Thompson, Ken, "Reflections on Trusting Trust," Turing Award Lecture, Communications of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. http://cm.bell-labs.com/who/ken/trust.htmlShowed that one cannot trust a program if any tool used in creating it is not trusted.
Ritchie, D. M. and K. Thompson, “The Unix Time-sharing System,” Bell System Technical Journal, Vol. 57 Num. 6, Part 2 (July-August 1978); also Communications of the ACM, Vol. 17, No. 7, July, 1974, pp. 365-375; also Fourth ACM Symposium on Operating Systems Principles, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, October 15-17, 1973. http://cm.bell-labs.com/cm/cs/who/dmr/cacm.html (BSTJ version) The classic paper that introduced Unix.
Dennis M. Ritchie, “The Unix Time-sharing System--A Retrospective,” Tenth Hawaii International Conference on the System Sciences, Honolulu, January, 1977. http://cm.bell-labs.com/cm/cs/who/dmr/retro.htmlAn historical retrospective.
Dennis M. Ritchie, “The Evolution of the Unix Time-sharing System,” Language Design and Programming Methodology Conference, Sydney, Australia, September 1979; also Lecture Notes in Computer Science #79: Language Design and Programming Methodology, Springer-Verlag, 1980; also AT&T Bell Laboratories Technical Journal, Vol. 63 No. 6 Part 2, October 1984, pp. 1577-1593. http://cm.bell-labs.com/cm/cs/who/dmr/hist.html (BSTJ version) An historical retrospective.
Kernighan, Brian W. and Dennis M. Ritchie, The C Programming Language, Second Edition, Prentice Hall, Inc., 1988. ISBN 0-13-110362-8 (paperback), 0-13-110370-9 (hardback). http://cm.bell-labs.com/cm/cs/cbook/index.htmlThe classical description of the C language.
John Lions, A Commentary on the Unix Operating System, 1976.. Course notes for Lions' University of New South Wales Department of Computer Science courses 6.602B and 6.657G. Accompanied by "Unix Operating System Source Code Level Six," an edited version of the Unix Sixth Edition source code. Widely redistributed by photocopy in the late 70s and early 80s. Republished in 1996 by Peer-To-Peer Communications (ISBN 1-57398-013-7)
R. Pike and D. Presotto and S. Dorward and R. Flandrena and K. Thompson and H. Trickey and P. Winterbottom, "Plan 9 from Bell Labs," Computing Systems, Vol. 8, Num. 3, pp. 221--254, Summer 1995. http://doc.cat-v.org/plan_9/4th_edition/papers/9An overview of Plan 9.
Sean Dorward, Rob Pike, David Leo Presotto, Dennis M. Ritchie, Howard Trickey and Phil Winterbottom, “The Inferno Operating System,” Bell Labs Technical Journal, Vol. 2, No. 1, Winter 1997, pp. 5-18. http://www.vitanuova.com/inferno/papers/bltj.htmlDescribes Inferno, which was originally intended as a product, and is now available as free software.
D. Ritchie, “Ken, Unix, and Games,” ICGA Journal, Vol. 24 No. 2, June 2001. http://cm.bell-labs.com/cm/cs/who/dmr/ken-games.htmlA special issue mostly devoted to various articles about Ken Thompson's contributions to computer chess.
Seibel, Peter, Coders at Work, 2009, ISBN 9781430219484 Transcript of an interview with Ken Thompson