%% M. Douglas McIlroy % bibliography in bibtex format % % @article{McIlroy52a, author = {M. Douglas McIlroy}, title = {Kinetic theory then and now}, journal = {Cornell Engineer}, year = {1952}, month = {November}, pages = {17--20} } @article{McIlroy52b, author = {M. Douglas McIlroy}, title = {Faculty profile: {H}enri {G}uerlac}, journal = {Cornell Engineer}, year = {1952}, month = {December}, pages = {34,36} } @incollection{McIlroy55, author = {M. D. McIlroy}, chapter = {II.3}, title = {Calculation of numbers of structures of relations on finite sets}, publisher = {MIT Research Laboratory of Electronics}, booktitle = {Quarterly Progress Reports No. 17}, month = {Sep. 15}, year = {1955}, pages = {14--22} } @phdthesis{McIlroy58, author = {M. D. McIlroy}, title = {On the Solution of the Differential Equations of Conical Shells}, year = {1958}, school = {MIT} } @article{McIlroy59a, author = {M. D. McIlroy}, title = {Linear Deformations of Conical Shells}, journal = {J. Aero/Space Sciences}, month = {April}, pages = {253--254}, year = {1959} } @article{McIlroy60, author = {M. D. McIlroy}, title = {Macro Instruction Extension of Compiler Languages}, journal = {Comm. Assoc. Comp. Mach.}, volume = {3}, pages = {214--220}, month = {April}, year = {1960}, keywords = {acm cacm}, note = {Reprinted as pp. 560-571 in {\it Programming Systems and Languages,} ed. S. Rosen, McGraw-Hill, 1967 and as pp. 512-528 in {\it Compiler Techniques,} ed. Bary W. Pollack, Auerbach, 1972.} } @incollection{McIlroy63, author = {M. D. McIlroy}, editor = {R. L. Graves}, title = {Transportation Problems with Distributed Loads}, booktitle = {Recent Advances in Mathematical Programming}, pages = {335}, publisher = {McGraw-Hill}, year = {1963} } @article{McIlroy63a, author = {M. D. McIlroy}, title = {A Variant Method of File Searching}, journal = {Comm. Assoc. Comp. Mach.}, volume = {6}, pages = {101}, year = {1963}, keywords = {acm cacm}, note = {Letter to Editor} } @inproceedings{McIlroy69a, author = {M. D. McIlroy}, title = {``{M}ass Produced'' Software Components}, editor = {P. Naur and B. Randell}, booktitle = {Software Engineering}, publisher = {Scientific Affairs Division, NATO}, address = {Brussels}, pages = {138--155}, year = {1969}, note = {Report of a conference sponsored by the {NATO} {S}cience {C}ommittee, {G}armisch, {G}ermany, 7th to 11th {O}ctober 1968} } @article{McIlroy69b, author = {M. D. McIlroy}, title = {Alternatives to Extensible Languages}, journal = {ACM SIGPLAN Notices}, volume = {4}, pages = {50--52}, year = {1969} } @article{McIlroy69c, author = {M. D. McIlroy}, title = {Generator of Spanning Trees (Algorithm 354)}, journal = {Comm. Assoc. Comp. Mach.}, volume = {12}, pages = {511}, year = {1969}, keywords = {acm cacm} } @incollection{McIlroy72, author = {M. D. McIlroy}, title = {The Outlook for Software Components}, booktitle = {Software Engineering}, pages = {243--252}, publisher = {Infotech Information, Ltd.}, address = {Maidenhead, England}, year = {1972} } @book{McIlroy72b, author = {M. D. McIlroy}, title = {Machine processing of symbolic data constituents}, publisher = {U. S. Patent Office}, month = {January}, year = {1972}, abstract = {string macros}, note = {Patent number 3,634,882} } @techreport{McIlroy74a, author = {M. D. McIlroy}, title = {Synthetic {E}nglish speech by rule}, institution = {Bell Telephone Laboratories}, year = {1974}, number = {CSTR 14} } @article{McIlroy74, author = {M. D. McIlroy}, title = {The Number of 1's in Binary Integers: bounds and Extremal Properties}, journal = {SIAM J. Computing}, volume = {3}, pages = {255--261}, year = {1974}, mrnumber = {TM 72-1271-2} } @article{McIlroy75, author = {M. D. McIlroy}, title = {7-by-7 Computer-Generated Word Squares}, journal = {Word Ways}, volume = {8}, pages = {195--197}, year = {1975}, } @article{McIlroy76, author = {M. D. McIlroy}, title = {6-by-6 Double Word Squares}, journal = {Word Ways}, volume = {9}, pages = {80--89}, year = {1976}, } @article{McIlroy76a, author = {M. D. McIlroy}, title = {5-by-5 Palindromic Word Squares}, journal = {Word Ways}, volume = {9}, pages = {199--202}, year = {1976} } @techreport{McIlroy76b, author = {J. W. Hunt and M. D. McIlroy}, title = {An Algorithm for Differential File Comparison}, institution = {Bell Laboratories}, address = {Murray Hill, NJ}, number = {CSTR 41}, year = {1976} } @article{McIlroy78, author = {M. D. McIlroy and E. N. Pinson and B. A. Tague}, title = {UNIX Time-Sharing System: Foreword}, journal = {Bell Sys. Tech. J.}, volume = {57}, number = {6}, pages = {1899--1904}, year = {1978}, keywords = {unix bstj} } @inproceedings{McIlroy79, author = {M. D. McIlroy}, title = {Integrated Text Processing}, booktitle = {Proc. Special Libraries Assoc. Conf.}, address = {Honolulu, Hawaii}, year = {1979} } @inproceedings{McIlroy79a, author = {M. D. McIlroy}, title = {Microprocessor/Firmware Modules for Data Bases and Data Processing}, booktitle = {Proc. IEEE Microprocessor Workshop}, address = {Baltimore, MD.}, year = {1979} } @incollection{McIlroy80a, author = {M. D. McIlroy}, editor = {Gordon Lyon}, title = {{ANS} {FORTRAN} {X}3.9-1966 Charts}, booktitle = {NBS Handbook 131}, publisher = {Nat'l Bureau of Standards}, address = {Washington, D. C.}, year = {1980} } @book{Kernighan79, editor = {B. W. Kernighan and M. D. McIlroy}, title = {{UNIX} Programmer's Manual (7th Edition)}, publisher = {Bell Laboratories, Murray Hill, NJ}, year = {1979}, note = {2 Volumes. Republished by Holt, Rinehart and Winston, New York, 1983.} } @article{McIlroy82, author = {M. D. McIlroy}, title = {A Program for Generating Word Squares}, journal = {Computer Journal}, volume = {25}, pages = {44}, year = {1982} } @article{McIlroy82a, author = {M. D. McIlroy}, title = {The Number of States of a Dynamic Storage Allocation System}, journal = {Computer Journal}, volume = {25}, pages = {388--392}, year = {1982}, mrnumber = {TM 81-1271-12} } @incollection{McIlroy82b, author = {M. D. McIlroy}, title = {Theoretical Research: Its Purposes and Influence}, booktitle = {Roles of Industry and the University in Computer Research and development}, publisher = {National Academy Press}, address = {Washington}, year = {1982} } @article{McIlroy82c, author = {M. D. McIlroy}, title = {Development of a Spelling List}, journal = {IEEE Trans. on Communications}, volume = {30}, pages = {91--99}, year = {1982}, mrnumber = {TM 81-11271-2} } @article{McIlroy83a, author = {M. D. McIlroy}, title = {Best Approximate Circles on Integer Grids}, journal = {ACM Trans. on Graphics}, volume = {2}, pages = {237--263}, month = {October}, year = {1983} } @incollection{Millman84, author = { W. S. Brown and B. D. Holbrook and M. D. McIlroy }, title = { Computer Science }, booktitle = { A History of Engineering and Science in the Bell System, Communication Sciences (1925-1980) }, editor = { S. Millman }, publisher = { {AT\&T} Bell Laboratories }, year = { 1984 }, pages = { 351--398 } } @article{McIlroy85, author = {M. D. McIlroy}, title = {A Note on Discrete Representation of Lines}, journal = {AT\&T Tech. J.}, volume = {64}, pages = {481--490}, month = {February}, year = {1985} } @article{McIlroy86a, author = {M. D. McIlroy}, title = {The {UNIX} Success Story}, journal = {UNIX Review}, volume = {4}, number = {10}, pages = {32--42}, month = {October}, year = {1986} } @article{Bentley86, author = {J. Bentley and D. E. Knuth and M. D. McIlroy}, title = {Programming Pearls}, journal = {CACM}, volume = {29}, number = {6}, pages = {471--483}, month = {June}, year = {1986}, note = {Also in D. E. Knuth, {\it Literate Programming,} Stanford CSLI Lecture Notes No. 27, 1992} } @article{McIlroy87, author = {M. D. McIlroy}, title = {Projections: Mapmakers' Answers to the Riddle of Depicting a Round Earth on Flat Paper}, journal = {New York Map Society Rhumb Line}, volume = {1987}, number = {6}, pages = {2--11}, year = {1987}, mrnumber = {11270-870625-09} } @techreport{McIlroy87a, author = {M. D. McIlroy}, title = {A Research {UNIX} Reader: Annotated Excerpts from the Programmer's Manual, 1971-1986}, institution = {{AT\&T} Bell Laboratories}, year = {1987}, number = {CSTR 139} } @inproceedings{McIlroy88, author = {M. D. McIlroy and J. A. Reeds}, title = {Multilevel Security with Fewer Fetters}, booktitle = {Proc. Spring 1988 EUUG Conf.}, pages = {117--122}, publisher = {European Unix Users Group}, address = {London}, month = {April}, year = {1988}, note = {also in {\it Proc. UNIX Security Workshop,} Usenix Assoc., Portland, August 1988, 24-31} } @inproceedings{McIlroy88a, author = {M. D. McIlroy and J. A. Reeds}, title = {Multilevel Windows on a Single-Level Terminal}, booktitle = {Proc. UNIX Security Workshop}, pages = {32--34}, publisher = {Usenix Assoc}, address = {Portland}, month = {August}, year = {1988} } @article{McIlroy89, author = {M. D. McIlroy}, title = {Virology 101}, journal = {Computing Systems}, volume = {2}, number = {2}, pages = {173--181}, year = {1989}, note = { Translated as ``Virology f\"{u}r Anf\"{a}nger,'' {\it unix/mail,} 8(1):57-61, 1990.} } @article{McIlroy90a, author = {M. D. McIlroy}, title = {Squinting at Power Series}, journal = {Software--Practice and Experience}, volume = {20}, number = {7}, pages = {661--683}, year = {1990}, note = { url{http://www.cs.dartmouth.edu/$\sim$doug/squint.ps.gz} } } @article{McIlroy90c, author = {M. D. McIlroy}, title = {Unsafe at Any Price}, journal = {Information Technology Quarterly}, volume = {IX}, number = {2}, pages = {21--23}, note = {Harvard U. Office for Information Technology}, month = {Summer}, year = {1990} } @book{Hume90, editor = {A. G. Hume and M. D. McIlroy}, title = {Unix Research System (10th Edition)}, publisher = {Saunders College Publishing}, address = {Philadelphia}, year = {1990}, note = {2 Volumes} } @book{Clark90, author = {D. D. Clark et al (including M. D. McIlroy)}, title = {Computers at Risk}, publisher = {National Academy Press}, address = {Washington}, year = {1991} } @book{McIlroy91, author = {M. D. McIlroy and J. A. Reeds}, title = {Secure file handling in a computer operating system}, publisher = {U. S. Patent Office}, month = {January}, year = {1991}, note = {Patent number 4,984,272} } @inproceedings{McIlroy91a, author = {M. D. McIlroy}, title = {Unix on My Mind}, booktitle = {Proc. Virginia Computer Users Conference}, volume = {21}, pages = {1--6}, publisher = {Virginia Tech}, address = {Blacksburg}, month = {September}, year = {1991} } @techreport{McIlroy91b, author = {M. D. McIlroy}, title = {There Is No Royal Road to Programs: A Trilogy on Raster Ellipses and Programming Methodology}, institution = {{AT\&T} Bell Laboratories}, year = {1991}, number = {CSTR 155} } @article{McIlroy92, author = {M. D. McIlroy and J. A. Reeds}, title = {Multilevel security in the {UNIX} tradition}, journal = {Software--Practice and Experience}, volume = {22}, pages = {673--694}, year = {1992} } @article{McIlroy92a, author = {M. D. McIlroy}, title = {Getting raster ellipses right}, journal = {ACM Transactions on Graphics}, volume = {11}, pages = {259--275}, year = {1992} } @incollection{McIlroy92c, author = {M. D. McIlroy}, editor = {S. A. Burr}, title = {Number Theory in Computer Graphics}, booktitle = {The Unreasonable Effectiveness of Number Theory}, pages = {105--121}, publisher = {Am. Math. Soc.}, address = {Providence}, year = {1992}, series = {Proceedings of Symposia in Applied Mathematics}, volume = {46} } @article{McIlroy93, author = {P. M. McIlroy and K. Bostic and M. D. McIlroy}, title = {Engineering Radix Sort}, journal = {Computing Systems}, volume = {6}, pages = {5--27}, year = {1993} } @article{Bentley93, author = {J. L. Bentley and M. D. McIlroy}, title = {Engineering a Sort Function}, journal = {Software--Practice and Experience}, volume = {23}, pages = {1249--1265}, year = {1993} } @book{Hartmanis92, author = {J. Hartmanis et al (including M. D. McIlroy)}, title = {Computing the Future}, publisher = {National Academy Press}, address = {Washington}, year = {1994} } @article{McIlroy96, author = {M. D. McIlroy}, title = {The commonest 6-square}, journal = {Word Ways}, volume = {29}, pages = {80--81}, year = { 1996} } @techreport{Reeds92, author = {J. A. Reeds and M. D. McIlroy}, title = {The {IX} Multilevel-Secure {UNIX} System}, institution = {{AT\&T} Bell Laboratories}, year = {1992}, number = {CSTR 163} } @article{McIlroy92d, author = {M. D. McIlroy}, title = {New {NRC} Report Proposes Broader Horizons for Computing Disciplines}, journal = {{SIAM} News}, volume = 25, number = 6, month = {November}, year = 1992, pages = 1 } @article{McIlroy97, author = {M. D. McIlroy}, title = {Dual Cryptograms}, journal = {Word Ways}, volume = 30, year = 1997, pages = {174--181} } @inproceedings{McIlroy98, author = {M. D. McIlroy and J. P. Savicki}, title = { Isomorphism of classical rearrangeable networks }, booktitle = { Advances in Switching Networks }, editor = {D.-Z. Du and F. K. Hwang }, volume = 42, publisher = {American Math. Soc. }, series = { {DIMACS} Series in Discrete Math. and Theoretical Comp. Sci. }, address = {Providence }, year = 1998, pages = {147--156} } @book{McIlroy99b, author = {T. Hughes et al. (including M. D. McIlroy)}, title = {Funding a Revolution: Government Support for Computing Research}, publisher = {National Academy Press}, address = {Washington}, year = {1999} } @article{McIlroy99, author = {M. D. McIlroy}, title = {A killer adversary for quicksort}, journal = {Software--Practice and Experience}, volume = {29}, year = 1999, pages = {341--344 } } @article{McIlroy99a, author = {M. D. McIlroy}, title = {Functional pearl: {P}ower series, power serious}, journal = {J. of Functional Programming }, volume = {9}, year = {1999}, pages = {323--335 } } @article{Bentley01, author = { J. Bentley and D. McIlroy }, title = { Data compression with long repeated strings }, journal = {Information Sciences}, volume = {135}, year = {2001}, pages = {1--11}, note = {An early version is in J. A. Storer and M. Cohn, {\em{Proceedings DCC '99: Data Compression Conference}}, IEEE, Snowbird UT, March 1999} } . @article{McIlroy01, author = { M. D. McIlroy }, title = { The music of streams }, journal = { Information Processing Letters }, volume = { 77 }, number = {2-4}, pages = { 189--195}, year = {2001}, note = { Lazy evaluation of power series } } @misc{Bentley03, author = {J. L. Bentley and M. D. McIlroy}, title = {Method and apparatus for data compression through fingerprinting}, publisher = {U. S. Patent Office}, month = {August}, year = {2003}, note = {Patent number 6,611,213} } @article{McIlroy04, author = { M. D. McIlroy }, title = { Functional pearl: {E}numerating the strings of regular languages }, journal = {J. of Functional Programming}, volume = {14}, number = {3}, year = {2004}, pages = {503--518} } @InProceedings{Bratus07, author = {Sergey Bratus and Alex Ferguson and Doug McIlroy and Sean Smith}, title = {Pastures: towards usable security policy engineering}, booktitle = {Proceedings of the Second International Conference on Availability, Reliability and Security (ARES 2007)}, note = {First International Workshop on Secure Software Engineering (SecSE)}, pages = "1052--1059", year = "2007", month = "April", address = "Vienna, Austria", publisher = {IEEE Computer Society}, ISBN = {0-7695-2775-2} } @incollection{McIlroy11, author = {M. Douglas McIlroy}, title = {Wallpaper maps}, booktitle = {Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday}, publisher = {Springer}, year = "2011", ISBN = {978-3-642-24541-1}, series = "LNCS", volume = "6875", editor = {Cliff B. Jones and John L. Lloyd}, note = {Expanded version available at url{https://digitalcommons.dartmouth.edu/cs\_tr/353/}} } @techreport{McIlroy23, author = {M. Douglas McIlroy}, title = {Reasoning about the {C}onant gasket}, year = "2023", number = {TR2023-1003}, institution = {Dartmouth College}, note = { url{https://digitalcommons.dartmouth.edu/cs\_tr/385}} }