Литмир - Электронная Библиотека

JOEL, A.: “Telecommunications and the IEEE Communications Society,” IEEE Commun. Magazine, 50th Anniversary Issue, pp. 6-14 and 162-167, May 2002.

JOHNSON, D., PERKINS, C, and ARKKO, J.: “Mobility Support in IPv6,’’ RFC 3775, June 2004.

JOHNSON, D.B., MALTZ, D., and BROCH, J.: “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks,’’ Ad Hoc Networking, Boston: Addison-Wesley, pp. 139-172, 2001.

JUANG, P., OKI, H., WANG, Y., MARTONOSI, M., PEH, L., and RUBENSTEIN, D.: “Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet,’’ SIGOPS Oper. Syst. Rev., vol. 36, pp. 96-107, Oct. 2002.

KAHN, D.: The Codebreakers, 2nd ed., New York: Macmillan, 1995.

KAMOUN, F., andKLEINROCK, L.: “Stochastic Performance Evaluation of Hierarchical Routing for Large Networks,” Computer Networks, vol. 3, pp. 337-353, Nov. 1979.

KARN, P.: “MACA—A New Channel Access Protocol for Packet Radio,” ARRL/CRRL Amateur Radio Ninth Computer Networking Conf., pp. 134-140, 1990.

KARN, P, and PARTRIDGE, C.: “Improving Round-Trip Estimates in Reliable Transport Protocols,’’ Proc. SIGCOMM ’87 Conf., ACM, pp. 2-7, 1987.

KARP, B., and KUNG, H.T.: “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,’’ Proc. MOBICOM 2000 Conf., ACM, pp. 243-254, 2000.

KASIM, A.: Delivering Carrier Ethernet, New York: McGraw-Hill, 2007.

KATABI, D., HANDLEY, M., and ROHRS, C.: “Internet Congestion Control for Future High Bandwidth-Delay Product Environments,’’ Proc. SIGCOMM 2002 Conf., ACM, pp. 89-102, 2002.

KATZ, D., and FORD, P.S.: “TUBA: Replacing IP with CLNP,” IEEE Network Magazine, vol. 7, pp. 38-47, May/June 1993.

KAUFMAN, C., PERLMAN, R.., andSPECINER, M.: Network Security, 2nd ed., Engle-wood Cliffs, NJ: Prentice Hall, 2002.

KENT, C., and MOGUL, J.: “Fragmentation Considered Harmful,’’ Proc. SIGCOMM ’87 Conf., ACM, pp. 390-401, 1987.

KERCKHOFF, A.: “La Cryptographic Militaire,” J. des Sciences Militaires, vol. 9, pp. 5-38, Jan. 1883 and pp. 161-191, Feb. 1883.

KHANNA, A., andZINKY, J.: “The Revised ARPANET Routing Metric,’’ Proc. SIGCOMM ’89 Conf., ACM, pp. 45-56, 1989.

KIPNIS, J.: “Beating the System: Abuses of the Standards Adoptions Process,” IEEE Commun. Magazine, vol. 38, pp. 102-105, July 2000.

KLEINROCK, L.: “Power and Other Deterministic Rules of Thumb for Probabilistic Problems in Computer Communications,’’ Proc. Intl. Conf. on Commun., pp. 43.1.1-43.1.10, June 1979.

KLEINROCK, L., and TOBAGI, F.: “Random Access Techniques for Data Transmission over Packet-Switched Radio Channels,” Proc. Nat. Computer Conf., pp. 187-201, 1975.

KOHLER, E., HANDLEY, H., and FLOYD, S.: “Designing DCCP: Congestion Control without Reliability,” Proc. SIGCOMM 2006 Conf., ACM, pp. 27-38, 2006.

KOODLI, R., and PERKINS, C.E.: Mobile Inter-networking with IPv6, New York: John Wiley & Sons, 2007.

KOOPMAN, P.: “32-Bit Cyclic Redundancy Codes for Internet Applications,” Proc. Intl. Conf. on Dependable Systems and Networks., IEEE, pp. 459-472, 2002.

KRISHNAMURTHY, B., and REXFORD, J.: Web Protocols and Practice, Boston: Addison-Wesley, 2001.

KUMAR, S., PAAR, C., PELZL, J, PFEIFFER, G., and SCHIMMLER, M.: “Breaking Ciphers with COPACOBANA: A Cost-Optimized Parallel Code Breaker,’’ Proc. 8th Cryptographic Hardware and Embedded Systems Wksp., IACR, pp. 101-118, Oct. 2006.

LABOVITZ, C., AHUJA, A., BOSE, A., andJAHANIAN, F.: “Delayed Internet Routing Convergence,” IEEE/ACM Trans. on Networking, vol. 9, pp. 293-306, June 2001.

LAM, C.K.M., and TAN, B.C.Y.: “The Internet Is Changing the Music Industry,” Commun. of the ACM, vol. 44, pp. 62-66, Aug. 2001.

LAOUTARIS, N., SMARAGDAKIS, G., RODRIGUEZ, P., andSUNDARAM, R.: “Delay Tolerant Bulk Data Transfers on the Internet,’’ Proc. SIGMETRICS 2009 Conf., ACM, pp. 229-238, June 2009.

LARMO, A., LINDSTROM, M., MEYER, M., PELLETIER, G., TORSNER, J, and WIEMANN, H.: “The LTE Link-Layer Design,’’ IEEE Commun. Magazine, vol. 47, pp. 52-59, Apr. 2009.

LEE, J.S., and MILLER, L.E.: CDMA Systems Engineering Handbook, London: Artech House, 1998.

LELAND, W., TAQQU, M, WILLINGER, W., and WILSON, D.: “On the Self-Similar Nature of Ethernet Traffic,’’ IEEE/ACM Trans. on Networking, vol. 2, pp. 1-15, Feb. 1994.

LEMON, J.: “Resisting SYN Flood DOS Attacks with a SYN Cache,’’ Proc. BSDCon Conf., USENIX, pp. 88-98, 2002.

LEVY, S.: “Crypto Rebels,’’ Wired, pp. 54-61, May/June 1993.

LEWIS, M.: Comparing, Designing, and Deploying VPNs, Indianapolis, IN: Cisco Press, 2006.

LI, M, AGRAWAL, D, GANESAN, D, and VENKATARAMANI, A.: “Block-Switched Networks: A New Paradigm for Wireless Transport,’’ Proc. NSDI 2009 Conf., USENIX, pp. 423-436, 2009.

LIN, S., and COSTELLO, D.: Error Control Coding, 2nd ed., Upper Saddle River, NJ: Pearson Education, 2004.

LUBACZ, J, MAZURCZYK, W., and SZCZYPIORSKI, K.: “Vice over IP,” IEEE Spectrum, pp. 42-47, Feb. 2010.

MACEDONIA, M.R.: “Distributed File Sharing,’’ IEEE Computer, vol. 33, pp. 99-101, 2000.

MADHAVAN, J, KO, D., LOT, L., GANGPATHY, V., RASMUSSEN, A., andHALEVY, A.: “Google’s Deep Web Crawl,’’ Proc. VLDB 2008 Conf., VLDB Endowment, pp. 1241-1252, 2008.

MAHAJAN, R., RODRIG, M., WETHERALL, D., and ZAHORJAN, J.: ‘Analyzing the MAC-Level Behavior of Wireless Networks in the Wild,’’ Proc. SIGCOMM 2006 Conf., ACM, pp. 75-86, 2006.

MALIS, A., and SIMPSON, W.: “PPP over SONET/SDH,’’ RFC 2615, June 1999.

MASSEY, J.L.: “Shift-Register Synthesis and BCH Decoding,’’ IEEE Trans. on Information Theory, vol. IT-5, pp. 122-127, Jan. 1969.

MATSUI, M.: “Linear Cryptanalysis Method for DES Cipher,’’ Advances in Cryptology— Eurocrypt 1993 Proceedings, Berlin: Springer-Verlag LNCS 765, pp. 386-397, 1994.

MAUFER, T.A.: IP Fundamentals, Upper Saddle River, NJ: Prentice Hall, 1999.

MAYMOUNKOV, P, and MAZIERES, D.: “Kademlia: A Peer-to-Peer Information System Based on the XOR Metric,’’ Proc. First Intl. Wksp. on Peer-to-Peer Systems, Berlin: Springer-Verlag LNCS 2429, pp. 53-65, 2002.

MAZIERES, D., and KAASHOEK, M.F.: “The Design, Implementation, and Operation of an Email Pseudonym Server,’’ Proc. Fifth Conf. on Computer and Commun. Security, ACM, pp. 27-36, 1998.

MCAFEE LABS: McAfee Threat Reports: First Quarter 2010, McAfee Inc., 2010.

MENEZES, A.J., and VANSTONE, S.A.: “Elliptic Curve Cryptosystems and Their Implementation,’’ Journal of Cryptology, vol. 6, pp. 209-224, 1993.

MERKLE, R.C., and HELLMAN, M.: “Hiding and Signatures in Trapdoor Knapsacks,’’ IEEE Trans. on Information Theory, vol. IT-4, pp. 525-530, Sept. 1978.

METCALFE, R.M.: “Computer/Network Interface Design: Lessons from Arpanet and Ethernet,’’ IEEE J. on Selected Areas in Commun., vol. 11, pp. 173-179, Feb. 1993.

METCALFE, R.M., and BOGGS, D.R.: “Ethernet: Distributed Packet Switching for Local Computer Networks,” Commun. of the ACM, vol. 19, pp. 395-404, July 1976.

METZ, C.: “Interconnecting ISP Networks,” IEEE Internet Computing, vol. 5, pp. 74-80, Mar.-Apr. 2001.

MISHRA, P.P., KANAKIA, H, and TRIPATHI, S.: “On Hop by Hop Rate-Based Congestion Control,’’ IEEE/ACM Trans. on Networking, vol. 4, pp. 224-239, Apr. 1996.

MOGUL,J.C.: “IP Network Performance,” in Internet System Handbook, D.C. Lynch and M.T. Rose (eds.), Boston: Addison-Wesley, pp. 575-675, 1993.

MOGUL, J., and DEERING, S.: “Path MTU Discovery,’’ RFC 1191, Nov. 1990.

MOGUL, J., and MINSHALL, G.: “Rethinking the Nagle Algorithm,’’ Comput. Commun. Rev., vol. 31, pp. 6-20, Jan. 2001.

316
{"b":"639789","o":1}