-
1
-
-
0032066141
-
A secure active network architecture: Realization in SwitchWare
-
May/June
-
D. S. Alexander et al., "A secure active network architecture: Realization in SwitchWare," IEEE Network, (Special issue on Active and Programmable Networks), vol. 12, pp. 37-45, May/June 1998.
-
(1998)
IEEE Network, (Special Issue on Active and Programmable Networks)
, vol.12
, pp. 37-45
-
-
Alexander, D.S.1
-
2
-
-
0032183845
-
Safety and security of programmable network infrastructures
-
Oct.
-
D. S. Alexander et al., "Safety and security of programmable network infrastructures," IEEE Commun. Mag., (Special issue on Programmable Networks), vol. 36, pp. 84-92, Oct. 1998.
-
(1998)
IEEE Commun. Mag., (Special Issue on Programmable Networks)
, vol.36
, pp. 84-92
-
-
Alexander, D.S.1
-
3
-
-
84889192555
-
A secure active network environment architecture
-
Pennsylvania Univ., Nov.
-
D. S. Alexander et al., "A secure active network environment architecture," Technical Report MS-CIS-97-17, Pennsylvania Univ., Nov. 1997.
-
(1997)
Technical Report MS-CIS-97-17
-
-
Alexander, D.S.1
-
4
-
-
84878579140
-
The architecture of ALIEN
-
Proc. 1st International Working Conf. Active Networks (IWAN'99), July
-
D. S. Alexander and J. M. Smith, "The architecture of ALIEN," in Proc. 1st International Working Conf. Active Networks (IWAN'99), Lecture Notes in Computer Science, July 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Alexander, D.S.1
Smith, J.M.2
-
5
-
-
0041983970
-
RCANE: A resource controlled framework for active network services
-
Lecture Notes in Computer Science, July
-
P. Menage, "RCANE: A resource controlled framework for active network services," in Proc. 1st International Working Conf. Active Networks (IWAN'99), Lecture Notes in Computer Science, July 1999.
-
(1999)
Proc. 1st International Working Conf. Active Networks (IWAN'99)
-
-
Menage, P.1
-
6
-
-
0032178221
-
Best-effort versus reservations: A simple comparative analysis
-
Sept.
-
L. Breslau and S. Shenker, "Best-effort versus reservations: A simple comparative analysis," in Proc. ACM SIGCOMM, vol. 28, Sept. 1998.
-
(1998)
Proc. ACM SIGCOMM
, vol.28
-
-
Breslau, L.1
Shenker, S.2
-
7
-
-
85013350011
-
Wide-area traffic: The failure of poisson modeling
-
Sept.
-
V. Paxson and S. Floyd, "Wide-area traffic: The failure of poisson modeling," in Proc. ACM SIGCOMM, vol. 24, Sept. 1994, pp. 257-268.
-
(1994)
Proc. ACM SIGCOMM
, vol.24
, pp. 257-268
-
-
Paxson, V.1
Floyd, S.2
-
8
-
-
85013591309
-
On the self-similar nature of ethernet traffic
-
Sept.
-
W. E. Leland et al., "On the self-similar nature of Ethernet traffic," in Proc. ACM SIGCOMM, vol. 23, Sept. 1993, pp. 183-193.
-
(1993)
Proc. ACM SIGCOMM
, vol.23
, pp. 183-193
-
-
Leland, W.E.1
-
9
-
-
0003917549
-
Explaining world wide web traffic self-similarity
-
Boston Univ., Aug.
-
M. Crovella and A. Bestavros, "Explaining world wide web traffic self-similarity," Technical Report 95-015. Boston Univ., Aug. 1995.
-
(1995)
Technical Report 95-015
-
-
Crovella, M.1
Bestavros, A.2
-
10
-
-
0012022036
-
Scout: A communications-oriented operating system
-
Department of Computer Science, Arizona Univ., June
-
A. B. Montz et al., "Scout: A communications-oriented operating system," Technical Report, Department of Computer Science, Arizona Univ., June 1994.
-
(1994)
Technical Report
-
-
Montz, A.B.1
-
11
-
-
0030244801
-
The design and implementation of an operating system to support distributed multimedia applications
-
Sept.
-
I. M. Leslie et al., "The design and implementation of an operating system to support distributed multimedia applications," IEEE J. Select. Areas Commun., vol. 14, pp. 1280-1297, Sept. 1996.
-
(1996)
IEEE J. Select. Areas Commun.
, vol.14
, pp. 1280-1297
-
-
Leslie, I.M.1
-
12
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
May
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A secure and reliable bootstrap architecture," in Proc. IEEE Symposium on Security and Privacy, May 1997, pp. 65-71.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
14
-
-
0003508568
-
Data encryption standard
-
U.S. Department of Commerce, Jan.
-
"Data encryption standard," Technical Report FIPS-46, U.S. Department of Commerce, Jan. 1977.
-
(1977)
Technical Report FIPS-46
-
-
-
15
-
-
84957806781
-
Secure hash standard
-
U.S. Department of Commerce, Apr. 1995. Also known as: 59 Fed Reg 35317
-
"Secure hash standard," Technical Report FIPS-180-1, U.S. Department of Commerce, Apr. 1995. Also known as: 59 Fed Reg 35317, 1994.
-
(1994)
Technical Report FIPS-180-1
-
-
-
16
-
-
0003508562
-
Digital signature standard
-
U.S. Department of Commerce, May
-
"Digital signature standard," Technical Report FIPS-186, U.S. Department of Commerce, May 1994.
-
(1994)
Technical Report FIPS-186
-
-
-
19
-
-
0004241428
-
NodeOS interface specification
-
Jan. Draft
-
L. Peterson, (ed.), "NodeOS interface specification," AN Node OS Working Group, Jan. 2000. Draft.
-
(2000)
AN Node OS Working Group
-
-
Peterson, L.1
-
20
-
-
0032631515
-
PLANet: An active internetwork
-
Mar.
-
M. Hicks et al., "PLANet: An active internetwork," in Proc. IEEE INFOCOM'99, Mar. 1999.
-
(1999)
Proc. IEEE INFOCOM'99
-
-
Hicks, M.1
-
21
-
-
84983308848
-
ANTS: A toolkit for building and dynamically deploying network protocols
-
Apr.
-
D. J. Wetherall, J. Guttag, and D. L. Tennenhouse, "ANTS: A toolkit for building and dynamically deploying network protocols," in Proc. OPENARCH'98, Apr. 1998.
-
(1998)
Proc. OPENARCH'98
-
-
Wetherall, D.J.1
Guttag, J.2
Tennenhouse, D.L.3
-
22
-
-
84974687699
-
Scheduling algorithms for multiprogramming in a hard real-time environment
-
Feb.
-
C. Liu and J. Layland, "Scheduling algorithms for multiprogramming in a hard real-time environment," J. ACM, vol. 20, pp. 46-61, Feb. 1973.
-
(1973)
J. ACM
, vol.20
, pp. 46-61
-
-
Liu, C.1
Layland, J.2
-
23
-
-
0024889726
-
Analysis and simulation of a fair queueing algorithm
-
Sept.
-
A Demers, S. Keshav, and S. Shenker, "Analysis and simulation of a fair queueing algorithm," in Proc. ACM SIGCOMM, vol. 19, Sept. 1989, pp. 1-12.
-
(1989)
Proc. ACM SIGCOMM
, vol.19
, pp. 1-12
-
-
Demers, A.1
Keshav, S.2
Shenker, S.3
-
26
-
-
0041081898
-
A web navigator with applets in Caml
-
May
-
F. Rouaix, "A web navigator with applets in Caml," Fifth WWW Conf., May 1996. Available at http://pauillac.inria.fr/mmm/papers/mmm.ps.gz.
-
(1996)
Fifth WWW Conf.
-
-
Rouaix, F.1
-
29
-
-
0347470584
-
Fail-stop protocols: An approach to designing secure protocols
-
Sept.
-
L. Gong and P. Syverson, "Fail-stop protocols: An approach to designing secure protocols," in Proc. IFIP DCCA-5, Sept. 1995.
-
(1995)
Proc. IFIP DCCA-5
-
-
Gong, L.1
Syverson, P.2
-
30
-
-
0004601832
-
Photuris: Session-key management protocol
-
Mar.
-
P. Karn and W. Simpson, "Photuris: Session-key management protocol," RFC 2522, Mar. 1999.
-
(1999)
RFC 2522
-
-
Karn, P.1
Simpson, W.2
-
31
-
-
4544387815
-
Internet security association and key management protocol (ISAKMP)
-
June
-
D. Maughan et al., "Internet security association and key management protocol (ISAKMP)," Internet Draft, IPSEC Working Group, June 1996.
-
(1996)
Internet Draft, IPSEC Working Group
-
-
Maughan, D.1
-
33
-
-
0039302747
-
Application-allocated I/O buffering with system-allocated performance
-
Carnegie Mellon Univ., Pittsburgh, PA., Aug.
-
J. C. Brustoloni and P. Steenkiste, "Application-allocated I/O buffering with system-allocated performance," Technical Report CMU-CS-96-169, Carnegie Mellon Univ., Pittsburgh, PA., Aug. 1996.
-
(1996)
Technical Report CMU-CS-96-169
-
-
Brustoloni, J.C.1
Steenkiste, P.2
-
35
-
-
0023367454
-
Garbage collection can be faster than stack allocation
-
June
-
A. W. Appel, "Garbage collection can be faster than stack allocation," Information Processing Lett., vol. 25, pp. 275-279. June 1987.
-
(1987)
Information Processing Lett.
, vol.25
, pp. 275-279
-
-
Appel, A.W.1
-
36
-
-
0017956645
-
List processing in real-time on a serial computer
-
H. G. Baker, "List processing in real-time on a serial computer," Commun. ACM, vol. 21, no. 4, pp. 280-94, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.4
, pp. 280-294
-
-
Baker, H.G.1
-
41
-
-
0001982732
-
A survey of active network research
-
Jan.
-
D. L. Tennenhouse et al., "A survey of active network research," IEEE Commun. Mag., pp. 80-86, Jan. 1997.
-
(1997)
IEEE Commun. Mag.
, pp. 80-86
-
-
Tennenhouse, D.L.1
-
42
-
-
0344614688
-
Activating networks: A progress report
-
Apr.
-
J. M. Smith et al., "Activating networks: A progress report," IEEE Computer, vol. 32, pp. 32-41, Apr. 1999.
-
(1999)
IEEE Computer
, vol.32
, pp. 32-41
-
-
Smith, J.M.1
-
43
-
-
35248883200
-
Extending a capability based system into a network environment
-
Aug.
-
R. D. Sansom, D. P. Julin, and R. F. Rashid, "Extending a capability based system into a network environment," in Proc. ACM SIGCOMM, Aug. 1986.
-
(1986)
Proc. ACM SIGCOMM
-
-
Sansom, R.D.1
Julin, D.P.2
Rashid, R.F.3
|