-
1
-
-
84858913467
-
-
Akamai Technologies Inc. Edgesuite services, http://www.akamai.com/html/en/sv/ edgesuite_over.html.
-
-
-
-
2
-
-
0001061636
-
An active service framework and its application to real-time multimedia transcoding
-
Aug.
-
E. Amir, S. McCanne, and R. Katz. An Active Service Framework and its Application to Real-time Multimedia Transcoding. Proc. of the SIGCOMM'98, Aug. 1998.
-
(1998)
Proc. of the SIGCOMM'98
-
-
Amir, E.1
McCanne, S.2
Katz, R.3
-
4
-
-
0029516756
-
Network objects
-
Dec
-
A. Birrell, G. Nelson, S. Owicki, and E. Wobber. Network objects. Software-Practice and Experience, pp. 25(S4):87-130, Dec 1995.
-
(1995)
Software-practice and Experience
, vol.25
, Issue.S4
, pp. 87-130
-
-
Birrell, A.1
Nelson, G.2
Owicki, S.3
Wobber, E.4
-
6
-
-
4544348737
-
The state-on-demand execution for adaptive component-based mobile agent systems
-
July
-
Y. Chow, W. Zhu, C. Wang, and F. C. Lau. The state-on-demand execution for adaptive component-based mobile agent systems. Proc. of ICPADS, July 2004.
-
(2004)
Proc. of ICPADS
-
-
Chow, Y.1
Zhu, W.2
Wang, C.3
Lau, F.C.4
-
8
-
-
84858918871
-
-
Dicom standard, http://medical.nema.org.
-
-
-
-
10
-
-
0003629991
-
-
FIPS 180-1, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, Apr.
-
FIPS 180-1, Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, Apr. 1995.
-
(1995)
Secure Hash Standard
-
-
-
11
-
-
0032138638
-
Adapting to network and client variation using infrastructural proxies: Lessons and prospectives
-
Aug.
-
A. Fox, S. Gribble, Y. Chawathe, and E. A. Brewer. Adapting to Network and Client Variation Using Infrastructural Proxies: Lessons and Prospectives. IEEE Personal Communication, Aug. 1998, http://www.cs.washington.edu/ homes/gribble/papers/adapt.ps.zip.
-
(1998)
IEEE Personal Communication
-
-
Fox, A.1
Gribble, S.2
Chawathe, Y.3
Brewer, E.A.4
-
12
-
-
0031542278
-
Cluster-based scalable network services
-
Oct.
-
A. Fox, S. Gribble, Y. Chawathe, E. A. Brewer, and P. Gauthier. Cluster-based Scalable Network Services. Proc. of the 16th ACM Symp. on Operating Systems Principles, Oct. 1997.
-
(1997)
Proc. of the 16th ACM Symp. on Operating Systems Principles
-
-
Fox, A.1
Gribble, S.2
Chawathe, Y.3
Brewer, E.A.4
Gauthier, P.5
-
14
-
-
84945272430
-
CANS: Composable, adaptive network services infrastructure
-
Mar.
-
X. Fu, W. Shi, A. Akkerman, and V. Karamcheti. CANS: Composable, Adaptive Network Services Infrastructure. Proc. of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS'01), pp. 135-146, Mar. 2001.
-
(2001)
Proc. of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS'01)
, pp. 135-146
-
-
Fu, X.1
Shi, W.2
Akkerman, A.3
Karamcheti, V.4
-
16
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
L. Gong et al. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. Proc. Usenix Symp. Internet Technologies and Systems, Usenix Assn., 1997.
-
(1997)
Proc. Usenix Symp. Internet Technologies and Systems, Usenix Assn.
-
-
Gong, L.1
-
19
-
-
4544290903
-
Nwslite: A light-weight prediction utility for mobile devices
-
Jun
-
S. Gurun, C. Krintz, and R. Wolski. Nwslite: A light-weight prediction utility for mobile devices. Proc. of MobiSys'04, Jun 2004.
-
(2004)
Proc. of MobiSys'04
-
-
Gurun, S.1
Krintz, C.2
Wolski, R.3
-
20
-
-
84858923171
-
-
Gzip tool, http://www.gzip.org.
-
Gzip Tool
-
-
-
23
-
-
84883544068
-
Rovera toolkit for mobile information access
-
Dec
-
A. D. Joseph, A. F. deLespinasse, J. Tauber, D. Gifford, and M. F. Kaashoek. Rovera toolkit for mobile information access. Proc. of the 15th ACM Symposium on Operating Systems Principles, pp. 156-171, Dec 1995.
-
(1995)
Proc. of the 15th ACM Symposium on Operating Systems Principles
, pp. 156-171
-
-
Joseph, A.D.1
DeLespinasse, A.F.2
Tauber, J.3
Gifford, D.4
Kaashoek, M.F.5
-
25
-
-
0023960862
-
Fine-grained mobility in the emerald system
-
Feb
-
E. Jul, H. Levy, N. Hutchinson, and A. Black. Fine-grained mobility in the emerald system. ACM Transactions on Computer Systems, pp. 6(1):109-133, Feb 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 109-133
-
-
Jul, E.1
Levy, H.2
Hutchinson, N.3
Black, A.4
-
28
-
-
33746276267
-
-
Ldap (v3) revision, 2004, http://www.ietf.org/ ids.by.wg/ldapbis.html.
-
(2004)
Ldap (V3) Revision
-
-
-
33
-
-
0000880275
-
Adapting multimedia internet content for universal access
-
Mar.
-
R. Mohan, J. R. Simth, and C. Li. Adapting Multimedia Internet Content for Universal Access. IEEE Transactions on Multimedia 1(1):104-114, Mar. 1999.
-
(1999)
IEEE Transactions on Multimedia
, vol.1
, Issue.1
, pp. 104-114
-
-
Mohan, R.1
Simth, J.R.2
Li, C.3
-
35
-
-
0004131498
-
-
P. Neumann, editor. Addison Wesley
-
P. Neumann, editor. Computer Related Risks. Addison Wesley, 1995.
-
(1995)
Computer Related Risks
-
-
-
36
-
-
0004263197
-
-
Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May
-
B. D. Noble. Mobile Data Access. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1998, http://mobility.eecs.umich.edu/ papers/diss.pdf.
-
(1998)
Mobile Data Access
-
-
Noble, B.D.1
-
40
-
-
84858913469
-
-
Planetlab, http://planet-lab.org/.
-
-
-
-
41
-
-
21644443831
-
Upgrading transport protocols using untrusted mobile code
-
Oct
-
P.Patel, A.Whitaker, D.Wetherall, J.Lepreau, and T.Stack. Upgrading transport protocols using untrusted mobile code. Proc. of the 19th ACM Symposium on Operating Systems Principles, pp. 1-14, Oct 2003.
-
(2003)
Proc. of the 19th ACM Symposium on Operating Systems Principles
, pp. 1-14
-
-
Patel, P.1
Whitaker, A.2
Wetherall, D.3
Lepreau, J.4
Stack, T.5
-
42
-
-
0003676885
-
Fingerprinting by random polynomials
-
Harvard Aiken Computation laboratory
-
M. O. Rabin. Fingerprinting by random polynomials. Tech. Rep. TR-15-81, Harvard Aiken Computation laboratory, 1981.
-
(1981)
Tech. Rep.
, vol.TR-15-81
-
-
Rabin, M.O.1
-
43
-
-
84943547553
-
Pond: The oceanstore prototype
-
Apr.
-
S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz. Pond: The oceanstore prototype. Proc. of the 2nd USENIX Conf. On File and Storage Technologies, pp. 1-14, Apr. 2003.
-
(2003)
Proc. of the 2nd USENIX Conf. on File and Storage Technologies
, pp. 1-14
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
44
-
-
0033651715
-
A protocol independent technique for eliminating redundant network traffic
-
Aug.
-
N. T. Spring and D. Wetherall. A protocol independent technique for eliminating redundant network traffic. Proc. of ACM SIGCOMM'00, pp. 87-95, Aug. 2000.
-
(2000)
Proc. of ACM SIGCOMM'00
, pp. 87-95
-
-
Spring, N.T.1
Wetherall, D.2
-
45
-
-
85084161003
-
Transformer tunnels: A framework for providing route-specific adaptations
-
June
-
P. Sudame and B. Badrinath. Transformer Tunnels: A Framework for Providing Route-Specific Adaptations. Proc. of the USENIX Technical Conf., June 1998.
-
(1998)
Proc. of the USENIX Technical Conf.
-
-
Sudame, P.1
Badrinath, B.2
-
46
-
-
0034986779
-
On providing support for protocol adaptation in mobile wireless networks
-
P. Sudame and B. Badrinath. On providing support for protocol adaptation in mobile wireless networks. Mobile Networks and Applications (MONET) 6(1):43-55, 2001.
-
(2001)
Mobile Networks and Applications (MONET)
, vol.6
, Issue.1
, pp. 43-55
-
-
Sudame, P.1
Badrinath, B.2
-
48
-
-
0030124838
-
Towards an active network architecture
-
Apr.
-
D. Tennenhouse and D. Wetherall. Towards an Active Network Architecture. Computer Communications Review 26(2), Apr. 1996, http://www.tns.lcs.mit.edu/ publications/ccr96.html.
-
(1996)
Computer Communications Review
, vol.26
, Issue.2
-
-
Tennenhouse, D.1
Wetherall, D.2
-
49
-
-
4544350243
-
Opportunistic use of content addressable storage for distributed file systems
-
June
-
N. Tolia, M. Kozuch, M. Satyanarayanan, B. Karp, t. Bressoud, and a. Perrig. Opportunistic use of content addressable storage for distributed file systems. Proc. of the USENIX 2003 Annual Technical Conf, June 2003.
-
(2003)
Proc. of the USENIX 2003 Annual Technical Conf
-
-
Tolia, N.1
Kozuch, M.2
Satyanarayanan, M.3
Karp, B.4
Bressoud, T.5
Perrig, A.6
-
50
-
-
0003570191
-
The rsync algorithm
-
Department of Computer Science, Australian National University
-
P. Tridgell and P. Mackerras. The rsync algorithm. Tech. Rep. TR-CS-96-05, Department of Computer Science, Australian National University, 1996.
-
(1996)
Tech. Rep.
, vol.TR-CS-96-05
-
-
Tridgell, P.1
Mackerras, P.2
-
53
-
-
85091097467
-
Reliability and security in the codeen content distribution network
-
Jun
-
L. Wang, K. Park, R. Pang, V. Pai, and L. Peterson. Reliability and security in the codeen content distribution network. Proceedings of USENIX Annual Conference, Jun 2004.
-
(2004)
Proceedings of USENIX Annual Conference
-
-
Wang, L.1
Park, K.2
Pang, R.3
Pai, V.4
Peterson, L.5
-
56
-
-
0004215022
-
Conductor: Distributed adaptation for complex networks
-
Mar.
-
M. Yarvis, A. Wang, A. Rudenko, P. Reiher, and G. J. Popek. Conductor: Distributed Adaptation for complex Networks. Proc. of the Seventh Workshop on Hot Topics in Operating Systems, Mar. 1999, http://lasr.cs.ucla.edu/ reiher/papers/yarvis.ps.
-
(1999)
Proc. of the Seventh Workshop on Hot Topics in Operating Systems
-
-
Yarvis, M.1
Wang, A.2
Rudenko, A.3
Reiher, P.4
Popek, G.J.5
|