A HyperNet Architecture
暂无分享,去创建一个
[1] Zongming Fei,et al. Broadcasting with Prediction and Selective Forwarding in Vehicular Networks , 2013, Int. J. Distributed Sens. Networks.
[2] 张静言. 送你一台计算机—VMware Workstation , 2001 .
[3] Jim Griffioen,et al. Network Hypervisors: Managing the Emerging SDN Chaos , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[4] George Rouskas,et al. A Composition Algorithm for the SILO Cross-Layer Optimization Service Architecture , 2007 .
[5] Jeannie R. Albrecht,et al. Managing Distributed Applications Using Gush , 2010, TRIDENTCOM.
[6] Jim Griffioen,et al. Isn't it time you had an emulab? , 2008, SIGCSE '08.
[7] Tilman Wolf,et al. Design of a Network Service Architecture , 2007, 2007 16th International Conference on Computer Communications and Networks.
[8] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[9] David Thaler,et al. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.
[10] Shufeng Huang. Supporting delay-intolerant applications , 2008, CoNEXT '08.
[11] Biswanath Mukherjee,et al. A survey of security techniques for the border gateway protocol (BGP) , 2009, IEEE Communications Surveys & Tutorials.
[12] Kenneth L. Calvert,et al. Fast-Tracking GENI Experiments Using HyperNets , 2013, 2013 Second GENI Research and Educational Experiment Workshop.
[13] D. Zeghlache,et al. Virtual Resource Description and Clustering for Virtual Network Discovery , 2009, 2009 IEEE International Conference on Communications Workshops.
[14] Kenneth L. Calvert,et al. Beyond layering: modularity considerations for protocol architectures , 1993, 1993 International Conference on Network Protocols.
[15] Dino Farinacci,et al. Generic Routing Encapsulation (GRE) , 2000, RFC.
[16] Richard M. Fujimoto,et al. The virtual machine , 1991, CARN.
[17] Ahmed Elmokashfi,et al. BGP Churn Evolution: a Perspective from the Core , 2010, 2010 Proceedings IEEE INFOCOM.
[18] C. Valli,et al. Ignorant Experts: Computer and Network Security Support from Internet Service Providers , 2010, 2010 Fourth International Conference on Network and System Security.
[19] Rajeev Rastogi,et al. Efficiently monitoring bandwidth and latency in IP networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[20] Angelos D. Keromytis,et al. Voice-over-IP Security: Research and Practice , 2010, IEEE Security & Privacy.
[21] M. Boucadair,et al. Anticipate IPv4 Address Exhaustion: A Critical Challenge for Internet Survival , 2009, 2009 First International Conference on Evolving Internet.
[22] George N. Rouskas,et al. Choice as a principle in network architecture , 2012, SIGCOMM '12.
[23] Zongming Fei,et al. HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[24] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[25] Dipankar Raychaudhuri,et al. Network service abstractions for a mobility-centric future internet architecture , 2013, MobiArch '13.
[26] Ratul Mahajan,et al. Understanding BGP misconfiguration , 2002, SIGCOMM '02.
[27] Shufeng Huang,et al. Network Hypervisors: Enhancing SDN Infrastructure , 2014, Comput. Commun..
[28] Amin Vahdat,et al. Remote Control: Distributed Application Configuration, Management, and Visualization with Plush , 2007, LISA.
[29] Kenneth L. Calvert,et al. Structuring Protocols as Data Streams , 1995 .
[30] Gang Peng,et al. CDN: Content Distribution Network , 2004, ArXiv.
[31] Anja Feldmann,et al. Internet clean-slate design: what and why? , 2007, CCRV.
[32] Steven Furnell. Remote PC Security: Securing the home worker , 2006 .
[33] Melanie Bernier,et al. An overview of cyber attack and computer network operations simulation , 2011, SpringSim.
[34] Mark Handley,et al. Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised) , 2016, RFC.
[35] George N. Rouskas,et al. The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet , 2007, 2007 IEEE International Conference on Communications.
[36] Larry L. Peterson,et al. Using PlanetLab for network research: myths, realities, and best practices , 2005, OPSR.
[37] Larry L. Peterson,et al. The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..
[38] Teunis J. Ott,et al. NXG03-6: Design and Implementation of Split TCP in the Linux Kernel , 2006, IEEE Globecom 2006.
[39] Henning Schulzrinne,et al. NetServ: dynamically deploying in-network services , 2009, ReArch '09.
[40] Leonard Barolli,et al. A Survey of Internet Mobility , 2009, 2009 International Conference on Network-Based Information Systems.
[41] Constantinos Dovrolis,et al. What would Darwin think about clean-slate architectures? , 2008, CCRV.
[42] Anja Feldmann,et al. Network virtualization architecture: proposal and initial prototype , 2009, VISA '09.
[43] Gordon T. Wilfong,et al. An analysis of BGP convergence properties , 1999, SIGCOMM '99.
[44] Jim Griffioen,et al. HyperNet games: Leveraging SDN networks to improve multiplayer online games , 2013, Proceedings of CGAMES'2013 USA.
[45] John V. Guttag,et al. ANTS: a toolkit for building and dynamically deploying network protocols , 1998, 1998 IEEE Open Architectures and Network Programming.
[46] Tilman Wolf,et al. Service-Centric End-to-End Abstractions in Next-Generation Networks , 2006, Proceedings of 15th International Conference on Computer Communications and Networks.
[47] Eric C. Rosen,et al. Multiprotocol Label Switching Architecture , 2001, RFC.
[48] 刘锋,et al. Kernel-based virtual machine事件跟踪机制的设计与实现 , 2008 .
[49] Lakshman Krishnamurthy. AQUA: an adaptive quality of service architecture for distributed multimedia applications , 1997 .
[50] Srinivasan Seshan,et al. XIA: an architecture for an evolvable and trustworthy internet , 2011, HotNets-X.