting | A Decision-making Analysis Method for P2P Cooperation Strategy Setting | Amil Kabir University of Technology |
3 | A Design and Implementation of Active Network Socket Programming | Design and Implementation of an Active Network Socket Programming | University of Toronto |
4 | A Look Back at “Security Problems in the TCPIP Protocol Suite” | Review “Security Issues in TCPIP Protocol Suite” | AT&T LABS Research |
5 | A P2P VIDEO DELIVERY NETWORK (P2P-VDN) | P2p Video Distribution Network (P2P-VDN) | Oregon State University |
6 | “A proposal to add coroutines to the C++ standard library (Revision 1)” | Recommendations for adding coroutines to the c++ standard library (revision 1) | unknown |
7 | A Simple Model for Analyzing P2P Streaming Protocols | “A Simple Model for Analyzing P2P Streaming protocols” | The Chinese University of Hong Kong |
8 | A Survey of Asynchronous Programming Using Coroutines in the Internet of Things and Embedded Systems | Overview of Coroutine Asynchronous Programming in The Internet of Things and Embedded Systems | James Cook University |
9 | “A Verified Abstract Machine for Functional Coroutines” | Validation abstract Machines for functional Coroutines | unknown |
10 | Adding Async RAII Support to Coroutines | “Adding asynchronous RAII Support to coroutines” | unknown |
11 | Attaining the Promise and Avoiding the Take-aways of TCP in the Datacenter | “Delivering on the Promise of TCP and Avoiding TCP’s Pitfalls in the Data Center” | unknown |
12 | Base of the Networking Protocol — TCPIP Its Design and Security Aspects | Network Protocol-based – Design and Security Aspects of TCPIP | Engineering, Rissoni School of Engineering |
13 | Beej’s Guide to Network Programming | Beej’s Guide to Web Programming | “Beej Jorgensen” Hall |
14 | Bitcoin A Peer-to-peer Electronic Cash System | Bitcoin: A Peer-to-peer Electronic Cash System | unknown |
15 | Combining TCP and UDP for Secure Data Transfer | Secure Data Transmission combining TCP and UDP | School of Computing, University of Sastra |
16 | Comparative Evaluation of Kernel Bypass Mechanisms for High-performance Inter-Container Communications | Comparative Evaluation of kernel bypass mechanisms for High-performance Inter-container Communication | Ericsson |
17 | Configtron dzj00 Network diversity with Heterogeneous Configurations | Configtron Solves network Diversity through Heterogeneous Configuration | Duke University |
18 | Coroutines TS for C++20 | Coroutines TS for C++20 | Charlie Kolb |
19 | Designs and Evaluation of a Tracker in P2P Networks | “Design and Evaluation of Trackers in P2P Networks” | The Chinese University of Hong Kong |
20 | Dissecting Performance of Production QUIC | Analysis of Production QUIC Performance | Brown university, |
21 | Embedding Covert Channels into TCP/IP | Embedding covert Channels into TCP/IP | The university of Cambridge |
22 | Evaluating Predictors of Congestion Collapse in Communication Networks | Evaluation of congestion Crash Predictors for Communication networks | National Institute of Standards and Technology |
23 | Full TCP/IP for 8-bit Architectures | “Full TCP/IP in 8-bit architecture” | Swedish Academy of Computer Science |
24 | High-speed Software Data Plane via Vectorized Packet Processing | High speed Software Data Plane Based on Vector Packet Processing | Cisco |
25 | Incremental Approach Coroutine TS + Core Coroutines | Incremental Method Coroutines TS + Core Coroutines | microsoft |
26 | Innovating Transport with QUIC Design Approaches and Research Challenges | Challenging Innovative Transportation with QUIC Design Methods and Research | Tsinghua university, |
27 | Interaction Between TCP and UDP Flows in Wireless Multi-Hop Ad Hoc Networks | “TCP and UDP Traffic Interaction in Wireless Multi-hop Ad Hoc Networks” | Uppsala University |
28 | Introduction to TCP/IP Network Attacks | Introduction to TCP/IP Network Attacks | Iowa State University |
29 | JAVA NETWORK PROGRAMMING USING Sockets | “Java Network Programming with Sockets” | unknown |
30 | Kademlia A Peer-to-peer Information System Based on the XOR Metric | Point-to-point Information Systems Based on XOR Metrics | New York university, |
31 | Masking IPs with Migration in QUIC | MIMIQ uses migration masking IP in QUIC | Princeton University |
32 | MTCP A Highly Scalable User-level TCP Stack for Multicore Systems | “A highly scalable user-level TCP Stack for multi-core systems” | Princeton University |
33 | NetKAT Semantic Foundations for Networks | Fundamentals of Web Semantics | Carnegie Mellon University |
34 | Netmap A Novel Framework for Fast Packet IO | Netmap is a New framework for Fast Packet IO | At the university of Pisa |
35 | Netmap Memory Mapped Access To Network Devices | Netmap Memory Mapping Accessing Network Devices | At the university of Pisa |
36 | Network Application Frameworks | Web Application Framework | Seine dynamics |
37 | Network Programming in Age of Empires and Beyond | Network Programming in Age of Empires | microsoft |
38 | The Network Programming” | Network Programming | unknown |
39 | Observations of UDP to TCP Ratio and Port Numbers | UDP to TCP Ratio and Port Number Observation | University of Auckland |
40 | Operational Semantics for Declarative Networking | “Operational Semantics for declarative Networks” | Max Planck Institute for Software Systems |
41 | OReilly – Java Network Programming 2ED | Orilly – Java Network Programming 2ED | book |
42 | P2P File-Sharing in Hell Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks | P2P File Sharing in Hell Launches A Distributed Reflex DoS Attack using BitTorrent Vulnerability | City University London |
43 | Packetdrill Scriptable Network Stack Testing, From Sockets to Packets | Scripted Network Stack testing, socket to packet | |
44 | The Major categories of Payload Caching High-speed Data Forwarding for Network Are wholesalers and retailers. | “Payload Caching for High-speed Data Forwarding in Network Mediation” | Duke university |
45 | Peer-to-peer (P2P) File Sharing Applications and Their Threat to the Corporate Environment | Peer-to-peer (P2P) File Sharing Applications and their Threat to the Enterprise Environment | GIAC utility library |
46 | Peer-to-peer Architecture Case Study of Gnutella Network | Peer-to-peer Architecture Case Study Gnutella Networks | University of Chicago |
47 | Performance of TCP/IP Over Next Generation Broadband Wireless Access Networks | TCP/IP Performance in Next Generation Broadband Wireless Access Networks | Iospan Wireless |
48 | Performance of UDP and TCP Communication on Personal Computers | “UDP and TCP Communication Performance on personal Computers” | University of Zagreb |
49 | Performant TCP for Low-Power Wireless Networks | High Performance TCP for Low Power Wireless Networks | University of California |
50 | Portable Desktop Applications Based on P2P Transportation and Virtualization | Portable Desktop Applications based on P2P Transport and Virtualization | Tsinghua university, |
51 | Proceedings of the First Symposium onNetworked Systems Design and Implementation | Proceedings of the 1st Symposium on Network System Design and Implementation | Stanford University |
52 | Protocol Independence Using the Sockets API | Protocol Independence using socket apis | University of Virginia |
53 | Reflections on Active Networking | Thoughts on Active Networks | University of Pennsylvania |
54 | Reliable Blast UDP Predictable High Performance Bulk Data Transfer | Reliable Exploding UDP for Predicting High Performance and Large Capacity Data Transmission | University of Illinois at Chicago |
55 | Research on Computer Programming Optimization System Based on Big Data Technology | Research on Computer Programming Optimization System Based on Big Data Technology | Wuhan University of Technology |
56 | The Revisiting Coroutines” | Review of coroutines | University of Rio de Janeiro |
57 | Scalable Network IO in Linux | Extensible Networking IO in Linux | University of Michigan |
58 | Secure WWW Transactions Using Standard HTTP and Java Applets | Secure WWW Transactions using Standard HTTP and Java Applets | The university of Turin |
59 | Self-stabilizing Structured Ring Topology P2P Systems | Self-stabilized Structured Ring Topology P2P System | North Carolina State University |
60 | Slipstream Automatic Interprocess Communication Optimization | Optimization of Slipstream Automatic Interprocess Communication | University of Illinois at Urbana-Champaign |
61 | SNP An Interface for Secure Network Programming | SNP Secure Network Programming Interface | University of Texas |
62 | The Socket Programming” | Socket Programming | Assam City University |
63 | “StackMap Low-Latency Networking with the OS Stack and Dedicated NICs” | StackMap Low-latency networking, supporting OS stacks and Dedicated nics | Keio University |
64 | Taking a Long Look at QUIC | The Long Look at QUIC | Northeastern University |
65 | The TCP/IP the Overview | Overview of TCP/IP | Cisco |
66 | The Benefits and Costs of Writing a POSIX Kernel in a High-level Language | “The Benefits and Costs of Writing POSIX kernels in high-level Languages” | Massachusetts Institute of Technology |
67 | The Networks of Reinvention | The Reinventing Network | unknown |
68 | The QUIC Transport Protocol: Design and Internet-Scale Deployment | QUIC Transport Protocol: Design and Internet-scale Deployment | |
69 | The Secure Socket API TLS as an Operating System Service (USENIX) | Secure Socket API TLS as An Operating System Service (USENIX) | Brigham Young University |
70 | The Secure Socket API TLS as an Operating System Service | Secure Socket API TLS as An Operating System Service | Harvard University, |
71 | “Toward Efficient Querying of Compressed Network Payloads” | Efficient Query compressed Network Load | University of North Carolina |
72 | Towards Securing the Internet of Things with QUIC | Securing the Internet of Things through QUIC | Network Equipment Company |
73 | TRANSMISSION CONTROL PROTOCOL | Transmission Control Protocol | unknown |
74 | TrapezeIP TCP/IP at near-gigabit Speeds | Trapzeip TCP/IP at nearly A Gigabit speed | Duke university |
75 | User Space Network Drivers | User Space Network Driver | Technical University of Munich |
76 | Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability | Predictive iSCSI Services using TCP/IP Traffic Shaping | University of Oslo |
77 | To be continued… |
🐮 Basic components of bovine B
No. | Title | Translation (reference) | Company |
---|---|---|---|
1 | A Comparative Study of Database Connection Pooling Strategy | A Comparative Study of Database Connection Pool Strategies | Engineering College, Pune, Maharashtra |
2 | A Design Framework for Highly Concurrent Systems | Design Framework for High Concurrency Systems | University of California, Berkeley |
3 | A Lock-free, Cache-efficient Multi-Core Synchronization Mechanism for Line-rate Network Traffic Monitoring | “A Lock-free, Cache Efficient Multi-core Synchronization Mechanism for Line Rate Network Traffic Monitoring” | Bell LABS |
4 | A Lock-free, Cache-efficient Shared Ring Buffer for Multi-Core Architectures | “Lock-free, High-Caching Shared Ring Buffers for Multi-Core Architectures” | Bell LABS alcatel-Lucent |
5 | A New Method in Improving Database Connection Pool Model | A New Method to Improve the Database Connection Pool Model | World Association for Science, Engineering and Technology |
6 | A Programming Interface for Scalable Network Socket IO | Programming Interface for Extensible Network Socket IO | unknown |
7 | Analyzing Parallel Real-time Tasks Implemented with Thread Pools | Analyzing Parallel Real-time Tasks with Thread Pools | Santa Ana High School |
8 | Auto-tuned Threading for OLDI Microservices | Automatic Tuning Threads for OLDI Microservices | University of Michigan |
9 | Datacenter Tax Cuts Improving WSC Efficiency | Data Center Tax Cuts Improve WSC Efficiency | University of California, Berkeley |
10 | ECS with NGINX (OpenResty) | ECS and NGINX (OpenResty) | dell |
11 | Evaluating and Optimizing Thread Pool Strategies for Real-Time CORBA | Evaluating and Optimizing thread Pool Strategies for Real-time CORBA | University of Washington |
12 | Evaluation of the Impact of Cache Coherence Protocol and Data Locality on the Efficiency of Atomic Operations on Multicore Processors.” | Evaluation of the Impact of Cache Consistency Protocols and Data Locality on atomic Operation Efficiency on Multi-core Processors | St. Petersburg University of Electrical Technology |
13 | HBase Connection Dynamic Keeping Method Based on Reactor Pattern | HBase Connection Dynamic Retention Method based on Reactor Mode | IEEE/ACM Journal of Networking |
14 | Hybrid Synchronization Based Distributed Thread Pool | Distributed Thread Pooling based on Hybrid Synchronization | Hazara University, Department of Information Technology |
15 | Implementation of Multiple Thread Pools Based on Distribution of Service Times by Riaz Shah | Riaz Shah implements Multiple Thread Pools based on Service Time Distribution | HAL |
16 | Improving WSC Efficiency Through Protocol Buffer | “Improving WSC Efficiency through Protocol Buffers” | University of California, Berkeley |
17 | Modeling and Analysis of Threadpools | Modeling and Analysis of Thread Pools | Kiel University, Germany |
18 | Prediction and Frequency Based Dynamic Thread Pool System A Hybrid Model | Dynamic Thread Pool Systems based on Prediction and Frequency — a Hybrid Model | Hazara University |
19 | Programming with Threads | Multithreaded Programming | Digital Equipment Corporation Systems Research Center |
20 | ProIO An Event-based IO Stream Format for Protobuf Messages | ProIO an event-based IO stream format for Protobuf messages | Argonne National Laboratory |
21 | The Java.util.Concurrent Synchronizer Framework | Concurrent Synchronizer Framework | Virginia State University |
22 | Multicore Locks: The Case Is Not Closed Yet | Multicore Locks: The Situation is Not Over | University of Grenoble |
23 | The Mutual Exclusion Problem Part II Statement and Solutions | Mutual Exclusion Problem, Part II: Statements and Solutions | Digital Equipment Company |
24 | Performance Comparison of Messaging Protocols and Serialization Formats for Digital Twins in IoV | “Performance Comparison of messaging Protocols and Serialization Formats for digital twins in IoV” | Linkoping University |
25 | Software Debugging Techniques | Software Debugging Technology | At the university of London |
26 | “Performance Evaluation of Using Protocol Buffers in the Internet of Things Communication” | “Performance Evaluation of Protocol Buffers used in Internet of Things Communications” | University of Novi Sad |
27 | A Verified Protocol Buffer Compiler | A Proven protocol buffering compiler | Purdue university, |
28 | Scalable Queue-based Spin Locks with Timeout | Extensible Queue-based Timeout Spinlocks | University of Rochester |
29 | The Problem of Mutual Exclusion A New Distributed Solution | A New Distributed Solution to The Mutual Exclusion Problem | Virginia Commonwealth University |
30 | Hashed and Hierarchical Timing Wheels: Efficient Data Structures for Implementing a Timer Facility | Hashing and hierarchical timing wheels: Efficient Data structures for Implementing timer facilities | unknown |
31 | “Using Protocol Buffers for Resource-constrained Distributed Embedded Systems” | Using Protocol Buffers in Resource-constrained Distributed Embedded Systems | Technical University of Munich, Germany |
32 | To be continued… |
✈ Middleware is important
No. | Title | Translation (reference) | Company |
---|---|---|---|
1 | Practical Perl Tools Redis Meet Perl | Redis meets Perl | School of Computer and Information, Northeastern University |
2 | MySQL Based Selection of Appropriate Indexing Technique in Hospital System using Multiclass SVM | Selection of Appropriate Indexing Techniques in Hospital System based on mysql-based Multi-class Support Vector Machines | Department of Electrical Engineering, IIT |
3 | Doing Database Design with MySQL | Database Design with MySQL | Western New England University |
4 | Hyperbolic Caching: Flexible Caching for Web Applications | Hyperbolic Caching: Flexible Caching for Web Applications | Microsoft Research |
5 | Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface | Rebuilding software I/O paths using failed atom Memory Mapping interfaces | Korea Advanced Institute of Science and Technology |
6 | Making Network Stack Part of the Virtualized Infrastructure | “Making the Network Stack Part of the Virtualization Infrastructure” | |
7 | Making Volatile Index Structures Persistent with Dram-NVmm Tiering | “Persistence of Volatile Index Structures using RAM-NVMM Grading” | |
8 | Logical Distributed Counting for Scalable File Access | Logical Distributed Counting for Extensible File Access | |
9 | Towards Scalable and Reliable In-Memory Storage Systems: A Case Study with Redis | Toward Scalable and Reliable Memory Storage Systems: A Case Study based on Redis | |
10 | The Contrail Architecture” | Track Cloud Architecture | |
11 | Database Caching Strategies Using Redis AWS Whitepaper | “Database Caching Strategies using Redis AWS Whitepapers” | |
12 | Database Technology for the 2020s | Database Technology for the 2020s | |
13 | The Evolution of an Extension Language A History of Lua | The Evolution of an Extended Language: A History of Lua | |
14 | MONGODB VS MYSQL A Comparative Study of: MONGODB and MYSQL Based on Their Performance | “A Comparative study of MONGODB and MYSQL: Based on Their Performance” | |
15 | Enlightening the IO Path: Enlightening the IO Path | Inspiring IO Path | |
16 | Enhancing M-Learning Using GridFS for storing and Streaming Digital Content | Enhancing Mobile Learning with GridFS to Store and stream digital Content | |
17 | The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis | Dynamic Balancing Protocols: Avoiding Transaction coordination through Program Analysis | |
18 | Revisiting Concurrency in High-performance NoSQL Databases | “Reaccessing Concurrency in a High-performance NoSQL Database” | |
19 | A Distributed Redis Framework for Use in the UCWW | Distributed Redis Framework for UCWW | |
20 | NVMOVE Helping Programmers Move to byte-based Persistence | NVMOVE helps Programmers move to Bytes-based Persistence | |
21 | Selection and Use of MySQL in a Database Management Course | Selection and Use of MySQL in Database Management Course | |
22 | Uild-a Multi-Region, Highly Available MySQL Architecture | Deploying a Multi-zone, highly available MySQL Architecture | |
23 | MongoDB Database Administration | MongoDB Database Management | |
24 | MySQL Cluster Internal Architecture | MySQL Cluster Internal Architecture | |
25 | MySQL V5 — Ready for Prime Time Business Intelligence | MySQL V5 – Business Intelligence Ready for Prime Time | |
26 | Oracle MySQL Database Service with HeatWave Query Accelerator | Oracle MySQL Database Service and Heat Wave Query Accelerator | |
27 | Scaling Memcache at Facebook | Extending Memcache on Facebook | |
28 | “Unifying Timestamp with Transaction Ordering for MVCC with Decentralized Scalar Timestamp” | “Unified Timestamp and Transaction Ordering for MVCC with Decentralized Scalar Timestamps” | |
29 | MegaPipe A New Programming Interface for Scalable Network IO | MegaPipe: A New Extensible Network IO Programming Interface | |
30 | Write Dependency Disentanglement with Horae | Writing Dependency Untangling with Horae | |
31 | Testing Database Engines via Pivoted Query Synthesis | “Compose test Database Engine by Pivot Query” | |
32 | Recovery Principles of MySQL Cluster 5.1 | MySQL Cluster Recovery Principles | |
33 | Persisting Objects in Redis key-value Database | “Persisting objects in Redis Key database” | |
34 | Identifying Unexpected Internet Services | “Identifying Unexpected Internet Services” | |
35 | Using Internal MySQLInnoDB B-tree Index Navigation for Data Hiding Purposes | “Using internal MySQLInnoDB b-tree index to navigate data hiding purposes” | |
36 | The SQL the Transactions | SQL Transactions | |
37 | InnoDB to MyRocks Migration in main MySQL Database at Facebook | InnoDB to MyRocks to Facebook’s main MySQL database | |
38 | Autopsy of a MySQL Automation Disaster | Anatomy of a MySQL Automation Disaster | |
39 | Zero-downtime and Data Migration of a Mature Multi-Shard Platform | Zero-downtime Rebalancing and Data Migration for Mature Multi-sharding Platforms | |
40 | Study and Optimization Based on MySQL Storage Engine | Research and Optimization of storage Engine Based on MySQL | |
41 | To be continued… |
🖧 grandly distributed
No. | Title | Translation (reference) | Company |
---|---|---|---|
1 | A Lightweight and High Performance Remote Procedure Call Framework for Cross Platform Communication | “Lightweight High-performance Remote Procedure Call Framework for Cross-platform Communication” | The first International Conference on Software Engineering and Applications |
2 | Large-scale Cloud Service Using Ceph | Large-scale Cloud Services using Ceph | Giannakos |
3 | An Introduction to Docker for Reproducible Research, with Examples from the R Environment | Introduction to Reproducible studies of Docker, with R environment as an example | Inventory Evaluation Research Center |
4 | Architectural Patterns for Microservices: A Systematic Mapping Study | Architecture Patterns for Microservices: A System Mapping Study | Tampere University of Technology |
5 | Accelerating TensorFlow with Adaptive RDMA-based gRPC | GRPC Accelerated TensorFlow based on Adaptive RDMA | Ohio State University |
6 | An Introduction to Docker and Analysis of Its Performance | Introduction and Performance Analysis of Docker | Asia-pacific University of Science and Technology Innovation |
7 | “A Comparative Study of MicroServices-based IoT Platforms” | Comparative Study on Internet of Things Platform Based on Microservices | Hassan II University |
8 | An Architect s Guide to APIs SOAP REST GraphQL and gRPC Enable Architect | API SOAP REST GraphQL and gRPC Enable Architect Architect Guide | unknown |
9 | AN APPROACH OF EXPLOITING DOCKER AN APPROACH OF EXPLOITING DOCKER | A Docker Development Method A Docker development Method | JSS University of Technology |
10 | An Introduction to Docker and Analysis of Its Performance | Introduction and Performance Analysis of Docker | |
11 | Experience with Rules-based Programming for Distributed, Concurrent, Fault-Tolerant Code | Rule-based Programming experience with Distributed, Concurrent, fault-tolerant Code | University of Utah, Stanford university |
12 | Modular Composition of Coordination Services | Composition of Coordination Services Module | |
13 | DupHunter Flexible High-performance Deduplication for Docker Registries | Flexible High Performance Deduplication with DupHunter for the Docker registry | IBM |
14 | Availability and Scalability Optimized Microservice Discovery from Enterprise Systems | Availability and Scalability of Microservice Discovery optimized from Enterprise Systems | University of Queensland |
15 | Load Balancing Using Docker and Kubernetes A Comparative Study | A Comparative Study of Docker and Kubernetes Load Balancing | unknown |
16 | Beats per-minute (BPM) A MicroService-based Platform for the Monitoring of Health Related Data via Activity Trackers | “BPM (BPM): A Microservices-based platform for monitoring health-related Data through Activity trackers” | Dell |
17 | Business Object Centric Microservices Patterns | “Business Object Centric Microservices Model” | University of Queensland |
18 | Using Docker Containers to Improve Reproducibility in Software and Web Engineering Research | Improving Reproducibility in Software and Web Engineering Research using Docker Containers | University of Zurich |
19 | Continuous Software Engineering — A Microservices Architecture Perspective | “Continuous Software Engineering: A Microservices Architecture Perspective” | Dublin City University |
20 | Taking the Cloud-Native Approach with Microservices | “Micro Services adopt native Cloud Approach” | |
21 | Containerized Microservices Architecture | Containerized Microservices Architecture | Patkal Institute of Science |
22 | An Updated Performance Comparison of Virtual Machines and Linux Containers | Performance Comparison between Virtual Machines and Linux Containers | IBM |
23 | Supporting Docker in Emulab-based Network Testbeds | Support Docker in simulation-based Network Test Platform | The university of Utah |
24 | Development of Deployment Management System to solve the complexity and runtime of Microservices deployment Challenges.” | Developing a Deployment management System to address the challenges of Microservice deployment complexity and runtime Scalability | Master of Science program in Computer Science |
25 | Devops and Microservices Based Internet of Things Meta-Model | An Internet of Things meta-model based on Devops and Microservices | Hasan University Information Technology and Modeling Laboratory |
26 | Distributed Network Computing over Local ATM Networks | Distributed Network Computing over Local ATM Networks | University of Minnesota |
27 | Distributed Systems Support for Adaptive Mobile Applications | Distributed Systems support Adaptive Mobile Applications | Lancaster University |
28 | Understanding the Security Risks of Docker Hub | Understanding the Security Risks of Docker Hub | Zhejiang University, IBM, etc |
29 | The Docker Container” | Containerization | unknown |
30 | Docker Super Cluster V20 | Docker Super Cluster V20 | unknown |
31 | Value-based Allocation of Docker Containers | “Value-based Docker container Allocation” | Department of Computer Science, University of York |
32 | PERFORMANCE OF ENTERPRISE WEB APPLICATIONS IN DOCKER CONTAINERS ON VMWARE VSPHERE 6.5 | Enterprise Web Application Performance in Docker Container on vmware vsphere 6.5 | VMWare |
33 | Enabling Serverless Deployment of Large-scale AI Workloads | “Serverless Deployment for Large-scale AI workloads” | Department of Computer Science, University of Surrey, UK |
34 | Slacker Fast Distribution with Lazy Docker Containers | Slacker Quick Distribution using Lazy Docker Containers | University of Wisconsin |
35 | VNFS Maximizing NFS Performance with Compounds and Vectorized IO | VNFS Maximizes NFS Performance through Composite and Vectorization IO | IBM |
36 | Improving Docker Registry Design Based on Production Workload Analysis | Improving Docker registry Design based on Production Workload Analysis | IBM |
37 | Research on Interprocess Communication in Microservices Architecture | Research on Interprocess Communication in Microservice Architecture | IBM |
38 | In Reference to RPC: It’s Time to Add Distributed Memory | Reference RPC: Time to Add Distributed Memory | University of California, Berkeley |
39 | Interactive RPC Binding Model | Interactive RPC Binding Model | University of Jordan |
40 | Interchangeable Scheduling Policies in Real-time Middleware for Distribution | Interchangeable Scheduling Strategies in Distributed Real-time Middleware | University of Cantabria |
41 | A Survey on Docker Container and Its Use Cases | Overview of Docker Containers and their Use Cases | unknown |
42 | Kubernetes: Towards Deployment of Distributed IoT Applications in Fog Computing | Kubernetes: Deployment of Distributed Iot Applications in Fog Computing | University of Toronto |
43 | A Distributed Systems Platform for Mobile Computing | A Distributed System Platform for Mobile Computing | Lancaster University |
44 | Creating A Distributed Round Robin Scheduler with Etcd | “Creating a Distributed Polling scheduler with Etcd” | unknown |
45 | Challenges in Storing Docker Images | “The Challenge of Storing Docker images” | IBM |
46 | Modern System Administration with Go and Remote Procedure Calls (RPC) | “Modern Systems Administration with Go and Remote Procedure Calls (RPC)” | unknown |
47 | Using gRPC with Go | Using gRPC and Go | unknown |
48 | Datacenter RPCs Can Be General and Fast | “Data Center RPC can be generic and Fast” | Carnegie Mellon University |
49 | SkyhookDM: Data Processing in Ceph with Programmable Storage | Ceph SkyhookDM Data Processing Based on Programmable Storage | The university of California, |
50 | “Understanding Docker” | Understanding Containerization | Oracle |
51 | Docker Ecosystem — Vulnerability Analysis | Docker Ecosystem – Vulnerability Analysis | Nokia Bell LABS |
52 | Microservices Architecture for Modern Digital Platforms | Microservices Architecture for Modern Digital Platforms | Mindtree Ltd |
54 | Microservices in Practice A Survey Study | “Microservices in Practice — Investigation and Research” | Federal University of Minas Gerais |
55 | Dynamic Load Balancing in Ceph | Dynamic load Balancing in Ceph | University of California |
56 | Docker and Kubernetes:Changing the OpenText Documentum Deployment Model | Docker and Kubernetes: Changing deployment Patterns for OpenText Documentum | OpenText |
57 | Assise Performance and Availability Via Client-local NVM in a Distributed File System | “Evaluating Performance and Availability with Client-side Native NVM in distributed File Systems” | University of Texas at Austin |
58 | Panduan Mudah OkD-OpenShift | Panduan Mudah OkD-OpenShift | unknown |
59 | Virtualization of Radio Access Network by Virtual Machine and Docker: Practice and Performance Analysis | Virtual Machine and Docker-based Wireless Access Network Virtualization: Practice and Performance Analysis | Nokia |
60 | Making Containers Lazy with Docker and cernVM-fs | “Implementing lazy Containers with Docker and CernVM-fs” | CERN |
61 | Challenges of Microservices Architecture: A Survey on the State of the Practice | Microservice Architecture Challenges: An Investigation of the State of Practice | unknown |
62 | Docker Container Based PaaS Cloud Computing Comprehensive Benchmarks using LAPACK | “PaaS Cloud Computing Comprehensive Benchmark using LAPACK based on Docker Container” | Odessa State Environmental University |
63 | A Systematic Literature Review on Microservices | Literature Review of Microservice System | Atim University |
64 | Confine: Automated System Call Policy Generation for Container Attack Surface Reduction | Automatic System Call Policy Generation to Reduce Container Attack Surface | Stony Brook University |
65 | Reducing the IoT security breach witha microservice architecture based on TLS and OAuth2 | “Reducing Internet of Things Security Vulnerabilities through TLS and OAuth2 Based Microservices Architecture” | unknown |
66 | Replicating Data Objects in Large Distributed Database Systems: An Axiomatic Game Diffusion MechanismDesign Approach | Copying Data Objects in Large Distributed Database Systems: an Axiomatic Game Mechanism Design Approach | unknown |
67 | Implementing Remote Procedure Calls | Implementing Remote Procedure Calls | All from the Palo Alto Research Center |
68 | Impact of ETCD Deployment on Kubernetes, Istio, and Application Performance | Impact of ETCD Deployment on Kubernetes, Istio, and Application Performance | Lund University, Sweden |
69 | File Systems Japanese as Distributed Storage Back Ends | File Systems are Not Suitable as Distributed Storage Backends | Carnegie Mellon University |
70 | Building Reliable Distributed Systems | Building Reliable Distributed Systems | unknown |
71 | Container-based Virtualisation and Threats in Fog Computing | Container-based Virtualization and Threat Research in Fog Computing | Subang Jaya Taylor University, Malaysia |
72 | Test Automation in MicroService Architecture | Test Automation in Microservices Architecture | Varna University of Management |
73 | Overview Using Docker Containers: For Reproducible Environments and Containerized Applications | Virtualization with Docker Containers: For repeatable Environments and containerized Applications | St. Cloud State University |
74 | Oracle WebLogic Server on Docker Containers | Oracle WebLogic Server on Docker Container | Oracle |
75 | Ceph: A Scalable, High-performance Distributed File System | “An Extensible, High-performance Distributed File System” | University of California, Santa Cruz |
76 | Managing Applications in Docker Containers | Managing Applications in Docker Containers | unknown |
77 | RATATOSKR: Wide-Area ACTUATOR RPC OVER GRIDSTAT WITH TIMELINESS,REDUNDANCY, AND SAFETY | Ratatoskr: Wide Area Executor RPC over Gridstat with timeliness, Redundancy, and Security | Washington State University |
78 | To be continued… |