-
1
-
-
84876271711
-
-
Alterpoint. http://www.alterpoint.com/.
-
-
-
-
2
-
-
84876272236
-
-
BerkeleyDB. http://www.oracle.com/database/berkeley-db.html.
-
BerkeleyDB
-
-
-
4
-
-
84876222179
-
-
Consentry. http://www.consentry.com/.
-
-
-
-
7
-
-
84876279106
-
-
home page
-
Netfpga home page. http://NetFPGA.org.
-
-
-
-
8
-
-
84876242273
-
-
home page
-
Openwrt home page. http://openwrt.org/.
-
-
-
-
9
-
-
0035015894
-
Using multiple hash functions to improve ip lookups
-
Apr.
-
A. Z. Broder and M. Mitzenmacher. Using multiple hash functions to improve ip lookups. In Proc. INFOCOM, Apr. 2001.
-
(2001)
Proc. INFOCOM
-
-
Broder, A.Z.1
Mitzenmacher, M.2
-
10
-
-
33645774409
-
The cutting edge of ip router configuration
-
D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalm-tysson, and J. Rexford. The cutting edge of ip router configuration. SIGCOMM Computer Comm. Rev., 2004.
-
(2004)
SIGCOMM Computer Comm. Rev.
-
-
Caldwell, D.1
Gilbert, A.2
Gottlieb, J.3
Greenberg, A.4
Hjalm-Tysson, G.5
Rexford, J.6
-
11
-
-
33645774409
-
The cutting edge of ip router configuration
-
D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalm-tysson, and J. Rexford. The cutting edge of ip router configuration. SIGCOMM Computer Comm. Rev., 34(1):21-26, 2004.
-
(2004)
SIGCOMM Computer Comm. Rev.
, vol.34
, Issue.1
-
-
Caldwell, D.1
Gilbert, A.2
Gottlieb, J.3
Greenberg, A.4
Hjalm-Tysson, G.5
Rexford, J.6
-
12
-
-
44249126961
-
SANE: A protection architecture for enterprise networks
-
Aug.
-
M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker. SANE: A protection architecture for enterprise networks. In USENIX Security Symposium, Aug. 2006.
-
(2006)
USENIX Security Symposium
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.J.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
13
-
-
20444469606
-
A new approach to dynamic all pairs shortest paths
-
C. Demetrescu and G. Italiano. A new approach to dynamic all pairs shortest paths. In Proc. STOC'03, 2003.
-
(2003)
Proc. STOC'03
-
-
Demetrescu, C.1
Italiano, G.2
-
14
-
-
33750037341
-
A clean slate 4D approach to network control and management
-
Oct.
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. In SIGCOMM Computer Comm. Rev., Oct. 2005.
-
(2005)
SIGCOMM Computer Comm. Rev.
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
17
-
-
33749467476
-
Rethinking the service model: Scaling ethernet to a million nodes
-
Nov.
-
A. Myers, E. Ng, and H. Zhang. Rethinking the service model: Scaling ethernet to a million nodes. In Proc. HotNets, Nov. 2004.
-
(2004)
Proc. HotNets
-
-
Myers, A.1
Ng, E.2
Zhang, H.3
-
18
-
-
0029734753
-
Flow labelled IP: A connectionless approach to ATM
-
P. Newman, T. L. Lyon, and G. Minshall. Flow labelled IP: A connectionless approach to ATM. In INFOCOM (3), 1996.
-
(1996)
INFOCOM
, Issue.3
-
-
Newman, P.1
Lyon, T.L.2
Minshall, G.3
-
19
-
-
84878700321
-
A first look at modern enterprise traffic
-
Oct.
-
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A first look at modern enterprise traffic. In Proc. Internet Measurement Conference, Oct. 2005.
-
(2005)
Proc. Internet Measurement Conference
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
-
20
-
-
8344256495
-
Rbridges: Transparent routing
-
Mar.
-
R. J. Perlman. Rbridges: Transparent routing. In Proc. INFOCOM, Mar. 2004.
-
(2004)
Proc. INFOCOM
-
-
Perlman, R.J.1
-
21
-
-
36949009170
-
Network-wide decision making: Toward a wafer-thin control plane
-
Nov.
-
J. Rexford, A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, G. Xie, J. Zhan, and H. Zhang. Network-wide decision making: Toward a wafer-thin control plane. In Proc. HotNets, Nov. 2004.
-
(2004)
Proc. HotNets
-
-
Rexford, J.1
Greenberg, A.2
Hjalmtysson, G.3
Maltz, D.A.4
Myers, A.5
Xie, G.6
Zhan, J.7
Zhang, H.8
-
22
-
-
33645775020
-
Predicate routing: Enabling controlled networking
-
T. Roscoe, S. Hand, R. Isaacs, R. Mortier, and P. Jardetzky. Predicate routing: Enabling controlled networking. SIG-COMM Computer Comm. Rev., 33(1), 2003.
-
(2003)
SIG-COMM Computer Comm. Rev.
, vol.33
, Issue.1
-
-
Roscoe, T.1
Hand, S.2
Isaacs, R.3
Mortier, R.4
Jardetzky, P.5
-
23
-
-
3042539179
-
The use and usability of direction-based filtering in firewalls
-
A. Wool. The use and usability of direction-based filtering in firewalls. Computers & Security, 26(6):459-468, 2004.
-
(2004)
Computers & Security
, vol.26
, Issue.6
-
-
Wool, A.1
-
24
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
A. Wool. A quantitative study of firewall configuration errors. IEEE Computer, 37(6):62-67, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
-
-
Wool, A.1
-
25
-
-
14944363872
-
Routing design in operational networks: A look from the inside
-
Sept.
-
G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, and G. Hjalmtysson. Routing design in operational networks: A look from the inside. In Proc. SIGCOMM, Sept. 2004.
-
(2004)
Proc. SIGCOMM
-
-
Xie, G.1
Zhan, J.2
Maltz, D.A.3
Zhang, H.4
Greenberg, A.5
Hjalmtysson, G.6
|