Complex and ordered data structures Network programming stuff The basic components of bovine B Middleware is important Highly distributed Close to the original LinuxOS Read the tool
🔨 🌐 🐮 🖧 🖥 🧰

🔥The original link


🔨 Complex and ordered data structures

No. Title Translation (reference) Company
1 A Declarative Query Language for Data Provenance Declarative Query Language for Data Sources Foss – Computer Science Institute
2 A Hierarchical Bloom Filter Index with Applications to Distributed Data Provenance Index of Layered Bloom Filters for Distributed Data Sources United States Naval Academy
3 A Model for Learned Bloom Filters,and Optimizing by Sandwiching Learning bloem’s filter model and Optimizing through Sandwiches Harvard University,
4 A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services “A Multi-attribute Data Structure with Parallel Bloom Filters for Web Services” Huazhong University of Science and Technology
5 Accelerating Braided B+ Tree Searches on a GPU with CUDA Accelerating Braided B+ Tree Search on gpus with CUDA University of Virginia, Department of Computer Science
6 Acoustics to the Rescue Physical Key Inference Attack Revisited Rediscussion of Acoustic Reasoning Attack on Rescue Physical Key National University of Singapore
7 Adaptive Learned Bloom Filter (ADA-BF) Efficient Utilization of the Classifier with Application to real-time Information Filtering on the Web “Efficient Use of Adaptive Learning Bloom Filter (ADA-BF) Classifier and Its Application in Web Real-time Information Filtering” Rice university
8 An Improved Construction for Counting Bloom Filters “An improved structure for computing Bloom filters” Harvard University,
9 An Introduction to Bε-trees and Write-Optimization Introduction to B + Trees and Writing Optimization google
10 Analysis of Encryption Algorithms to Basic Operations on Outsourced B+ Data Privacy Analysis of Encryption Algorithms for Outsourcing B+ Basic Data Privacy Operations google
11 Analysis of B tree Data Structure and Its Usage in Computer Forensics B-tree Data Structure Analysis and Its Application in Computer Forensics University of Zagreb
11 “B + TREES” The B + tree Microsoft
12 Benchmarking a B-tree Compression Method “Benchmarking b-tree Compression Methods” Technical University of Ostrava
13 Blitz Secure Multi-Hop Payments Without Two-Phase Commits Blitzkrieg secure Multi-hop payout without two-stage commit twitter
14 Bloom Filters — Short Tutorial Bloem Filters – A Short Tutorial google
15 Bloom Filters Design Innovations and Novel Applications Design Innovation and Novel Application of Bloom Filter Stanford University
16 Bloom Filters in Adversarial Environments Bloom filters in hostile Environments google
17 The Bloom Filters” Bloom’s Filter google
18 B+ Tree A Predictive B+-Tree for Reducing Writes on Phase Change Memory “Predictive B+ trees for reducing write operations on phase-change Memory” Alibaba
19 Cache Efficient Bloom Filters for Shared Memory Machines Caching efficient Bloom Filters for Shared Memory Machines Massachusetts Institute of Technology
20 Cache-, Hash- and Space-efficient Bloom Filters Caching, Hashing, and Spatial Efficiency Bloom Filters Amazon
21 Caches and Hash Trees for Efficient Memory Integrity Verification Efficient Memory Integrity Verification for Caches and Hash trees Massachusetts Institute of Technology
21 Compressed Bloom Filters Compressed Bloom Filter Harvard University,
23 Constructing Red-Black Trees Building a Red-Black Tree Amazon
24 “Cuckoo Filter Practically Better Than Bloom” Cuckoo Filters Are Actually Better than Bloom Harvard University,
25 Data Step Hash Objects as Programming Tools Data Step Hash Object as a Programming tool google
26 Deletion The Curse of The Red-black Tree Deleting the Curse of the Red-black Tree The university of Utah
27 Detailed Provenance Metadata from Statistical Analysis Software Detailed Source metadata from Statistical Analysis Software University of Michigan
28 Efficient Sparse Merkle Tree Caching Strategies and Secure (non-) Membership Proofs Efficient Sparse Merkle Tree Caching Strategy and Secure (Non-) Membership Proof Organic Electronics Research Center, Yamagata University
29 Efficient Update Control of Bloom Filter Replicas in Distributed Systems Effective Update Control of Bloom Filter Replicas in Distributed Systems At the university of Maine
30 Enhancing the B Tree by Dynamic Node Popularity Caching “Enhancing B-trees through Dynamic Node Popularity Caching” University of Melbourne
31 Experimental B+-tree for GPU Experimental B+ trees for Gpus Warsaw University of Technology
32 Feature Hashing for Large Scale Multitask Learning “Feature Hashing for Large-scale multitasking learning” Yahoo
33 Hash, Displace, and Compress Hashing, Permutation, and Compression Technical University of Ilmenau
34 Hash routing Schemes for Information Centric Networking Hash Join Algorithms for Multi-Core CPUs Hashing Algorithms for Multi-core cpus University of Wisconsin-Madison
35 Hashing Routing Schemes for Information Centric Networking Hashing Routing Schemes for Information Center Networks University of London
36 How to Break MD5 and Other Hash Functions How to Break MD5 and Other Hash Functions Shandong university,
37 171 HyperChromatic trees A Fine-Grained Approach to Distributed algorithms on RedBlack Trees “Hypercoloring tree is a Fine-grained approach to distributed algorithms on red-black trees” Polytechnic University of Catalonia
38 Ideal Hash Trees The Ideal Hash Tree facebook
39 Implementing Deletion in B+ -trees “Implementing deletion in B+- trees” Stanford University
40 Incrementally Distributed B+ Challenges B+ Challenges for Incremental Distributions University of Mississippi
41 Hostels Brainwave Authentication New Techniques and Insights on User Acceptance Cheap Brainwave Authentication New Technology and User Acceptance insights University of Mannheim
42 Introduction to Red Black Trees Introduction to red Black Trees unknown
43 Jungle Towards Creating Key-Value Store by Combining Lsm-tree and Copy-On-Write B+ -tree Dynamic Key-value Storage by combining LSM-tree and copy-on-write B+ -tree google
44 Learned Hashing -Index A Collision Competition “Learning hash Index A Collision Contest” baidu
45 Left-leaning Red-Black Trees The Left-leaning Red Black Tree Princeton University
46 Lock-free Red-black Trees Using CAS Lockless red-black trees with CAS Natural Sciences and Engineering Research Council of Canada
47 Making B+-Trees Cache Conscious in Main Memory “Making B+ -trees cache conscious in main memory” Columbia University
48 MilliSort and MilliQuery large-scale Data-intensive Computing in Milliseconds “Large-scale Data-intensive computing in milliseconds” Stanford University
49 Modern B-Tree Techniques Modern B-tree Technology Dolby LABS
50 Network Applications of Bloom Filters A Survey Overview of Network Applications of Bloom Filters google
51 Obfuscation-Resilient Executable Payload Extraction From Packed Malware “Extracting Fuzzy Elastic Executable Payloads from Packaged Malware” University of Texas
52 Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees “Optimal Parameter Selection for Efficient Memory Integrity Verification Based on Merkle Hash Trees” Cornell University
53 Persistent B+ -trees in Non-volatile Main Memory Persistent B+ trees in nonvolatile main memory Renmin University of China
54 Persistent Bloom Filter Membership Testing for the Entire History Persistent Blossom Filter Membership Test for entire history University of Utah, East China Normal University
55 Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables Refix Hash Tree is an index data structure on a distributed Hash table University of California
56 Provenance Expresmarking on Non-Deterministic Executions Source Expressiveness Benchmarks for Nondeterministic Execution Heriot-watt University
57 Red Black Tree Red Black Tree google
58 Red Black Tree Final Red Black Tree Final facebook
59 Red-black and AA Trees Red and Black and the AA Tree facebook
60 Red-black Trees CSS230 “Red-black” Tree CSS230 facebook
61 Red-black Trees with Relative Node Keys “Red-black trees with Relative Nodal Keys” Eindhoven University of Technology
62 Red-black Trees with Types Red Black Trees with Types University of Kent, Canterbury
63 The Red – Black trees” Red Black Tree unknown
64 Relaxed Red-black Trees with Group Updates Relaxed Red Black Tree and Group Update Department of Mathematics and Computer Science, University of Southern Denmark
65 Role of Bloom Filter in Big Data Research A Survey Review of Bloom Filter’s Role in Big Data Research Silchal National Institute of Technology
66 Scalable Bloom Filters Retractable Bloom filter University of Minho
67 Selecting a Hashing Algorithm Selection hashing Algorithm Department of Computer Science, University of Canterbury
68 Social Hash Partitioner A Scalable Distributed Hypergraph Partitioner “Social Hash partitioner: a scalable distributed hypergraph partitioner” facebook
69 Specification of Red-Black Trees Red-black Tree Specification Laboratory Symposium, Edinburgh
70 Swiped Analyzing Ground-Truth Data of a Marketplace for Stolen Debit and Credit Cards Swiped Analyzes stolen Debit and Credit Card Market Truth Data New York university,
71 The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases Adaptive Cardinality Trees: Art Indexing of Main Memory Databases Singapore Polytechnic University
72 The BW-tree A B-tree for New Hardware Platforms B-trees for New Hardware Platforms Microsoft
73 The Ubiquitous B-Tree The Ubiquitous B-Tree Department of Computer Science, Purdue University
74 The Red – Black Trees” Red Black Tree unknown
75 Trie An Alternative Data Structure for Data Mining Algorithms “Trying another Data Structure for Data Mining Algorithms” Institute of Computer and Automation, Hungarian Academy of Sciences
76 Type-safe Modular Hash-Consing “Type-safe Modular Hash-consing” University of Paris
77 Understanding Bloom Filter Intersection Caching Strategies and Secure (non-) Membership Proofs Understanding Bloom Filter Intersection Caching Policies and Secure (Non-) Membership Proofs University of Toronto
78 Verification of B+ Trees An Experiment Combining Shape Analysis and Interactive SPECIAL Proving Verification of B+ trees — Experiments combining Shape Analysis and Interaction Theorem Proving Augsburg University, Germany
79 The Verkle Trees” The tree of Verkle unknown
80 Weaponizing Middleboxes for TCP Reflected Amplification “TCP Reflection amplification weaponized Middleware” University of Maryland
81 Weighted Bloom Filter Weighted Bloom filter Department of Electrical Engineering, Caltech
82 Workload Aware B+ Trees Workload Awareness B+ Tree unknown
83 YARIX Scalable Yara-based Malware Intelligence Scalable Malware Intelligence based on YARIX Helmholtz Information Security Center

🌐 web programming stuff

No. Title Translation (reference) Company
1 A Component-based Approach to the Design of Networked Control Systems “A Component-based Networked Control System Design Method” unknown
2 A decision-analytic Approach for P2P Cooperation Policy Setting A Decision-making Analysis Method for P2P Cooperation Strategy Setting Amil Kabir University of Technology
3 A Design and Implementation of Active Network Socket Programming Design and Implementation of an Active Network Socket Programming University of Toronto
4 A Look Back at “Security Problems in the TCPIP Protocol Suite” Review “Security Issues in TCPIP Protocol Suite” AT&T LABS Research
5 A P2P VIDEO DELIVERY NETWORK (P2P-VDN) P2p Video Distribution Network (P2P-VDN) Oregon State University
6 “A proposal to add coroutines to the C++ standard library (Revision 1)” Recommendations for adding coroutines to the c++ standard library (revision 1) unknown
7 A Simple Model for Analyzing P2P Streaming Protocols “A Simple Model for Analyzing P2P Streaming protocols” The Chinese University of Hong Kong
8 A Survey of Asynchronous Programming Using Coroutines in the Internet of Things and Embedded Systems Overview of Coroutine Asynchronous Programming in The Internet of Things and Embedded Systems James Cook University
9 “A Verified Abstract Machine for Functional Coroutines” Validation abstract Machines for functional Coroutines unknown
10 Adding Async RAII Support to Coroutines “Adding asynchronous RAII Support to coroutines” unknown
11 Attaining the Promise and Avoiding the Take-aways of TCP in the Datacenter “Delivering on the Promise of TCP and Avoiding TCP’s Pitfalls in the Data Center” unknown
12 Base of the Networking Protocol — TCPIP Its Design and Security Aspects Network Protocol-based – Design and Security Aspects of TCPIP Engineering, Rissoni School of Engineering
13 Beej’s Guide to Network Programming Beej’s Guide to Web Programming “Beej Jorgensen” Hall
14 Bitcoin A Peer-to-peer Electronic Cash System Bitcoin: A Peer-to-peer Electronic Cash System unknown
15 Combining TCP and UDP for Secure Data Transfer Secure Data Transmission combining TCP and UDP School of Computing, University of Sastra
16 Comparative Evaluation of Kernel Bypass Mechanisms for High-performance Inter-Container Communications Comparative Evaluation of kernel bypass mechanisms for High-performance Inter-container Communication Ericsson
17 Configtron dzj00 Network diversity with Heterogeneous Configurations Configtron Solves network Diversity through Heterogeneous Configuration Duke University
18 Coroutines TS for C++20 Coroutines TS for C++20 Charlie Kolb
19 Designs and Evaluation of a Tracker in P2P Networks “Design and Evaluation of Trackers in P2P Networks” The Chinese University of Hong Kong
20 Dissecting Performance of Production QUIC Analysis of Production QUIC Performance Brown university,
21 Embedding Covert Channels into TCP/IP Embedding covert Channels into TCP/IP The university of Cambridge
22 Evaluating Predictors of Congestion Collapse in Communication Networks Evaluation of congestion Crash Predictors for Communication networks National Institute of Standards and Technology
23 Full TCP/IP for 8-bit Architectures “Full TCP/IP in 8-bit architecture” Swedish Academy of Computer Science
24 High-speed Software Data Plane via Vectorized Packet Processing High speed Software Data Plane Based on Vector Packet Processing Cisco
25 Incremental Approach Coroutine TS + Core Coroutines Incremental Method Coroutines TS + Core Coroutines microsoft
26 Innovating Transport with QUIC Design Approaches and Research Challenges Challenging Innovative Transportation with QUIC Design Methods and Research Tsinghua university,
27 Interaction Between TCP and UDP Flows in Wireless Multi-Hop Ad Hoc Networks “TCP and UDP Traffic Interaction in Wireless Multi-hop Ad Hoc Networks” Uppsala University
28 Introduction to TCP/IP Network Attacks Introduction to TCP/IP Network Attacks Iowa State University
29 JAVA NETWORK PROGRAMMING USING Sockets “Java Network Programming with Sockets” unknown
30 Kademlia A Peer-to-peer Information System Based on the XOR Metric Point-to-point Information Systems Based on XOR Metrics New York university,
31 Masking IPs with Migration in QUIC MIMIQ uses migration masking IP in QUIC Princeton University
32 MTCP A Highly Scalable User-level TCP Stack for Multicore Systems “A highly scalable user-level TCP Stack for multi-core systems” Princeton University
33 NetKAT Semantic Foundations for Networks Fundamentals of Web Semantics Carnegie Mellon University
34 Netmap A Novel Framework for Fast Packet IO Netmap is a New framework for Fast Packet IO At the university of Pisa
35 Netmap Memory Mapped Access To Network Devices Netmap Memory Mapping Accessing Network Devices At the university of Pisa
36 Network Application Frameworks Web Application Framework Seine dynamics
37 Network Programming in Age of Empires and Beyond Network Programming in Age of Empires microsoft
38 The Network Programming” Network Programming unknown
39 Observations of UDP to TCP Ratio and Port Numbers UDP to TCP Ratio and Port Number Observation University of Auckland
40 Operational Semantics for Declarative Networking “Operational Semantics for declarative Networks” Max Planck Institute for Software Systems
41 OReilly – Java Network Programming 2ED Orilly – Java Network Programming 2ED book
42 P2P File-Sharing in Hell Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks P2P File Sharing in Hell Launches A Distributed Reflex DoS Attack using BitTorrent Vulnerability City University London
43 Packetdrill Scriptable Network Stack Testing, From Sockets to Packets Scripted Network Stack testing, socket to packet google
44 The Major categories of Payload Caching High-speed Data Forwarding for Network Are wholesalers and retailers. “Payload Caching for High-speed Data Forwarding in Network Mediation” Duke university
45 Peer-to-peer (P2P) File Sharing Applications and Their Threat to the Corporate Environment Peer-to-peer (P2P) File Sharing Applications and their Threat to the Enterprise Environment GIAC utility library
46 Peer-to-peer Architecture Case Study of Gnutella Network Peer-to-peer Architecture Case Study Gnutella Networks University of Chicago
47 Performance of TCP/IP Over Next Generation Broadband Wireless Access Networks TCP/IP Performance in Next Generation Broadband Wireless Access Networks Iospan Wireless
48 Performance of UDP and TCP Communication on Personal Computers “UDP and TCP Communication Performance on personal Computers” University of Zagreb
49 Performant TCP for Low-Power Wireless Networks High Performance TCP for Low Power Wireless Networks University of California
50 Portable Desktop Applications Based on P2P Transportation and Virtualization Portable Desktop Applications based on P2P Transport and Virtualization Tsinghua university,
51 Proceedings of the First Symposium onNetworked Systems Design and Implementation Proceedings of the 1st Symposium on Network System Design and Implementation Stanford University
52 Protocol Independence Using the Sockets API Protocol Independence using socket apis University of Virginia
53 Reflections on Active Networking Thoughts on Active Networks University of Pennsylvania
54 Reliable Blast UDP Predictable High Performance Bulk Data Transfer Reliable Exploding UDP for Predicting High Performance and Large Capacity Data Transmission University of Illinois at Chicago
55 Research on Computer Programming Optimization System Based on Big Data Technology Research on Computer Programming Optimization System Based on Big Data Technology Wuhan University of Technology
56 The Revisiting Coroutines” Review of coroutines University of Rio de Janeiro
57 Scalable Network IO in Linux Extensible Networking IO in Linux University of Michigan
58 Secure WWW Transactions Using Standard HTTP and Java Applets Secure WWW Transactions using Standard HTTP and Java Applets The university of Turin
59 Self-stabilizing Structured Ring Topology P2P Systems Self-stabilized Structured Ring Topology P2P System North Carolina State University
60 Slipstream Automatic Interprocess Communication Optimization Optimization of Slipstream Automatic Interprocess Communication University of Illinois at Urbana-Champaign
61 SNP An Interface for Secure Network Programming SNP Secure Network Programming Interface University of Texas
62 The Socket Programming” Socket Programming Assam City University
63 “StackMap Low-Latency Networking with the OS Stack and Dedicated NICs” StackMap Low-latency networking, supporting OS stacks and Dedicated nics Keio University
64 Taking a Long Look at QUIC The Long Look at QUIC Northeastern University
65 The TCP/IP the Overview Overview of TCP/IP Cisco
66 The Benefits and Costs of Writing a POSIX Kernel in a High-level Language “The Benefits and Costs of Writing POSIX kernels in high-level Languages” Massachusetts Institute of Technology
67 The Networks of Reinvention The Reinventing Network unknown
68 The QUIC Transport Protocol: Design and Internet-Scale Deployment QUIC Transport Protocol: Design and Internet-scale Deployment Google
69 The Secure Socket API TLS as an Operating System Service (USENIX) Secure Socket API TLS as An Operating System Service (USENIX) Brigham Young University
70 The Secure Socket API TLS as an Operating System Service Secure Socket API TLS as An Operating System Service Harvard University,
71 “Toward Efficient Querying of Compressed Network Payloads” Efficient Query compressed Network Load University of North Carolina
72 Towards Securing the Internet of Things with QUIC Securing the Internet of Things through QUIC Network Equipment Company
73 TRANSMISSION CONTROL PROTOCOL Transmission Control Protocol unknown
74 TrapezeIP TCP/IP at near-gigabit Speeds Trapzeip TCP/IP at nearly A Gigabit speed Duke university
75 User Space Network Drivers User Space Network Driver Technical University of Munich
76 Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability Predictive iSCSI Services using TCP/IP Traffic Shaping University of Oslo
77 To be continued…

🐮 Basic components of bovine B

No. Title Translation (reference) Company
1 A Comparative Study of Database Connection Pooling Strategy A Comparative Study of Database Connection Pool Strategies Engineering College, Pune, Maharashtra
2 A Design Framework for Highly Concurrent Systems Design Framework for High Concurrency Systems University of California, Berkeley
3 A Lock-free, Cache-efficient Multi-Core Synchronization Mechanism for Line-rate Network Traffic Monitoring “A Lock-free, Cache Efficient Multi-core Synchronization Mechanism for Line Rate Network Traffic Monitoring” Bell LABS
4 A Lock-free, Cache-efficient Shared Ring Buffer for Multi-Core Architectures “Lock-free, High-Caching Shared Ring Buffers for Multi-Core Architectures” Bell LABS alcatel-Lucent
5 A New Method in Improving Database Connection Pool Model A New Method to Improve the Database Connection Pool Model World Association for Science, Engineering and Technology
6 A Programming Interface for Scalable Network Socket IO Programming Interface for Extensible Network Socket IO unknown
7 Analyzing Parallel Real-time Tasks Implemented with Thread Pools Analyzing Parallel Real-time Tasks with Thread Pools Santa Ana High School
8 Auto-tuned Threading for OLDI Microservices Automatic Tuning Threads for OLDI Microservices University of Michigan
9 Datacenter Tax Cuts Improving WSC Efficiency Data Center Tax Cuts Improve WSC Efficiency University of California, Berkeley
10 ECS with NGINX (OpenResty) ECS and NGINX (OpenResty) dell
11 Evaluating and Optimizing Thread Pool Strategies for Real-Time CORBA Evaluating and Optimizing thread Pool Strategies for Real-time CORBA University of Washington
12 Evaluation of the Impact of Cache Coherence Protocol and Data Locality on the Efficiency of Atomic Operations on Multicore Processors.” Evaluation of the Impact of Cache Consistency Protocols and Data Locality on atomic Operation Efficiency on Multi-core Processors St. Petersburg University of Electrical Technology
13 HBase Connection Dynamic Keeping Method Based on Reactor Pattern HBase Connection Dynamic Retention Method based on Reactor Mode IEEE/ACM Journal of Networking
14 Hybrid Synchronization Based Distributed Thread Pool Distributed Thread Pooling based on Hybrid Synchronization Hazara University, Department of Information Technology
15 Implementation of Multiple Thread Pools Based on Distribution of Service Times by Riaz Shah Riaz Shah implements Multiple Thread Pools based on Service Time Distribution HAL
16 Improving WSC Efficiency Through Protocol Buffer “Improving WSC Efficiency through Protocol Buffers” University of California, Berkeley
17 Modeling and Analysis of Threadpools Modeling and Analysis of Thread Pools Kiel University, Germany
18 Prediction and Frequency Based Dynamic Thread Pool System A Hybrid Model Dynamic Thread Pool Systems based on Prediction and Frequency — a Hybrid Model Hazara University
19 Programming with Threads Multithreaded Programming Digital Equipment Corporation Systems Research Center
20 ProIO An Event-based IO Stream Format for Protobuf Messages ProIO an event-based IO stream format for Protobuf messages Argonne National Laboratory
21 The Java.util.Concurrent Synchronizer Framework Concurrent Synchronizer Framework Virginia State University
22 Multicore Locks: The Case Is Not Closed Yet Multicore Locks: The Situation is Not Over University of Grenoble
23 The Mutual Exclusion Problem Part II Statement and Solutions Mutual Exclusion Problem, Part II: Statements and Solutions Digital Equipment Company
24 Performance Comparison of Messaging Protocols and Serialization Formats for Digital Twins in IoV “Performance Comparison of messaging Protocols and Serialization Formats for digital twins in IoV” Linkoping University
25 Software Debugging Techniques Software Debugging Technology At the university of London
26 “Performance Evaluation of Using Protocol Buffers in the Internet of Things Communication” “Performance Evaluation of Protocol Buffers used in Internet of Things Communications” University of Novi Sad
27 A Verified Protocol Buffer Compiler A Proven protocol buffering compiler Purdue university,
28 Scalable Queue-based Spin Locks with Timeout Extensible Queue-based Timeout Spinlocks University of Rochester
29 The Problem of Mutual Exclusion A New Distributed Solution A New Distributed Solution to The Mutual Exclusion Problem Virginia Commonwealth University
30 Hashed and Hierarchical Timing Wheels: Efficient Data Structures for Implementing a Timer Facility Hashing and hierarchical timing wheels: Efficient Data structures for Implementing timer facilities unknown
31 “Using Protocol Buffers for Resource-constrained Distributed Embedded Systems” Using Protocol Buffers in Resource-constrained Distributed Embedded Systems Technical University of Munich, Germany
32 To be continued…

✈ Middleware is important

No. Title Translation (reference) Company
1 Practical Perl Tools Redis Meet Perl Redis meets Perl School of Computer and Information, Northeastern University
2 MySQL Based Selection of Appropriate Indexing Technique in Hospital System using Multiclass SVM Selection of Appropriate Indexing Techniques in Hospital System based on mysql-based Multi-class Support Vector Machines Department of Electrical Engineering, IIT
3 Doing Database Design with MySQL Database Design with MySQL Western New England University
4 Hyperbolic Caching: Flexible Caching for Web Applications Hyperbolic Caching: Flexible Caching for Web Applications Microsoft Research
5 Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface Rebuilding software I/O paths using failed atom Memory Mapping interfaces Korea Advanced Institute of Science and Technology
6 Making Network Stack Part of the Virtualized Infrastructure “Making the Network Stack Part of the Virtualization Infrastructure”
7 Making Volatile Index Structures Persistent with Dram-NVmm Tiering “Persistence of Volatile Index Structures using RAM-NVMM Grading”
8 Logical Distributed Counting for Scalable File Access Logical Distributed Counting for Extensible File Access
9 Towards Scalable and Reliable In-Memory Storage Systems: A Case Study with Redis Toward Scalable and Reliable Memory Storage Systems: A Case Study based on Redis
10 The Contrail Architecture” Track Cloud Architecture
11 Database Caching Strategies Using Redis AWS Whitepaper “Database Caching Strategies using Redis AWS Whitepapers”
12 Database Technology for the 2020s Database Technology for the 2020s
13 The Evolution of an Extension Language A History of Lua The Evolution of an Extended Language: A History of Lua
14 MONGODB VS MYSQL A Comparative Study of: MONGODB and MYSQL Based on Their Performance “A Comparative study of MONGODB and MYSQL: Based on Their Performance”
15 Enlightening the IO Path: Enlightening the IO Path Inspiring IO Path
16 Enhancing M-Learning Using GridFS for storing and Streaming Digital Content Enhancing Mobile Learning with GridFS to Store and stream digital Content
17 The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis Dynamic Balancing Protocols: Avoiding Transaction coordination through Program Analysis
18 Revisiting Concurrency in High-performance NoSQL Databases “Reaccessing Concurrency in a High-performance NoSQL Database”
19 A Distributed Redis Framework for Use in the UCWW Distributed Redis Framework for UCWW
20 NVMOVE Helping Programmers Move to byte-based Persistence NVMOVE helps Programmers move to Bytes-based Persistence
21 Selection and Use of MySQL in a Database Management Course Selection and Use of MySQL in Database Management Course
22 Uild-a Multi-Region, Highly Available MySQL Architecture Deploying a Multi-zone, highly available MySQL Architecture
23 MongoDB Database Administration MongoDB Database Management
24 MySQL Cluster Internal Architecture MySQL Cluster Internal Architecture
25 MySQL V5 — Ready for Prime Time Business Intelligence MySQL V5 – Business Intelligence Ready for Prime Time
26 Oracle MySQL Database Service with HeatWave Query Accelerator Oracle MySQL Database Service and Heat Wave Query Accelerator
27 Scaling Memcache at Facebook Extending Memcache on Facebook
28 “Unifying Timestamp with Transaction Ordering for MVCC with Decentralized Scalar Timestamp” “Unified Timestamp and Transaction Ordering for MVCC with Decentralized Scalar Timestamps”
29 MegaPipe A New Programming Interface for Scalable Network IO MegaPipe: A New Extensible Network IO Programming Interface
30 Write Dependency Disentanglement with Horae Writing Dependency Untangling with Horae
31 Testing Database Engines via Pivoted Query Synthesis “Compose test Database Engine by Pivot Query”
32 Recovery Principles of MySQL Cluster 5.1 MySQL Cluster Recovery Principles
33 Persisting Objects in Redis key-value Database “Persisting objects in Redis Key database”
34 Identifying Unexpected Internet Services “Identifying Unexpected Internet Services”
35 Using Internal MySQLInnoDB B-tree Index Navigation for Data Hiding Purposes “Using internal MySQLInnoDB b-tree index to navigate data hiding purposes”
36 The SQL the Transactions SQL Transactions
37 InnoDB to MyRocks Migration in main MySQL Database at Facebook InnoDB to MyRocks to Facebook’s main MySQL database
38 Autopsy of a MySQL Automation Disaster Anatomy of a MySQL Automation Disaster
39 Zero-downtime and Data Migration of a Mature Multi-Shard Platform Zero-downtime Rebalancing and Data Migration for Mature Multi-sharding Platforms
40 Study and Optimization Based on MySQL Storage Engine Research and Optimization of storage Engine Based on MySQL
41 To be continued…

🖧 grandly distributed

No. Title Translation (reference) Company
1 A Lightweight and High Performance Remote Procedure Call Framework for Cross Platform Communication “Lightweight High-performance Remote Procedure Call Framework for Cross-platform Communication” The first International Conference on Software Engineering and Applications
2 Large-scale Cloud Service Using Ceph Large-scale Cloud Services using Ceph Giannakos
3 An Introduction to Docker for Reproducible Research, with Examples from the R Environment Introduction to Reproducible studies of Docker, with R environment as an example Inventory Evaluation Research Center
4 Architectural Patterns for Microservices: A Systematic Mapping Study Architecture Patterns for Microservices: A System Mapping Study Tampere University of Technology
5 Accelerating TensorFlow with Adaptive RDMA-based gRPC GRPC Accelerated TensorFlow based on Adaptive RDMA Ohio State University
6 An Introduction to Docker and Analysis of Its Performance Introduction and Performance Analysis of Docker Asia-pacific University of Science and Technology Innovation
7 “A Comparative Study of MicroServices-based IoT Platforms” Comparative Study on Internet of Things Platform Based on Microservices Hassan II University
8 An Architect s Guide to APIs SOAP REST GraphQL and gRPC Enable Architect API SOAP REST GraphQL and gRPC Enable Architect Architect Guide unknown
9 AN APPROACH OF EXPLOITING DOCKER AN APPROACH OF EXPLOITING DOCKER A Docker Development Method A Docker development Method JSS University of Technology
10 An Introduction to Docker and Analysis of Its Performance Introduction and Performance Analysis of Docker
11 Experience with Rules-based Programming for Distributed, Concurrent, Fault-Tolerant Code Rule-based Programming experience with Distributed, Concurrent, fault-tolerant Code University of Utah, Stanford university
12 Modular Composition of Coordination Services Composition of Coordination Services Module google
13 DupHunter Flexible High-performance Deduplication for Docker Registries Flexible High Performance Deduplication with DupHunter for the Docker registry IBM
14 Availability and Scalability Optimized Microservice Discovery from Enterprise Systems Availability and Scalability of Microservice Discovery optimized from Enterprise Systems University of Queensland
15 Load Balancing Using Docker and Kubernetes A Comparative Study A Comparative Study of Docker and Kubernetes Load Balancing unknown
16 Beats per-minute (BPM) A MicroService-based Platform for the Monitoring of Health Related Data via Activity Trackers “BPM (BPM): A Microservices-based platform for monitoring health-related Data through Activity trackers” Dell
17 Business Object Centric Microservices Patterns “Business Object Centric Microservices Model” University of Queensland
18 Using Docker Containers to Improve Reproducibility in Software and Web Engineering Research Improving Reproducibility in Software and Web Engineering Research using Docker Containers University of Zurich
19 Continuous Software Engineering — A Microservices Architecture Perspective “Continuous Software Engineering: A Microservices Architecture Perspective” Dublin City University
20 Taking the Cloud-Native Approach with Microservices “Micro Services adopt native Cloud Approach” google
21 Containerized Microservices Architecture Containerized Microservices Architecture Patkal Institute of Science
22 An Updated Performance Comparison of Virtual Machines and Linux Containers Performance Comparison between Virtual Machines and Linux Containers IBM
23 Supporting Docker in Emulab-based Network Testbeds Support Docker in simulation-based Network Test Platform The university of Utah
24 Development of Deployment Management System to solve the complexity and runtime of Microservices deployment Challenges.” Developing a Deployment management System to address the challenges of Microservice deployment complexity and runtime Scalability Master of Science program in Computer Science
25 Devops and Microservices Based Internet of Things Meta-Model An Internet of Things meta-model based on Devops and Microservices Hasan University Information Technology and Modeling Laboratory
26 Distributed Network Computing over Local ATM Networks Distributed Network Computing over Local ATM Networks University of Minnesota
27 Distributed Systems Support for Adaptive Mobile Applications Distributed Systems support Adaptive Mobile Applications Lancaster University
28 Understanding the Security Risks of Docker Hub Understanding the Security Risks of Docker Hub Zhejiang University, IBM, etc
29 The Docker Container” Containerization unknown
30 Docker Super Cluster V20 Docker Super Cluster V20 unknown
31 Value-based Allocation of Docker Containers “Value-based Docker container Allocation” Department of Computer Science, University of York
32 PERFORMANCE OF ENTERPRISE WEB APPLICATIONS IN DOCKER CONTAINERS ON VMWARE VSPHERE 6.5 Enterprise Web Application Performance in Docker Container on vmware vsphere 6.5 VMWare
33 Enabling Serverless Deployment of Large-scale AI Workloads “Serverless Deployment for Large-scale AI workloads” Department of Computer Science, University of Surrey, UK
34 Slacker Fast Distribution with Lazy Docker Containers Slacker Quick Distribution using Lazy Docker Containers University of Wisconsin
35 VNFS Maximizing NFS Performance with Compounds and Vectorized IO VNFS Maximizes NFS Performance through Composite and Vectorization IO IBM
36 Improving Docker Registry Design Based on Production Workload Analysis Improving Docker registry Design based on Production Workload Analysis IBM
37 Research on Interprocess Communication in Microservices Architecture Research on Interprocess Communication in Microservice Architecture IBM
38 In Reference to RPC: It’s Time to Add Distributed Memory Reference RPC: Time to Add Distributed Memory University of California, Berkeley
39 Interactive RPC Binding Model Interactive RPC Binding Model University of Jordan
40 Interchangeable Scheduling Policies in Real-time Middleware for Distribution Interchangeable Scheduling Strategies in Distributed Real-time Middleware University of Cantabria
41 A Survey on Docker Container and Its Use Cases Overview of Docker Containers and their Use Cases unknown
42 Kubernetes: Towards Deployment of Distributed IoT Applications in Fog Computing Kubernetes: Deployment of Distributed Iot Applications in Fog Computing University of Toronto
43 A Distributed Systems Platform for Mobile Computing A Distributed System Platform for Mobile Computing Lancaster University
44 Creating A Distributed Round Robin Scheduler with Etcd “Creating a Distributed Polling scheduler with Etcd” unknown
45 Challenges in Storing Docker Images “The Challenge of Storing Docker images” IBM
46 Modern System Administration with Go and Remote Procedure Calls (RPC) “Modern Systems Administration with Go and Remote Procedure Calls (RPC)” unknown
47 Using gRPC with Go Using gRPC and Go unknown
48 Datacenter RPCs Can Be General and Fast “Data Center RPC can be generic and Fast” Carnegie Mellon University
49 SkyhookDM: Data Processing in Ceph with Programmable Storage Ceph SkyhookDM Data Processing Based on Programmable Storage The university of California,
50 “Understanding Docker” Understanding Containerization Oracle
51 Docker Ecosystem — Vulnerability Analysis Docker Ecosystem – Vulnerability Analysis Nokia Bell LABS
52 Microservices Architecture for Modern Digital Platforms Microservices Architecture for Modern Digital Platforms Mindtree Ltd
54 Microservices in Practice A Survey Study “Microservices in Practice — Investigation and Research” Federal University of Minas Gerais
55 Dynamic Load Balancing in Ceph Dynamic load Balancing in Ceph University of California
56 Docker and Kubernetes:Changing the OpenText Documentum Deployment Model Docker and Kubernetes: Changing deployment Patterns for OpenText Documentum OpenText
57 Assise Performance and Availability Via Client-local NVM in a Distributed File System “Evaluating Performance and Availability with Client-side Native NVM in distributed File Systems” University of Texas at Austin
58 Panduan Mudah OkD-OpenShift Panduan Mudah OkD-OpenShift unknown
59 Virtualization of Radio Access Network by Virtual Machine and Docker: Practice and Performance Analysis Virtual Machine and Docker-based Wireless Access Network Virtualization: Practice and Performance Analysis Nokia
60 Making Containers Lazy with Docker and cernVM-fs “Implementing lazy Containers with Docker and CernVM-fs” CERN
61 Challenges of Microservices Architecture: A Survey on the State of the Practice Microservice Architecture Challenges: An Investigation of the State of Practice unknown
62 Docker Container Based PaaS Cloud Computing Comprehensive Benchmarks using LAPACK “PaaS Cloud Computing Comprehensive Benchmark using LAPACK based on Docker Container” Odessa State Environmental University
63 A Systematic Literature Review on Microservices Literature Review of Microservice System Atim University
64 Confine: Automated System Call Policy Generation for Container Attack Surface Reduction Automatic System Call Policy Generation to Reduce Container Attack Surface Stony Brook University
65 Reducing the IoT security breach witha microservice architecture based on TLS and OAuth2 “Reducing Internet of Things Security Vulnerabilities through TLS and OAuth2 Based Microservices Architecture” unknown
66 Replicating Data Objects in Large Distributed Database Systems: An Axiomatic Game Diffusion MechanismDesign Approach Copying Data Objects in Large Distributed Database Systems: an Axiomatic Game Mechanism Design Approach unknown
67 Implementing Remote Procedure Calls Implementing Remote Procedure Calls All from the Palo Alto Research Center
68 Impact of ETCD Deployment on Kubernetes, Istio, and Application Performance Impact of ETCD Deployment on Kubernetes, Istio, and Application Performance Lund University, Sweden
69 File Systems Japanese as Distributed Storage Back Ends File Systems are Not Suitable as Distributed Storage Backends Carnegie Mellon University
70 Building Reliable Distributed Systems Building Reliable Distributed Systems unknown
71 Container-based Virtualisation and Threats in Fog Computing Container-based Virtualization and Threat Research in Fog Computing Subang Jaya Taylor University, Malaysia
72 Test Automation in MicroService Architecture Test Automation in Microservices Architecture Varna University of Management
73 Overview Using Docker Containers: For Reproducible Environments and Containerized Applications Virtualization with Docker Containers: For repeatable Environments and containerized Applications St. Cloud State University
74 Oracle WebLogic Server on Docker Containers Oracle WebLogic Server on Docker Container Oracle
75 Ceph: A Scalable, High-performance Distributed File System “An Extensible, High-performance Distributed File System” University of California, Santa Cruz
76 Managing Applications in Docker Containers Managing Applications in Docker Containers unknown
77 RATATOSKR: Wide-Area ACTUATOR RPC OVER GRIDSTAT WITH TIMELINESS,REDUNDANCY, AND SAFETY Ratatoskr: Wide Area Executor RPC over Gridstat with timeliness, Redundancy, and Security Washington State University
78 To be continued…

🖥 close to the original LinuxOS