summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEkaitz Zarraga <ekaitz@elenq.tech>2024-05-19 23:38:58 +0200
committerEkaitz Zarraga <ekaitz@elenq.tech>2024-05-19 23:38:58 +0200
commit17f54bb26f619c2a9821dcb202355b8114bd2760 (patch)
treec324bcf0a4b8feabc0230f5911c15a8f82e22874
parent5ab6c0d2dd041becef6915469f493c87b5d16d77 (diff)
Update bibliography
-rw-r--r--bibliography.bib45
1 files changed, 45 insertions, 0 deletions
diff --git a/bibliography.bib b/bibliography.bib
index ebb9957..a9abddd 100644
--- a/bibliography.bib
+++ b/bibliography.bib
@@ -18,3 +18,48 @@
journal = {Computer},
doi = {10.1109/MC.2006.180}
}
+
+@article{ lua:Ierusalimschy,
+ abstract = {We discuss the main novelties of the implementation of Lua
+ 5.0: its register-based virtual machine, the new algorithm for
+ optimizing tables used as arrays, the implementation of closures,
+ and the addition of coroutines.},
+ author = {Ierusalimschy, Roberto and de Figueiredo, Luiz Henrique and Celes, Waldemar},
+ doi = {10.3217/jucs-011-07-1159},
+ journal = {Journal of Universal Computer Science},
+ keywords = {Language Lua VM},
+ number = 7,
+ pages = {1159--1176},
+ title = {The Implementation of Lua 5.0},
+ url = {http://www.jucs.org/jucs_11_7/the_implementation_of_lua},
+ volume = 11,
+ year = 2005
+}
+
+@phdthesis{ securityKernelLambda:Rees,
+ title={A security kernel based on the lambda-calculus},
+ author={Rees, Jonathan A},
+ year={1995},
+ school={Massachusetts Institute of Technology}
+}
+
+@inproceedings{ fork:Baumann,
+ title={A fork () in the road},
+ author={Baumann, Andrew and Appavoo, Jonathan and Krieger, Orran and Roscoe, Timothy},
+ booktitle={Proceedings of the Workshop on Hot Topics in Operating Systems},
+ pages={14--22},
+ year={2019}
+}
+
+@inproceedings{ riscvSelfHostingComputer:Somlo,
+ author={Somlo, Gabriel L.},
+ booktitle={2020 IEEE Security and Privacy Workshops (SPW)},
+ title={Toward a Trustable, Self-Hosting Computer System},
+ year={2020},
+ volume={},
+ number={},
+ pages={136-143},
+ keywords={Privacy;Conferences;Supply chains;Hardware;Software;Trojan horses;Computer security},
+ doi={10.1109/SPW50608.2020.00039}
+} % https://www.contrib.andrew.cmu.edu/~somlo/BTCP/
+