diff options
author | Ekaitz Zarraga <ekaitz@elenq.tech> | 2024-05-19 23:38:58 +0200 |
---|---|---|
committer | Ekaitz Zarraga <ekaitz@elenq.tech> | 2024-05-19 23:38:58 +0200 |
commit | 17f54bb26f619c2a9821dcb202355b8114bd2760 (patch) | |
tree | c324bcf0a4b8feabc0230f5911c15a8f82e22874 | |
parent | 5ab6c0d2dd041becef6915469f493c87b5d16d77 (diff) |
Update bibliography
-rw-r--r-- | bibliography.bib | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/bibliography.bib b/bibliography.bib index ebb9957..a9abddd 100644 --- a/bibliography.bib +++ b/bibliography.bib @@ -18,3 +18,48 @@ journal = {Computer}, doi = {10.1109/MC.2006.180} } + +@article{ lua:Ierusalimschy, + abstract = {We discuss the main novelties of the implementation of Lua + 5.0: its register-based virtual machine, the new algorithm for + optimizing tables used as arrays, the implementation of closures, + and the addition of coroutines.}, + author = {Ierusalimschy, Roberto and de Figueiredo, Luiz Henrique and Celes, Waldemar}, + doi = {10.3217/jucs-011-07-1159}, + journal = {Journal of Universal Computer Science}, + keywords = {Language Lua VM}, + number = 7, + pages = {1159--1176}, + title = {The Implementation of Lua 5.0}, + url = {http://www.jucs.org/jucs_11_7/the_implementation_of_lua}, + volume = 11, + year = 2005 +} + +@phdthesis{ securityKernelLambda:Rees, + title={A security kernel based on the lambda-calculus}, + author={Rees, Jonathan A}, + year={1995}, + school={Massachusetts Institute of Technology} +} + +@inproceedings{ fork:Baumann, + title={A fork () in the road}, + author={Baumann, Andrew and Appavoo, Jonathan and Krieger, Orran and Roscoe, Timothy}, + booktitle={Proceedings of the Workshop on Hot Topics in Operating Systems}, + pages={14--22}, + year={2019} +} + +@inproceedings{ riscvSelfHostingComputer:Somlo, + author={Somlo, Gabriel L.}, + booktitle={2020 IEEE Security and Privacy Workshops (SPW)}, + title={Toward a Trustable, Self-Hosting Computer System}, + year={2020}, + volume={}, + number={}, + pages={136-143}, + keywords={Privacy;Conferences;Supply chains;Hardware;Software;Trojan horses;Computer security}, + doi={10.1109/SPW50608.2020.00039} +} % https://www.contrib.andrew.cmu.edu/~somlo/BTCP/ + |