How to model an internetwork
暂无分享,去创建一个
Ellen W. Zegura | Kenneth L. Calvert | Samrat Bhattacharjee | E. Zegura | S. Bhattacharjee | K. Calvert
[1] Béla Bollobás,et al. Random Graphs , 1985 .
[2] BERNARD M. WAXMAN,et al. Routing of multipoint connections , 1988, IEEE J. Sel. Areas Commun..
[3] David D. Clark,et al. Policy routing in Internet protocols , 1989, RFC.
[4] J. J. Garcia-Luna-Aceves,et al. Dynamics of distributed shortest-path routing algorithms , 1991, SIGCOMM '91.
[5] J. J. Garcia-Luna-Aceves,et al. Dynamics of distributed shortest-path routing algorithms , 1991, SIGCOMM '91.
[6] Carey L. Williamson. Optimizing file transfer response time using the loss-load curve congestion control mechanism , 1993, SIGMETRICS '93.
[7] Dinesh C. Verma,et al. Routing reserved bandwith multi-point connections , 1993, SIGCOMM 1993.
[8] Deepinder P. Sidhu,et al. Open shortest path first (OSPF) routing protocol simulation , 1993, SIGCOMM 1993.
[9] Donald E. Knuth,et al. The Stanford GraphBase - a platform for combinatorial computing , 1993 .
[10] Optimizing File Transfer Response Time Using the Loss-Load Curve Congestion Control Mechanism , 1993, SIGMETRICS.
[11] Deepinder Sidhu,et al. Open shortest path first (OSPF) routing protocol simulation , 1993, SIGCOMM '93.
[12] Ian M. Leslie,et al. How bad is naive multicast routing? , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.
[13] L. Wei,et al. The trade-offs of multicast trees and algorithms , 1994 .
[14] Antonio DeSimone,et al. Controlling Alternate Routing in General-Mesh Packet Flow Networks , 1994, SIGCOMM.
[15] Scott Shenker,et al. Asymptotic resource consumption in multicast reservation styles , 1994, SIGCOMM 1994.
[16] J. J. Garcia-Luna-Aceves,et al. Distributed, scalable routing based on link-state vectors , 1994, SIGCOMM 1994.
[17] L. Peterson,et al. TCP Vegas: new techniques for congestion detection and avoidance , 1994, SIGCOMM.
[18] J. J. Garcia-Luna-Aceves,et al. Distributed, scalable routing based on link-state vectors , 1994, SIGCOMM.
[19] D. Estrin,et al. The Trade o s of Multicast Trees and Algorithms , 1994 .
[20] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.