-
4
-
-
84974692146
-
A System Architecture for Pervasive Computing
-
September
-
R. Grimm, T. Anderson, B. Bershad, and D. Wetherall. A System Architecture for Pervasive Computing. In Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark, pages 177-182, September 2000.
-
(2000)
Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark
, pp. 177-182
-
-
Grimm, R.1
Anderson, T.2
Bershad, B.3
Wetherall, D.4
-
6
-
-
77954513859
-
-
ISI. RAToolSet. http://www.isi.edu/ra/RAToolSet/, 2001.
-
(2001)
RAToolSet
-
-
-
7
-
-
0033652343
-
Delayed Internet Routing Convergence
-
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet Routing Convergence. In Proceedings of ACM SIGCOMM 2000, pages 175-187, 2000.
-
(2000)
Proceedings of ACM SIGCOMM 2000
, pp. 175-187
-
-
Labovitz, C.1
Ahuja, A.2
Bose, A.3
Jahanian, F.4
-
8
-
-
77954490887
-
Observations on the dynamic evolution of peer-to-peer networks
-
D. Liben-Nowell, H. Balakrishnan, and D. Karger. Observations on the dynamic evolution of peer-to-peer networks. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March 2002.
-
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March 2002
-
-
Liben-Nowell, D.1
Balakrishnan, H.2
Karger, D.3
-
10
-
-
77954492981
-
-
T. Mercury Project. http://www.cs.mu.oz.au/research/mercury, 1996.
-
(1996)
T. Mercury Project
-
-
-
11
-
-
0036577771
-
Automatic discovery of rules for predicting network management events
-
May
-
M. N. nez, R. Morales, and F. Triguero. Automatic discovery of rules for predicting network management events. IEEE Journal on Selected Areas in Communications, 20(4):736-745, May 2002.
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.4
, pp. 736-745
-
-
Nez, M.N.1
Morales, R.2
Triguero, F.3
-
12
-
-
0032636223
-
Xenoservers: Accounted Execution of Untrusted Code
-
D. Reed, I. Pratt, P. Menage, S. Early, and N. Stratford. Xenoservers: Accounted Execution of Untrusted Code. In Proceedings of the fifth Workshop on Hot Topics in Operating Systems (HotOS-VII), 1999.
-
Proceedings of the Fifth Workshop on Hot Topics in Operating Systems (HotOS-VII), 1999
-
-
Reed, D.1
Pratt, I.2
Menage, P.3
Early, S.4
Stratford, N.5
-
13
-
-
77954499098
-
-
RIPE. RPSL
-
RIPE. RPSL. http://www.ripe.net/ripencc/pub-services/db/irrtoolset/ documentation/, 2000.
-
(2000)
-
-
-
14
-
-
0033651982
-
Routing Stability in Congested Networks: Experimentation and Analysis
-
A. Shaikh, L. Kalampoukas, R. Dube, and A. Varma. Routing Stability in Congested Networks: Experimentation and Analysis. In Proceedings of ACM SIGCOMM 2000, pages 163-174, 2000.
-
(2000)
Proceedings of ACM SIGCOMM 2000
, pp. 163-174
-
-
Shaikh, A.1
Kalampoukas, L.2
Dube, R.3
Varma, A.4
-
15
-
-
77954499097
-
-
Technical Report MS-CIS-97-03, University of Pennsylvania, February
-
J. S. Shapiro, S. J. Muir, J. M. Smith, and D. J. Farber. Operating System Support for Active Networks. Technical Report MS-CIS-97-03, University of Pennsylvania, February 1997.
-
(1997)
Operating System Support for Active Networks
-
-
Shapiro, J.S.1
Muir, S.J.2
Smith, J.M.3
Farber, D.J.4
-
16
-
-
77954485682
-
-
The Nessus Project. http://www.nessus.org/intro.html, 2000.
-
(2000)
The Nessus Project
-
-
|