Tussle in cyberspace: defining tomorrow's internet
暂无分享,去创建一个
[1] Thomas E. Anderson,et al. Protocol design in an uncooperative internet , 2002 .
[2] David D. Clark,et al. Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..
[3] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[4] Yakov Rekhter,et al. EGP and policy based routing in the new NSFNET backbone , 1989, RFC.
[5] William A. Wulf,et al. Policy/mechanism separation in Hydra , 1975, SOSP.
[6] Dominique Vinck,et al. Everyday Engineering. An ethnography of Design and Innovation , 2003 .
[7] Clayton M. Christensen. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .
[8] R. Westrum. The Social Construction of Technological Systems , 1989 .
[9] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[10] Kristin Braa,et al. Technology as traitor: emergent SAP infrastructure in a global organization , 1998, ICIS '98.
[11] Xiaowei Yang,et al. NIRA: a new Internet routing architecture , 2003, FDNA '03.
[12] L. McKnight,et al. Internet economics , 1997 .
[13] Kenneth G. Binmore,et al. Essays on Foundations of Game Theory , 1982 .
[14] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[15] Joseph Farrell,et al. Choosing How to Compete: Strategies and Tactics in Standardization , 1994 .
[16] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[17] M. Callon. Techno-economic Networks and Irreversibility , 1990 .
[18] Joan Feigenbaum,et al. Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.
[19] Jim Boyle,et al. Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .
[20] S. Woolgar. Configuring the User: The Case of Usability Trials , 1990 .
[21] Noam Nisan,et al. Algorithmic Mechanism Design , 2001, Games Econ. Behav..
[22] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[23] C. Shapiro,et al. Systems Competition and Network Effects , 1994 .
[24] Robert Tappan Morris,et al. Resilient overlay networks , 2001, SOSP.
[25] N. Economides. The economics of networks , 1996 .
[26] B. Latour. Technology is Society Made Durable , 1990 .
[27] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[28] Kirk Lougheed,et al. Border Gateway Protocol (BGP) , 2021, IP Routing Protocols.
[29] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[30] W. Lehr. Compatibility Standards And Industry Competition: Two Case Studies , 1996 .
[31] Stefan Savage,et al. TCP congestion control with a misbehaving receiver , 1999, CCRV.
[32] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[33] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[34] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[35] D. Edge,et al. The social shaping of technology , 1988 .