-
2
-
-
0003872064
-
An architecture for differentiated services
-
IETFRFC 2475, December
-
S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss. An Architecture for Differentiated Services. Technical report, IETFRFC 2475, December 1998.
-
(1998)
Technical Report
-
-
Blake, S.1
Black, D.2
Carlson, M.3
Davies, E.4
Wang, Z.5
Weiss, W.6
-
5
-
-
84967701397
-
The design philosophy of the DARRA internet protocols
-
D. D. Clark. The Design Philosophy of the DARRA Internet Protocols. In Proceedings of ACM SIGCOMM, pages 106-114, 1988.
-
(1988)
Proceedings of ACM SIGCOMM
, pp. 106-114
-
-
Clark, D.D.1
-
6
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
F. Dabek, M. F. Kaashoek, R. Morris, D. Karger, and I. Stoica. Wide-Area Cooperative Storage with CFS. In Proceedings of ACM SOSP, 2001.
-
(2001)
Proceedings of ACM SOSP
-
-
Dabek, F.1
Kaashoek, M.F.2
Morris, R.3
Karger, D.4
Stoica, I.5
-
8
-
-
0003252383
-
Generic routing encapsulation (GRE)
-
Internet Engineering Task Force, Mar.
-
D. Farinacci, T. Li, S. Hanks, D. Meyer, and P. Traina. Generic routing encapsulation (GRE). Request for Comments 2784, Internet Engineering Task Force, Mar. 2000.
-
(2000)
Request for Comments
, vol.2784
-
-
Farinacci, D.1
Li, T.2
Hanks, S.3
Meyer, D.4
Traina, P.5
-
13
-
-
0034449536
-
Implementing a distributed firewall
-
November
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith. Implementing a Distributed Firewall. In Proceedings of Computer and Communications Security (CCS), pages 190-199, November 2000.
-
(2000)
Proceedings of Computer and Communications Security (CCS)
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
14
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relievig hot spots on the world wide web
-
May
-
D. Karger, E. Lehman, F. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent Hashing and Random Trees: Distributed Caching Protocols for Relievig Hot Spots on the World Wide Web. In Proceedings of ACM Symposium on Theory of Computing (STOC), pages 654-663, May 1997.
-
(1997)
Proceedings of ACM Symposium on Theory of Computing (STOC)
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, F.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
15
-
-
0003068282
-
Security architecture for the internet protocol
-
Internet Engineering Task Force, Nov.
-
S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. Request for Comments (Proposed Standard) 2401, Internet Engineering Task Force, Nov. 1998.
-
(1998)
Request for Comments (Proposed Standard)
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
19
-
-
0003205663
-
IP encapsulation within IP
-
Internet Engineering Task Force, Oct.
-
C. Perkins. IP encapsulation within IP. Request for Comments 2003, Internet Engineering Task Force, Oct. 1996.
-
(1996)
Request for Comments
, vol.2003
-
-
Perkins, C.1
-
20
-
-
0032074579
-
Anonymous connections and onion routing
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Special Areas in Communications, 16(4):482-494, 1998.
-
(1998)
IEEE Journal on Special Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
22
-
-
84976845043
-
End-to-end arguments in System Design
-
November
-
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in System Design. ACM Transactions on Computer Systems, 2(4):277-288, November 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
23
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
October
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP Congestion Control with a Misbehaving Receiver. ACM Computer Communications Review, 29(5):71-78, October 1999.
-
(1999)
ACM Computer Communications Review
, vol.29
, Issue.5
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
24
-
-
0035361712
-
Network support for IP traceback
-
June
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network Support for IP Traceback. ACM/IEEE Transactions on Networking, 9(3):226-237, June 2001.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
25
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
May
-
C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, and D. Zamboni. Analysis of a Denial of Service Attack on TCP. In Proceedings of IEEE Security and Privacy, pages 208-223, May 1997.
-
(1997)
Proceedings of IEEE Security and Privacy
, pp. 208-223
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
26
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM, 2001.
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
|