Skip to Main Content

CSCI Library Guide

Computer Science

CSCI Searching

Search All

You are searching books, e-books, articles from newspapers, magazines and scholarly journals, DVDs, market research reports, and selected Web resources.

Search Articles

You are searching articles from newspapers, newsletters, magazines and scholarly journals.

Search Books

You are searching books and e-books.

CSCI Databases

CSCI 420 Keywords

  • Active replication
  • AES (Rijndael Algorithm) - advanced encryption standard
  • AFS - andrew file system
  • Amoeba OS
  • Antonomic systems
  • Apache web server
  • Architectural DS styles such as Layered, Object-based, Data-centered, event-based
  • Astrolabe
  • Asynchronous vs synchronous communications
  • Attribute based naming systems
  • Automounting files
  • basic reliable multicasting
  • Bayou protocol
  • Berkeley Algorithm
  • Berkeley Sockets
  • Binary XOR operation
  • bitcoins
  • BitTorrent
  • Blocked Cypher
  • Body Area Networks (BAN)
  • Byzantine agreements
  • call by copy/restore
  • call by reference
  • call by value
  • CAN - Content addressable network
  • Causal consistency
  • CDN - Content delivery networks
  • CERN
  • checkpointing
  • Chord protocol
  • Client-centric consistency models
  • Cloning code
  • CLR - certificate Revocation list
  • Cluster Computing
  • Coda
  • Code Migration
  • Connectionless vs connection protocols
  • Consistency vs coherence
  • Cooperative or distributed web caching
  • Coral content distribution network
  • CORBA
  • Cryptography
  • Daemons
  • Data streaming for multimedia sharing vs discrete messaging
  • DCE RPC Binding servers
  • deadlocks
  • DES (Data Encryption Standard)
  • DHCP
  • DHT - distributed hash tables
  • Diffie-Hellman key exchange
  • Digital Signatures
  • distributed hash tables (DHT)
  • Distributed Pervasive Systems
  • DNS
  • Eclipse attacks
  • Edge Servers
  • EJB - enterprise java beans
  • Election Algorithms - Bully or Ring
  • Encryption
  • Epidemic protocols
  • Eventual consistency
  • Failure masking
  • Failure modes
  • Fault tolerance
  • Finite-state Machines
  • Firewalls
  • Freenet
  • FTP - (File Transfer Protocol)
  • Fuggetta code migration
  • Global Name Space
  • GLOBE location service
  • Globule system
  • Globus Security architecture
  • Gnutella Network
  • Google File System
  • Gossip-based protocols
  • GPS
  • Grid Computing
  • UNIX hard vs soft (Symbolic) Links
  • HARP - Hierarchical Asynchronous Replication Protocol for Massively Replicated Systems
  • History of Distributed Systems
  • HTTP
  • IDL - interface definition language
  • Intermittent faults
  • Interprocess communications (IPC)
  • IPv6 vs IPv4
  • ISIS protocol
  • ISO OSI layers
  • Ivy Distributed file system
  • Jini
  • Kademlia
  • Kazaa
  • Kerberos
  • Kernel
  • Lamport's logical clocks
  • Latency and Replication in DS
  • Lazy propagation
  • LDAP
  • Light weight processes (LWP)
  • Limeware
  • Linux Beowulf cluster systems
  • Locking techniques in DS
  • loosely coupled communications
  • Man in the middle attack
  • MCA
  • MD5 - message digest 5
  • message broker
  • Middleware
  • MOM protocol
  • MOSIX cluster systems
  • Mounting files (UNIX)
  • MPEG-2
  • MPI - message passing interface
  • MQ Series
  • Name Space
  • Napster
  • Needham-Schroeder algorithm
  • Nested Transactions
  • Object adapters
  • Object servers
  • Oceanstore arthitecture
  • OGSA - open grid services architecture
  • Overlay networks
  • P2P - peer to peer systems
  • Parameter Marshalling
  • Pastry - peer to peer system
  • PCA - policy certificate authentication
  • PEM - privacy enhanced email
  • Permanent faults
  • Persistent message
  • Pessimistic vs optimistic logging protocols
  • PlanetLab
  • Pond - Oceanstore prototype
  • Process resilience
  • Proxy Gateway
  • Proxy servers
  • Quorum based replication
  • RDF - resource description framework
  • Reflection Attack
  • Replicated write protocols
  • Replication methods
  • RMI Protocol
  • RPC protocol
  • RSA (Rivest, Shamir and Adelman)
  • Scability issues and solutions in Distributed Systems
  • Scalable reliable multicasting protocols (SRM)
  • Sensor and Mesh Networks
  • SMDS routers
  • SMTP
  • SOA - Service Oriented architecture
  • SOAP - simple object access protocol
  • Socket
  • Squid web proxy
  • Squirrel - decentralized peer to peer web cache
  • SUN NFS
  • Superpeers
  • Switched Multi-megabit data service (SMDS)
  • SWORD
  • Sybil attacks
  • System architectures such as central, decentalized, hybrid - advantages and disadvantages
  • Tapestry from UC Berkely - peer to peer system
  • TCP
  • THINC - thin-client network computing
  • Threads
  • TIB/Redevous
  • Tiger Video Fileserver
  • TinyDB
  • Transient faults and messages
  • Transparency definitions for Distributed Systems
  • Tree vs mesh networks
  • TRIPLE DES
  • types of state - stateless, soft state, session state
  • UDDI
  • UDP
  • UNIX NFS
  • Unstructured peer to peer
  • Vector Clocks
  • Virtual machine monitor - VMM
  • Virtual Synchrony
  • Virtualization
  • WebDAV - web distributed authoring and versioning
  • Websphere MQ
  • Windows Azure
  • WSDL - web services description language
  • X Window System
  • XTI - x/Open transport Interface also called TLK (transport layer interface from AT&T
Hide CSCI420 Keywords

CSCI Books