-
4
-
-
24644522168
-
-
A. Adya, W. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment, 2002.
-
(2002)
Farsite: Federated, Available, and Reliable Storage for An Incompletely Trusted Environment
-
-
Adya, A.1
Bolosky, W.2
Castro, M.3
Chaiken, R.4
Cermak, G.5
Douceur, J.6
Howell, J.7
Lorch, J.8
Theimer, M.9
Wattenhofer, R.10
-
5
-
-
51849086263
-
Servartuka: Dynamic distribution of state to improve SIP server scalability
-
June
-
V. Balasubramaniyan, A. Acharya, M. Ahamad, M. Srivatsa, I. Dacosta, and C. Wright. SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability. Distributed Computing Systems, 2008. ICDCS '08. The 28th International Conference on, pages 562-572, June 2008.
-
(2008)
Distributed Computing Systems, 2008. ICDCS '08. The 28th International Conference on
, pp. 562-572
-
-
Balasubramaniyan, V.1
Acharya, A.2
Ahamad, M.3
Srivatsa, M.4
Dacosta, I.5
Wright, C.6
-
7
-
-
84937538476
-
Improving SSL handshake performance via batching
-
D. Boneh and H. Shacham. Improving SSL Handshake Performance via Batching. In RSA '2001, Lecture Notes in Computer Science, Vol. 2020, Springer-Verlag, pages pp. 28-43, 2001.
-
(2001)
Lecture Notes in Computer Science, Vol. 2020, Springer-Verlag
, pp. 28-43
-
-
Boneh, D.1
Shacham, H.2
-
8
-
-
33645374909
-
On SIP performance
-
M. Cortes, J. R. Ensor, and J. O. Esteban. On SIP Performance. Bell Labs Technical Journal, 9(3):155-172, 2004.
-
(2004)
Bell Labs Technical Journal
, vol.9
, Issue.3
, pp. 155-172
-
-
Cortes, M.1
Ensor, J.R.2
Esteban, J.O.3
-
9
-
-
50949130867
-
Towards stateless core: Improving SIP proxy scalability
-
M. Cortes, J. O. Esteban, and H. Jun. Towards Stateless Core: Improving SIP Proxy Scalability. In Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE, pages 1-6, 2006.
-
(2006)
Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE
, pp. 1-6
-
-
Cortes, M.1
Esteban, J.O.2
Jun, H.3
-
11
-
-
0013194031
-
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. RFC 2617: HTTP authentication: Basic and digest access authentication, 1999.
-
(1999)
RFC 2617: HTTP Authentication: Basic and Digest Access Authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
12
-
-
4243899804
-
Keeping the lifelines open
-
September
-
L. Guernsey. Keeping the Lifelines Open. The New York Times, http://www.nytimes.com/2001/09/20/technology/circuits/20INFR.html, September 2001.
-
(2001)
The New York Times
-
-
Guernsey, L.1
-
13
-
-
51849109609
-
-
Master's Thesis, Department of Computer Science, Czech Technical University, Prague, Czech
-
J. Janak. Sip proxy server effectiveness. Master's Thesis, Department of Computer Science, Czech Technical University, Prague, Czech, 2003.
-
(2003)
Sip Proxy Server Effectiveness
-
-
Janak, J.1
-
14
-
-
33750029023
-
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
-
J. Kim, A. Biryukov, B. Preneel, and S. Hong. On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In Security and Cryptography for Networks, 2006.
-
(2006)
Security and Cryptography for Networks
-
-
Kim, J.1
Biryukov, A.2
Preneel, B.3
Hong, S.4
-
16
-
-
0030672061
-
Applying queuing theory to optimizing the performance of enterprise software applications
-
Computer Measurement Group; 2006
-
H. Liu. Applying Queuing Theory to Optimizing the Performance of Enterprise Software Applications. In CMG-CONFERENCE-, volume 1, page 457. Computer Measurement Group; 1997, 2006.
-
(1997)
CMG-CONFERENCE
, vol.1
, pp. 457
-
-
Liu, H.1
-
20
-
-
77953795465
-
Inauguration crowd will test cellphone networks
-
M. Richtel. Inauguration Crowd Will Test Cellphone Networks. The New York Times, http://www.nytimes.com/2009/01/19/technology/19cell.html, 2009.
-
(2009)
The New York Times
-
-
Richtel, M.1
-
21
-
-
0037984544
-
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. RFC 3261: SIP: Session Initiation Protocol, 2002.
-
(2002)
RFC 3261: SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
22
-
-
0036870280
-
SIP security issues: The SIP authentication procedure and its processing load
-
S. Salsano, L. Veltri, and D. Papalilo. SIP security issues: the SIP authentication procedure and its processing load. Network, IEEE, 16(6):38-44, 2002.
-
(2002)
Network, IEEE
, vol.16
, Issue.6
, pp. 38-44
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
24
-
-
57349090290
-
Session Initiation Protocol (SIP) server overload control: Design and evaluation
-
C. Shen, H. Schulzrinne, and E. Nahum. Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation. In IPTComm 2008, pages 149-173.
-
IPTComm 2008
, pp. 149-173
-
-
Shen, C.1
Schulzrinne, H.2
Nahum, E.3
-
28
-
-
85084161766
-
Scalability in the xfs file system
-
Berkeley, CA, USA, USENIX Association
-
A. Sweeney, D. Doucette, W. Hu, C. Anderson, M. Nishimoto, and G. Peck. Scalability in the xfs file system. In ATEC '96: Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, pages 1-1, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
ATEC '96: Proceedings of the 1996 Annual Conference on USENIX Annual Technical Conference
, pp. 1-1
-
-
Sweeney, A.1
Doucette, D.2
Hu, W.3
Anderson, C.4
Nishimoto, M.5
Peck, G.6
-
29
-
-
33745179728
-
How to break MD5 and other hash functions
-
X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In Proceedings of EUROCRYPT, 2005.
-
(2005)
Proceedings of EUROCRYPT
-
-
Wang, X.1
Yu, H.2
|