-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathChapter3Citations
184 lines (95 loc) · 12.5 KB
/
Chapter3Citations
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
Vatz, Mara E. (2004) ‘1865: Fraternity with a theme’ MIT Technology Review, 1 October 2004:
https://www.technologyreview.com/2004/10/01/274786/1865-fraternity-with-a-theme/
Leaning, Marcus (2021) ‘From chopping trees to destroying capitalism: A social etymology of hacking’, in Ewen et al. (eds.) Capitalism, crime and media in the 21st century: 139–157. Cham, Switzerland, Springer Nature.
Onorato, J. and Schupack, M. (2002). Tech Model Railroad Club of M.I.T.: The first fifty years. Cambridge, MA: TMRC.
Levy, Steven (2014) ‘The Tech Model Railroad Club’ Wired 21 November 2014: https://www.wired.com/2014/11/the-tech-model-railroad-club/
Levy, Steven (2010) Hackers: Heroes of the computer revolution. New York, O'Reilly Media.
Smith, Alexander (2020) They create worlds: The story of the people and companies that shaped the video game industry, vol 1 1971–1982. Boca Raton, FL, CRC Press.
Deutsch, Peter and Berkeley, Edmund C. (1964) ‘The LISP implementation for the PDP-1 computer’,
Decus Program Library No. 85, March 1964.
The Computer Museum (1984) ‘'The TX-0: Its past and present' Computer Museum Report 8, Spring 1984.
Samson, Peter (1959) ‘An abridged dictionary of the TMRC language’, June 1959, available at:
https://www.gricer.com/tmrc/dictionary1959.html
SAmin (2018) ‘Machines that play (Building chess machines’, HackerNoon 21 September 2018: https://medium.com/hackernoon/machines-that-play-building-chess-machines-7feb634fad98
O’Mara, Margaret (2019) The code: Silicon Valley and the remaking of America. New York, Penguin.
Haigh, Thomas and Ceruzzi, Paul E. (2021) A new history of modern computing (History of Computing). Cambridge, Mass., MIT Press.
Östling, Johan (2018) Humboldt and the modern German university: An intellectual history. Lund, Lund University Press.
Geiger, Roger L. (1986) To advance knowledge: The growth of American research universities, 1900-1940. New York, Oxford University Press.
Mazzucato, Mariana (2013) The entrepreneurial state: Debunking public vs. private sector myths. London, Anthem Press.
Salus, Peter (2007), The ARPAnet sourcebook: The unpublished foundations of the Internet. New York: Peer-to-Peer Communications Inc.
Hafner, and Lyon (2006) Where wizards stay up late: The origins of the internet. New York, Simon & Schuster.
Earnest, Lester (1971) ‘ John McCarthy’, A.M. Turing award: https://amturing.acm.org/award_winners/mccarthy_1118322.cfm
Nilsson, Nils J. (1965) Learning machines: Foundations of trainable pattern-classifying systems front. New York, McGraw-Hill.
Graham, Paul (2004) Hackers & painters: Big ideas from the computer age. Sebastopol, CA., O'Reilly Media.
Haigh, Thomas (2004) ‘Biographies: Robert W Floyd, in Memoriam’ Annals of the History of Computing 26, 2: 75–83.
Kieve, Jeffrey L. (1973) The electric telegraph: A social and economic history. Newton Abbot, Devon, David & Charles.
Kythe, Dave K. and Kythe, Prem K. (2017) ‘Coding theory: History’ in Laplante, Phillip A. (ed.), Encyclopedia of computer science and technology, vol. I: 224–231. Boca Raton, FL., CRC Press.
Lehne, Per H. (2004) ‘The transatlantic telegraph cable of 1859 and other aspects of early telegraphy’, Telektronikk 3: 203–208.
Cauley, Lesli (2005) End of the line: The rise and fall of AT&T. New York, Free Press.
Hargraves, Robert F. and Stephenson, Andrew G. (1969) ‘Design considerations for an educational timesharing system’, AFIPS Spring Joint Computer Conference: 657–664.
Johnson, Luanne (2005) ‘General Electric Information Services: Company details’ Computer History Museum: http://archive.computerhistory.org/resources/access/text/2012/10/102746517-05-01-acc.pdf
Kemeny, John G. (1972) Man and the computer. New York, Scribner.
Bitzer, Donald (1976) ‘The wide world of computer-based education’, Advances in Computers 15: 239–283.
Hoehn, H.J and Martel, R.A. (1973) ‘Recent developments in three-color plasma display panels’, Transactions on Electron Devices 20, 11: 1078–1081.
Woolley, David R. (2016) 'PLATO: The emergence of online community' in Malloy, J. (ed) Social Media Archeology and Poetics: 103–118. Cambridge, Mass., MIT Press.
Felsenstein, Lee (2016) ‘Community Memory: The first public-access social media system’ in Malloy, J. (ed) Social Media Archeology and Poetics: 89–102. Cambridge, Mass., MIT Press.
Paulo (2022) ‘A look at the pioneers of the video game industry’, Vintage Is The New Old, 7 December 2022: https://www.vintageisthenewold.com/a-look-at-the-pioneers-of-the-video-game-industry
Dear, Brian (2017) The friendly orange glow: The untold story of the PLATO System and the dawn of cyberculture. New York, Pantheon Books.
Peterson, Tommy (2004) ‘Crossing boundaries’, Computerworld, 8 November 2004: https://www.computerworld.com/article/2567405/crossing--boundaries.html
Barton, Matt, and Stacks, Shane (2019) Dungeons and desktops: The history of computer role-playing games 2e. Abingdon, Routledge.
Donovan, Tristan (2010) Replay: The history of video games. Lewes, East Sussex, Yellow Ant.
Schreier, Jason (2017) Blood, sweat, and pixels: The triumphant, turbulent stories behind how video games are made. New York, Harper.
Rosensweet, Bob (1984) ‘Author, author’ PC Magazine 20 May 1984: 299–300.
Yates, Diana (2014) ‘Radio frequency ID tags on honey bees reveal hive dynamics’ Institute for Genomic Biology 22 July 2014: https://www.igb.illinois.edu/article/radio-frequency-id-tags-honey-bees-reveal-hive-dynamics
Cullen, Kevin F. (2001) ‘Using Macromedia Authorware for web-based instruction’ Information Technology and Libraries 20, 3: 154–159.
Jones, Douglas W. (2001) ‘The Digital Equipment Corporation PDP-8 Frequently Asked Questions’, University of Iowa Department of Computer Science: https://homepage.cs.uiowa.edu/~jones/pdp8/faqs/
Davidson, Michael W. (2004) ‘Steal the best’, Florida State University,
https://micro.magnet.fsu.edu/creatures/pages/russians.html
Computer History Museum (2006) ‘VAX Russian clone documents’, Bob Supnik papers, X3339.2006: https://www.computerhistory.org/collections/catalog/102774199
Bolotoff, Paul V. (2005) ‘Alpha: The history in facts and comments’, AlphaPowered 14 April 2005: https://www.zx.net.nz/mirror/www.alasir.com/alpha/alpha_history.html
Schein, Edgar H., DeLisi P., Kampas, Paul, and Sonduck, Michael (2004) DEC is dead, long live DEC: The lasting legacy of Digital Equipment Corporation. San Francisco, Berrett-Koehler Publishing.
Mangelsdorf, Martha (2011) ‘Lessons from Ken Olsen and Digital Equipment Corp’, MIT Sloan Management Review 17 February 2011: https://sloanreview.mit.edu/article/lessons-from-ken-olsen-and-digital-equipment-corp/
Computer History Museum (2002) ‘Oral History of Edson (Ed) D. de Castro interviewed by: Gardner Hendrie’, Recorded November 22, 2002. CHM Ref number X2722.2004:
http://archive.computerhistory.org/resources/access/text/2012/07/102702207-05-01-acc.pdf
Lécuyer, Christophe and Brock, David C. (2010) Makers of the Microchip: A Documentary History of Fairchild Semiconductor. Cambridge, Mass., The MIT Press.
Hyatt, Joshua (2003) ‘The business that time forgot: Data General is gone. But does that make its founder a failure?’ CNN Money 1 April 2003: https://money.cnn.com/magazines/fsb/fsb_archive/2003/04/01/341000/
Goodwin, D.T (2016) ‘Digital Equipment Corporation (DEC): A case study of indecision, innovation and company failure’, Unpublished thesis, University of Amsterdam. Accessible here: https://pure.uva.nl/ws/files/2790157/176138_Goodwin_complete_thesis_formatted_final.pdf
Halvorson, Michael (2020) Code nation: Personal computing and the learn to program movement in America. New York: Association for Computing Machinery.
Stanford Libraries (2020) ‘Interview with Ralph Scott: Artists’ live-work housing in San Francisco’ Oral history project. Baltimore, Md., Stanford Oral History Collections:
https://searchworks.stanford.edu/view/tn665bt0926
Evans, Claire L. (2018) Broad band: The untold story of the women who made the internet. New York, Portfolio.
Kirstein, Peter T. (1999) ‘Early experiences with the Arpanet and Internet in the United Kingdom’ Annals of the History of Computing 21, 1: 38–44.
Dick Co, AB. v Burrough Corp (1985) 617 F. Supp. 1382, ND III, U.S. District Court for the Northern District of Illinois. 10 September 1985.
Felsenstein, Lee (1993) ‘The commons of information’, Dr. Dobbs' Journal May 1993 Issue: 18–24.
Brunton, Finn (2019) Digital cash: The unknown history of the anarchists, utopians, and technologists who created cryptocurrency. Princeton, NJ., Princeton University Press
Stoll, Clifford (1989) The cuckoo’s egg: Tracking a spy through the maze of computer espionage. New York, Pocket Books.
Goodchild, Joan (2012) ‘Rogues gallery 2: Ten infamous hacks and hackers, ComputerWorld 26 May 2012: https://www.computerworld.com/article/2827265/rogues-gallery-2--ten-infamous-hacks-and-hackers.html
Hafner, Katie and Markoff, John (1995) Cyberpunk: Outlaws and hackers on the computer frontier. New York, Simon & Schuster.
Sterling, Bruce (1992) The hacker crackdown: Law and disorder on the electronic frontier. New York, Batham.
FBI (2018) ‘The Morris worm: 30 years since first major attack on the internet’, FBI News 2 November 2018.
Sutherland, Ivan E. (1964) ‘Sketch pad a man-machine graphical communication system’, Proceedings of the SHARE design automation workshop, 6.329–6346.
Harris, Blake J. (2019) The history of the future: Oculus, Facebook, and the revolution that swept virtual reality. New York, HarperBusiness
Frenkel, Karen A. (1989) ‘An interview with Ivan Sutherland’, Communications of the ACM 32, 6 June 1989.
Engelbart, Douglas C. and English, William K. (1968) ‘A research center for augmenting human intellect’ Proceedings of the December 9-11, 1968, fall joint computer conference: 395–410.
Hall, Mark (2014) ‘Douglas Engelbart’ Encyclopaedia Britannica, 4 November 2014:
https://www.britannica.com/biography/Douglas-Engelbart
Engelbart, D. (1988) ‘The augmented knowledge workshop’, A history of personal workstations ACM Digital Library: 185–248.
van Dam, Andy (2019) ‘Reflections on a half-century of hypertext’, Keynote lecture at Hypertext 2019 (29:15): https://www.youtube.com/live/g0yx-F1FGnc?feature=share&t=1755
Engelbart, Christina (2013) ‘A lifetime pursuit’ Doug Engelbart Institute:
https://dougengelbart.org/content/view/183/
Chamberlin, Donald D. (2012) ‘Early history of SQL’ Annals of the History of Computing 34, 4: Oct–Dec: 78–82.
O’Brien, Frank (2010) The Apollo Guidance Computer: Architecture and Operation. Chichester, UK, Praxis.
Saltzman, Matthew (2004) ‘Browser wars: Mozilla vs. MegaCorp’ OR/MS Today 31, 6: 8–9.
Stork, David G. (1997) HAL's Legacy: 2001's Computer As Dream and Reality. Cambridge, Mass., The MIT Press.
Foster, Ian and Kesselman, Carl (1998) The grid: Blueprint for a new computing infrastructure. Burlington, Mass., Morgan Kaufmann.
Asimov, Isaac (1942) ‘Runaround’, Astonishing Science Fiction March 1942.
Singh, Simon (2000) The code book: The science of secrecy from Ancient Egypt to quantum cryptography. New York, Anchor Books.
Kahn, David (1973) The codebreakers: The story of secret writing. New York: Macmillan.
Levy, Steven (2000) Crypto: How the code rebels beat the government – saving privacy in the digital age. New York, Penguin.
Diffie, Whitfield; Hellman, Martin E. (1977).’Exhaustive cryptanalysis of the NBS Data Encryption Standard’ Computer 10, 6: 74–84.
Rivest, R., Shamir, A. and Adleman, L (1978) ‘A method for obtaining digital signatures and public-key cryptosystems’ Communications of the ACM 21, 2: 120–126.
Levy, Steven (1999) ‘The open secret’, Wired 1 April 1999: https://www.wired.com/1999/04/crypto/
Weiss, Todd R. (2006) ‘Update: EMC to acquire RSA Security for almost $2.1B’, ComputerWorld 29 June 2006: https://www.computerworld.com/article/2545392/update--emc-to-acquire-rsa-security-for-almost--2-1b.html
Boudot, Fabrice et al. (2020) ‘Comparing the difficulty of factorization and discrete logarithm: A 240-digit experiment’ Advances in Cryptology – Crypto 2020 conference paper: 62–91.
Yan, Yuhan (2022) ‘The overview of elliptic curve cryptography (ECC)’ Journal of Physics: Conference Series vol 2386, 012019: 20 August 2022.
Bowler, Peter J. (2017) A history of the future: Prophets of progress from H.G. Wells to Isaac Asimov. Cambridge, Cambridge University Press.