Towards an active network architecture
暂无分享,去创建一个
[1] K.M. Adams,et al. Packet reassembly during cell loss , 1993, IEEE Network.
[2] Colusa Software White Paper Omniware: A Universal Substrate for Mobile Code , 1995 .
[3] Proceedings of the 1988 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 18-21, 1988 , 1988, IEEE Symposium on Security and Privacy.
[4] Margo I. Seltzer,et al. The case for geographical push-caching , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[5] Alexandros Eleftheriadis,et al. Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.
[6] Larry L. Peterson,et al. Scout: a communications-oriented operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[7] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[8] Maurice V. Wilkes,et al. The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .
[9] Matt Blaze,et al. Dynamic hierarchical caching in large-scale distributed file systems , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.
[10] Dawson R. Engler,et al. C: a language for high-level, efficient, and machine-independent dynamic code generation , 1995, POPL '96.
[11] Dawson R. Engler,et al. Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.
[12] Huifang Sun,et al. Architectures for MPEG compressed bitstream scaling , 1995, Proceedings., International Conference on Image Processing.
[13] N. Georganas,et al. Analysis of an Atm Buuer with Self-similar("fractal") Input Traac , 1995 .
[14] Leonard Kleinrock,et al. Nomadic computing (keynote address) , 1997, Telecommun. Syst..
[15] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[16] Butler W. Lampson,et al. Virtual Infrastructure: Putting Information Infrastructure on the Technology Curve , 1996, Comput. Networks ISDN Syst..
[17] Michael B. Jones,et al. Interposition agents: transparently interposing user code at the system interface , 1994, SOSP '93.
[18] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[19] Walter Willinger,et al. Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.
[20] David A. Patterson,et al. A case for networks of workstations (now) , 1994, Symposium Record Hot Interconnects II.
[21] Nathaniel S. Borenstein,et al. EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.
[22] David D. Clark,et al. Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.
[23] Srinivasan Seshan,et al. Improving TCP/IP performance over wireless networks , 1995, MobiCom '95.
[24] F. Bonomi,et al. The rate-based flow control framework for the available bit rate ATM service , 1995, IEEE Netw..
[25] Donald Yeung,et al. The MIT Alewife machine: architecture and performance , 1995, ISCA '98.
[26] James A. Gosling,et al. The java language environment: a white paper , 1995 .
[27] David C. Feldmeier. A Data Labelling Technique for High-Performance Protocol Processing and Its Consequences , 1993, SIGCOMM.
[28] Srinivasan Seshan,et al. Software Architecture of the Infopad System , 1994 .
[29] Steven McCanne,et al. Joint source/channel coding for multicast packet video , 1995, Proceedings., International Conference on Image Processing.
[30] Luis Ferreira Pires. Introduction to LOTOS , 1992 .
[31] Mark S. Manasse,et al. The Millicent Protocols for Electronic Commerce , 1995, USENIX Workshop on Electronic Commerce.
[32] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[33] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[34] James Gosling. Java intermediate bytecodes: ACM SIGPLAN workshop on intermediate representations (IR'95) , 1995, IR '95.
[35] Larry L. Peterson,et al. A dynamic network architecture , 1992, TOCS.
[36] George C. Polyzos,et al. Filter Propagation in Dissemination Trees: Trading Off Bandwidth and Processing in Continuous Media Networks , 1993, NOSSDAV.
[37] Miguel Castro,et al. Safe and efficient sharing of persistent objects in Thor , 1996, SIGMOD '96.
[38] Karen R. Sollins,et al. Cascaded authentication , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[39] David Clark,et al. Services or infrastructure: why we need a network service model , 1994, Proceedings of lst IEEE International Workshop on Community Networking.
[40] Seth Copen Goldstein,et al. Active messages: a mechanism for integrating communication and computation , 1998, ISCA '98.
[41] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[42] GoslingJames. Java intermediate bytecodes , 1995 .
[43] V. Jacobson,et al. Congestion avoidance and control , 1988, CCRV.
[44] NetworksAllyn Romanow,et al. Dynamics of Tcp Traac over Atm Networks , 1994 .
[45] Peter B. Danzig,et al. A Hierarchical Internet Object Cache , 1996, USENIX ATC.
[46] Steven McCanne,et al. An application level video gateway , 1995, MULTIMEDIA '95.
[47] David D. Clark,et al. The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.
[48] Sally Floyd,et al. Dynamics of TCP Traffic over ATM Networks , 1995, IEEE J. Sel. Areas Commun..
[49] Liuba Shrira,et al. Distributed Object Management in Thor , 1992, IWDOM.
[50] L TennenhouseDavid,et al. Towards an active network architecture , 1996 .