On the Suitability of Composable Services for the Assurable Future Internet
暂无分享,去创建一个
Rudra Dutta | Ilia Baldine | George Rouskas | Daniel Stevenson | Douglas Reeves | I. Baldine | R. Dutta | G. Rouskas | D. Stevenson | D. Reeves
[1] Gordon V. Cormack,et al. Spam and the ongoing battle for the inbox , 2007, CACM.
[2] David S Alberts,et al. Network Centric Warfare: Developing and Leveraging Information Superiority , 1999 .
[3] Petri Mähönen,et al. TCP performance issues over wireless links , 2001, IEEE Commun. Mag..
[4] Injong Rhee,et al. Binary increase congestion control (BIC) for fast long-distance networks , 2004, IEEE INFOCOM 2004.
[5] Yunnan Wu,et al. Network planning in wireless ad hoc networks: a cross-Layer approach , 2005, IEEE Journal on Selected Areas in Communications.
[6] Lun Li,et al. Cross-layer optimization in TCP/IP networks , 2005, IEEE/ACM Transactions on Networking.
[7] Shyhtsun Felix Wu,et al. An experimental study of insider attacks for OSPF routing protocol , 1997, Proceedings 1997 International Conference on Network Protocols.
[8] William E. Riddle,et al. Software technology maturation , 1985, ICSE '85.
[9] Shyhtsun Felix Wu,et al. Intrusion Detection for Link-State Routing Protocols , 1997 .
[10] Sally Floyd,et al. HighSpeed TCP for Large Congestion Windows , 2003, RFC.
[11] Suresh Singh,et al. M-TCP: TCP for mobile cellular networks , 1997, CCRV.
[12] George N. Rouskas,et al. A Unified Software Architecture to Enable Cross-Layer Design in the Future Internet , 2007, 2007 16th International Conference on Computer Communications and Networks.
[13] Sridhar Iyer,et al. Cross-layer feedback architecture for mobile device protocol stacks , 2006, IEEE Communications Magazine.
[14] Clive Davidson,et al. Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .
[15] M. Motani,et al. Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.
[16] Andrea J. Goldsmith,et al. Cross-Layer Design for Lifetime Maximization in Interference-Limited Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[17] David D. Clark,et al. Tussle in cyberspace: defining tomorrow's Internet , 2002, IEEE/ACM Transactions on Networking.
[18] Shyhtsun Felix Wu,et al. JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Proto , 1999 .
[19] Liviu Iftode,et al. Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments , 1994, IEEE J. Sel. Areas Commun..
[20] David D. Clark,et al. Tussle in cyberspace: defining tomorrow's internet , 2005, TNET.
[21] Cheng Jin,et al. FAST TCP: Motivation, Architecture, Algorithms, Performance , 2006, IEEE/ACM Transactions on Networking.
[22] Christian Bonnet,et al. CrossTalk: cross-layer decision support based on global knowledge , 2006, IEEE Communications Magazine.
[23] George N. Rouskas,et al. The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet , 2007, 2007 IEEE International Conference on Communications.
[24] David D. Clark,et al. The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.
[25] Byron Anderson. Net Neutrality , 2007 .
[26] Mark Handley,et al. Congestion control for high bandwidth-delay product networks , 2002, SIGCOMM.
[27] Darren Reed,et al. Security Considerations for IP Fragment Filtering , 1995, RFC.