[1] Advanced Micro Devices, Inc. Software Optimization Guide for AMD64 Processors, 2005. Publication Number 25112.
[2] Advanced Micro Devices, Inc. AMD64 Architecture Programmer's Manual, Volume 1 : Application Programming, 2013. Publication Number 24592.
[3] Advanced Micro Devices, Inc. AMD64 Architecture Programmer's Manual, Volume 3 : General-Purpose and System Instructions, 2013. Publication Number 24594.
[4] Advanced Micro Devices, Inc. AMD64 Architecture Programmer's Manual, Volume 4 : 128-Bit and 256-Bit Media Instructions, 2013. Publication Number 26568.
[5] K. Arnold, J. Gosling, and D. Holmes. The Java Programming Language, Fourth Edition. Prentice Hall, 2005.
[7] A. Birrell. An introduction to programming with threads. Technical Report 35, Digital Systems Research Center, 1989.
[11] D. Bovet and M. Cesati. Understanding the Linux Kernel, Third Edition. O'Reilly Media, Inc., 2005.
[12] A. Demke Brown and T. Mowry. Taming the memory hogs : Using compiler-inserted releases to manage physical memory intelligently. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), pages 31-44. Usenix, October 2000.
[13] R. E. Bryant. Term-level verification of a pipelined CISC microprocessor. Technical Report CMUCS-05-195, Carnegie Mellon University, School of Computer Science, 2005.
[15] D. Butenhof. Programming with Posix Threads. Addison-Wesley, 1997.
[26] C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows : Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Expo (DISCEX), volume 2, pages 119-129, March 2000.
[30] E. Demaine. Cache-oblivious algorithms and data structures. In Lecture Notes from the EEF Summer School on Massive Data Sets. BRICS, University of Aarhus, Denmark, 2002.
[31] E. W. Dijkstra. Cooperating sequential processes. Technical Report EWD-123, Technological University, Eindhoven, the Netherlands, 1965.
[33] M. Dowson. The Ariane 5 software failure. SIGSOFT Software Engineering Notes 22 (2) : 84, 1997.
[35] M. W. Eichen and J. A. Rochlis. With microscope and tweezers : An analysis of the Internet virus of November, 1988. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 326-343. IEEE, 1989.
[36] ELF-64 Object File Format, Version 1.5 Draft 2, 1998. Available at http://www.uclibc.org/docs/elf-64-gen.pdf.
[38] M. Frigo, C. E. Leiserson, H. Prokop, and S. Ramachandran. Cache-oblivious algorithms. In Proceedings of the 40th IEEE Symposium on Foundations of Computer Science (FOCS), pages 285-297. IEEE, August 1999.
[42] Google. IPv6 Adoption. Available at http://www.google.com/intl/en/ipv6/statistics.html.
[44] L. Gwennap. New algorithm improves branch prediction. Microprocessor Report 9 (4), March 1995.
[45] S. P. Harbison and G. L. Steele, Jr. C, A Reference Manual, Fifth Edition. Prentice Hall, 2002.
[46] J. L. Hennessy and D. A. Patterson. Computer Architecture : A Quantitative Approach, Fifth Edition. Morgan Kaufmann, 2011.
[47] M. Herlihy and N. Shavit. The Art of Multiprocessor Programming. Morgan Kaufmann, 2008.
[49] Intel Corporation. Intel 64 and IA-32 Architectures Optimization Reference Manual. Available at http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html.
[50] Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 1 : Basic Architecture. Available at http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html.
[51] Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 2 : Instruction Set Reference. Available at http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html.
[52] Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 3a : System Programming Guide, Part 1. Available at http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html.
[53] Intel Corporation. Intel Solid-State Drive 730 Series : Product Specification. Available at http://www.intel.com/content/www/us/en/solid-state-drives/ssd-730-series-spec.html.
[54] Intel Corporation. Tool Interface Standards Portable Formats Specification, Version 1.1, 1993. Order number 241597.
[56] R. Jones and R. Lins. Garbage Collection : Algorithms for Automatic Dynamic Memory Management. Wiley, 1996.
[58] R. Katz and G. Borriello. Contemporary Logic Design, Second Edition. Prentice Hall, 2005.
[59] B. W. Kernighan and R. Pike. The Practice of Programming. Addison-Wesley, 1999.
[60] B. Kernighan and D. Ritchie. The C Programming Language, First Edition. Prentice Hall, 1978.
[61] B. Kernighan and D. Ritchie. The C Programming Language, Second Edition. Prentice Hall, 1988.
[62] Michael Kerrisk. The Linux Programming Interface. No Starch Press, 2010.
[64] D. Knuth. The Art of Computer Programming, Volume 1 : Fundamental Algorithms, Third Edition. Addison-Wesley, 1997.
[65] J. Kurose and K. Ross. Computer Networking : A Top-Down Approach, Sixth Edition. Addison-Wesley, 2012.
[67] D. Lea. A memory allocator. Available at http://gee.cs.oswego.edu/dl/html/malloc.html, 1996.
[69] J. R. Levine. Linkers and Loaders. Morgan Kaufmann, 1999.
[70] David Levinthal. Performance Analysis Guide for Intel Core i7 Processor and Intel Xeon 5500 Processors. Available at https://software.intel.com/sites/products/collateral/hpc/vtune/performance_analysis_guide.pdf.
[71] C. Lin and L. Snyder. Principles of Parallel Programming. Addison Wesley, 2008.
[73] J. L. Lions. Ariane 5 Flight 501 failure. Technical Report, European Space Agency, July 1996.
[74] S. Macguire. Writing Solid Code. Microsoft Press, 1993.
[75] S. A. Mahlke, W. Y. Chen, J. C. Gyllenhal, and W. W. Hwu. Compiler code transformations for superscalar-based high-performance systems. In Proceedings of the 1992 ACM/IEEE Conference on Supercomputing, pages 808-817. ACM, 1992.
[77] M. Matz, J. Hubicka, A. Jaeger, and M. Mitchell. System V application binary interface AMD64 architecture processor supplement. Technical Report, x86-64.org, 2013. Available at http://www.x86-64.org/documentation_folder/abi-0.99.pdf.
[80] S. S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann, 1997.
[84] L. Peterson and B. Davie. Computer Networks : A Systems Approach, Fifth Edition. Morgan Kaufmann, 2011.
[86] S. Przybylski. Cache and Memory Hierarchy Design : A Performance-Directed Approach. Morgan Kaufmann, 1990.
[89] J. Rabaey, A. Chandrakasan, and B. Nikolic. Digital Integrated Circuits : A Design Perspective, Second Edition. Prentice Hall, 2003.
[90] J. Reinders. Intel Threading Building Blocks. O'Reilly, 2007.
[95] J. Schindler and G. Ganger. Automated disk drive characterization. Technical Report CMU-CS-99-176, School of Computer Science, Carnegie Mellon University, 1999.
[97] R. C. Seacord. Secure Coding in C and C++, Second Edition. Addison-Wesley, 2013.
[100] J. P. Shen and M. Lipasti. Modern Processor Design : Fundamentals of Superscalar Processors. McGraw Hill, 2005.
[101] B. Shriver and B. Smith. The Anatomy of a High-Performance Microprocessor : A Systems Perspective. IEEE Computer Society, 1998.
[102] A. Silberschatz, P. Galvin, and G. Gagne. Operating Systems Concepts, Ninth Edition. Wiley, 2014.
[103] R. Skeel. Roundoff error and the Patriot missile. SIAM News 25 (4) : 11, July 1992.
[105] E. H. Spafford. The Internet worm program : An analysis. Technical Report CSD-TR-823, Department of Computer Science, Purdue University, 1988.
[106] W. Stallings. Operating Systems : Internals and Design Principles, Eighth Edition. Prentice Hall, 2014.
[107] W. R. Stevens. TCP/IP Illustrated, Volume 3 : TCP for Transactions, HTTP, NNTP and the Unix Domain Protocols. Addison-Wesley, 1996.
[108] W. R. Stevens. Unix Network Programming : Interprocess Communications, Second Edition, volume 2. Prentice Hall, 1998.
[109] W. R. Stevens and K. R. Fall. TCP/IP Illustrated, Volume 1 : The Protocols, Second Edition. Addison-Wesley, 2011.
[110] W. R. Stevens, B. Fenner, and A. M. Rudoff. Unix Network Programming : The Sockets Networking API, Third Edition, volume 1. Prentice Hall, 2003.
[111] W. R. Stevens and S. A. Rago. Advanced Programming in the Unix Environment, Third Edition. Addison-Wesley, 2013.
[112] T. Stricker and T. Gross. Global address space, non-uniform bandwidth : A memory system performance characterization of parallel systems. In Proceedings of the 3rd International Symposium on High Performance Computer Architecture (HPCA), pages 168-179. IEEE, February 1997.
[113] A. S. Tanenbaum and H. Bos. Modern Operating Systems, Fourth Edition. Prentice Hall, 2015.
[114] A. S. Tanenbaum and D. Wetherall. Computer Networks, Fifth Edition. Prentice Hall, 2010.
[115] K. P. Wadleigh and I. L. Crawford. Software Optimization for High-Performance Computing : Creating Faster Applications. Prentice Hall, 2000.
[116] J. F. Wakerly. Digital Design Principles and Practices, Fourth Edition. Prentice Hall, 2005.
[119] M. Wolf and M. Lam. A data locality algorithm. In Proceedings of the 1991 ACM Conference on Programming Language Design and Implementation (PLDI), pages 30-44, June 1991.
[120] G. R. Wright and W. R. Stevens. TCP/IP Illustrated, Volume 2 : The Implementation. Addison-Wesley, 1995.
[122] T.-Y. Yeh and Y. N. Patt. Alternative implementation of two-level adaptive branch prediction. In Proceedings of the 19th Annual International Symposium on Computer Architecture (ISCA), pages 451-461. ACM, 1998.