Литмир - Электронная Библиотека

BOGGS, D., MOGUL, J., and KENT, C.: “Measured Capacity of an Ethernet: Myths and Reality,’’ Proc. SIGCOMM ’88 Conf., ACM, pp. 222-234, 1988.

BORISOV, N., GOLDBERG, I., and WAGNER, D.: “Intercepting Mobile Communications: The Insecurity of 802.11,” Seventh Int’l Conf. on Mobile Computing and Networking, ACM, pp. 180188, 2001.

BRADEN, R.: “Requirements for Internet Hosts—Communication Layers,’’ RFC 1122, Oct. 1989.

BRADEN, R., BORMAN, D., and PARTRIDGE, C.: “Computing the Internet Checksum,’’ RFC 1071, Sept. 1988.

BRANDENBURG, K.: “MP3 and AAC Explained,’’ Proc. 17th Intl. Conf.: High-Quality Audio Coding, Audio Engineering Society, pp. 99-110, Aug. 1999.

BRAY, T,, PAOLI, J., SPERBERG-MCQUEEN, C., MALER, E, YERGEAU, F., and COWAN J.: “Extensible Markup Language (XML) 1.1 (Second Edition),’’ W3C Recommendation, Sept. 2006.

BRESLAU, L., CAO, P., FAN, L., PHILLIPS, G., and SHENKER, S.: “Web Caching and Zipf-like Distributions: Evidence and Implications,” Proc. INFOCOM Conf., IEEE, pp. 126-134, 1999.

BURLEIGH, S., HOOKE, A., TORGERSON, L., FALL, K., CERF, V., DURST, B., SCOTT, K., and WEISS, H.: “Delay-Tolerant Networking: An Approach to Interplanetary Internet,’’ IEEE Commun. Magazine, vol. 41, pp. 128-136, June 2003.

BURNETT, S., and PAINE, S.: RSA Security’s Official Guide to Cryptography, Berkeley, CA: Osborne/ McGraw-Hill, 2001.

BUSH, V.: ‘As We May Think,’’ Atlantic Monthly, vol. 176, pp. 101-108, July 1945.

CAPETANAKIS, J.I.: “Tree Algorithms for Packet Broadcast Channels,” IEEE Trans, on Information Theory, vol. IT-25, pp. 505-515, Sept. 1979.

CASTAGNOLI, G., BRAUER, S., and HERRMANN, M.: “Optimization of Cyclic Redundancy-Check Codes with 24 and 32 Parity Bits,’’ IEEE Trans. on Commun., vol. 41, pp. 883-892, June 1993.

CERF, V., and KAHN, R.: ‘A Protocol for Packet Network Interconnection,” IEEE Trans, on Commun., vol. COM-22, pp. 637-648, Way 1974.

CHANG, F., DEAN, J., GHEMAWAT, S., HSIEH, W., WALLACH, D., BURROWS, M., CHANDRA, T., FIKES, A., and GRUBER, R.: “Bigtable: A Distributed Storage System for Structured Data,’’ Proc. OSDI 2006 Symp., USENIX, pp. 15-29, 2006.

CHASE, J.S., GALLATIN, A.J., and YOCUM, K.G.: “End System Optimizations for High-Speed TCP,” IEEE Commun. Magazine, vol. 39, pp. 68-75, April 2001.

CHEN, S., andNAHRSTEDT, K.: “An Overview of QoS Routing for Next-Generation Networks,’’ IEEE Network Magazine, vol. 12, pp. 64-69, Nov./Dec. 1998.

CHIU, D., andJAIN, R.: “Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks,’’ Comput. Netw. ISDN Syst., vol. 17, pp. 1-4, June 1989.

CISCO: “Cisco Visual Networking Index: Forecast and Methodology, 2009-2014,’’ Cisco Systems Inc., June 2010.

CLARK, D.D.: “The Design Philosophy of the DARPA Internet Protocols,” Proc. SIGCOMM ‘88 Conf., ACM, pp. 106-114, 1988.

CLARK, D.D.: “Window and Acknowledgement Strategy in TCP,” RFC 813, July 1982.

CLARK, D.D., JACOBSON, V., ROMKEY, J., and SAL WEN, H.: “An Analysis of TCP Processing Overhead,” IEEE Commun. Magazine, vol. 27, pp. 23-29, June 1989.

CLARK, D.D., SHENKER, S., and ZHANG, L.: “Supporting Real-Time Applications in an Integrated Services Packet Network,’’ Proc. SIGCOMM ’92 Conf., ACM, pp. 14-26, 1992.

CLARKE, A.C.: “Extra-Terrestrial Relays,” Wireless World, 1945.

CLARKE, I., MILLER, S.G., HONG, T.W., SANDBERG, O., and WILEY, B.: “Protecting Free Expression Online with Freenet,” IEEE Internet Computing, vol. 6, pp. 40-49, Jan.-Feb. 2002.

COHEN, B.: “Incentives Build Robustness in BitTorrent,’’ Proc. First Workshop on Economics of Peer-to-Peer Systems, June 2003.

COMER, D.E.: The Internet Book, 4th ed., Englewood Cliffs, NJ: Prentice Hall, 2007.

COMER, D.E.: Internetworking with TCP/IP, vol. 1, 5th ed., Englewood Cliffs, NJ: Prentice Hall,

2005.

CRAVER, S.A., WU, M., LIU, B., STUBBLEFIELD, A., SWARTZLANDER, B., WALLACH, D.W., DEAN, D., andFELTEN, E.W.: “Reading Between the Lines: Lessons from the SDMI Challenge,” Proc. 10th USENIX Security Symp., USENIX, 2001.

CROVELLA, M., andKRISHNAMURTHY, B.: Internet Measurement, New York: John Wiley & Sons,

2006.

DAEMEN, J., and RIJMEN, V.: The Design of Rijndael, Berlin: Springer-Verlag, 2002.

DALAL, Y., and METCLFE, R.: “Reverse Path Forwarding of Broadcast Packets,’’ Commun. of the ACM, vol. 21, pp. 1040-1048, Dec. 1978.

DAVIE, B., and FARREL, A.: MPLS: Next Steps, San Francisco: Morgan Kaufmann, 2008.

DAVIE, B., andREKHTER, Y.: MPLS Technology and Applications, San Francisco: Morgan Kaufmann, 2000.

DAVIES, J.: Understanding IPv6, 2nd ed., Redmond, WA: Microsoft Press, 2008.

DAY, J.D.: “The (Un)Revised OSI Reference Model,” Computer Commun. Rev., vol. 25, pp. 39-55, Oct. 1995.

DAY, J.D., andZIMMERMANN, H.: “The OSI Reference Model,” Proc. of the IEEE, vol. 71, pp. 13341340, Dec. 1983.

DECANDIA, G., HASTORIN, D., JAMPANI, M., KAKULAPATI, G., LAKSHMAN, A., PILCHIN, A., SIVASUBRAMANIAN, S., VOSSHALL, P, and VOGELS, W.: “Dynamo: Amazon’s Highly Available Key-value Store,’’ Proc. 19th Symp. on Operating Systems Prin., ACM, pp. 205-220, Dec. 2007. DEERING, S.E.: “SIP: Simple Internet Protocol,” IEEE Network Magazine, vol. 7, pp. 16-28, May/ June 1993.

DEERING, S., and CHERITON, D.: “Multicast Routing in Datagram Networks and Extended LANs,’’ ACM Trans. on Computer Systems, vol. 8, pp. 85-110, May 1990.

DEMERS, A., KESHAV, S., and SHENKER, S.: ‘Analysis and Simulation of a Fair Queue-ing Algorithm,” Internetwork: Research and Experience, vol. 1, pp. 3-26, Sept. 1990.

DENNING, D.E., and SACCO, G.M.: “Timestamps in Key Distribution Protocols,” Commun. of the ACM, vol. 24, pp. 533-536, Aug. 1981.

DEVARAPALLI, V., WAKIKAWA, R., PETRESCU, A., and THUBERT, P.: “Network Mobility (NEMO) Basic Support Protocol,’’ RFC 3963, Jan. 2005.

DIFFIE, W., andHELLMAN, M.E.: “Exhaustive Cryptanalysis of the NBS Data Encryption Standard,’’ IEEE Computer, vol. 10, pp. 74-84, June 1977.

DIFFIE, W., and HELLMAN, M.E.: “New Directions in Cryptography,” IEEE Trans, on Information Theory, vol. IT-2, pp. 644-654, Nov. 1976.

DIJKSTRA, E.W.: ‘A Note on Two Problems in Connexion with Graphs,” Numer. Math., vol. 1, pp. 269-271, Oct. 1959.

DILLEY, J, MAGGS, B., PARIKH, J, PROKOP, H., SITARAMAN, R., and WHEIL, B.: “Globally Distributed Content Delivery,’’ IEEE Internet Computing, vol. 6, pp. 50-58, 2002. DINGLEDINE, R.., MATHEWSON, N., SYVERSON, P: “Tor: The Second-Generation Onion Router,’’ Proc. 13th USENIX Security Symp., USENIX, pp. 303-320, Aug. 2004.

DONAHOO, M., and CALVERT, K.: TCP/IP Sockets in C, 2nd ed., San Francisco: Morgan Kaufmann, 2009.

DONAHOO, M., and CALVERT, K.: TCP/IP Sockets in Java, 2nd ed., San Francisco: Morgan Kaufmann, 2008.

DONALDSON, G., and JONES, D.: “Cable Television Broadband Network Architectures,” IEEE Commun. Magazine, vol. 39, pp. 122-126, June 2001.

DORFMAN, R.: “Detection of Defective Members of a Large Population,” Annals Math. Statistics, vol. 14, pp. 436-440, 1943.

DUTCHER, B.: The NAT Handbook, New York: John Wiley&Sons, 2001.

DUTTA-ROY, A.: “An Overview of Cable Modem Technology and Market Perspectives,” IEEE Commun. Magazine, vol. 39, pp. 81-88, June 2001.

EDELMAN, B., OSTROVSKY, M., and SCHWARZ, M.: “Internet Advertising and the Generalized Second-Price Auction: Selling Billions of Dollars Worth of Keywords,’’ American Economic Review, vol. 97, pp. 242-259, Mar. 2007.

314
{"b":"639789","o":1}