-
2
-
-
0002832388
-
Active Networks: Applications, Security, Safety, and Architectures
-
Psounis, K.: Active Networks: Applications, Security, Safety, and Architectures. IEEE Communications Surveys. http://www.comsoc.org/pubs/surveys (1999)
-
(1999)
IEEE Communications Surveys
-
-
Psounis, K.1
-
3
-
-
84937443839
-
Proc. 1st Int. Working Conference on Active Networks (IWAN’99)
-
(ed.), Springer-Verlag, Berlin Heidelberg New York
-
Covaci, S. (ed.): Proc. 1st Int. Working Conference on Active Networks (IWAN’99). Lecture Notes on Computer Science, Vol. 1653. Springer-Verlag, Berlin Heidelberg New York (1999)
-
(1999)
Lecture Notes on Computer Science
, vol.1653
-
-
Covaci, S.1
-
4
-
-
0032178368
-
An Active Service Framework and its Application to Real-time Multimedia Transcoding
-
Amir, E., McCanne, S., Katz, R.: An Active Service Framework and its Application to Real-time Multimedia Transcoding. Computer Communication Review 28(4), 1998
-
(1998)
Computer Communication Review
, vol.28
, Issue.4
-
-
Amir, E.1
McCanne, S.2
Katz, R.3
-
5
-
-
0003743998
-
Active Network Encapsulation Protocol (ANEP)
-
Alexander, D.S., et al.: Active Network Encapsulation Protocol (ANEP). RFC draft (1997)
-
(1997)
RFC Draft
-
-
Alexander, D.S.1
-
6
-
-
0032165431
-
Security at the Internet Layer
-
Oppliger, R.: Security at the Internet Layer. IEEE Computer Magazine 31(9), 1998
-
IEEE Computer Magazine
, vol.31
, Issue.9
, pp. 1998
-
-
Oppliger, R.1
-
7
-
-
0034187128
-
Protection and Interoperability for Mobile Agents: A Secure and Open Programming Environment. IEICE Transactions on Communications
-
Bellavista, P., Corradi, A., Stefanelli, C.: Protection and Interoperability for Mobile Agents: A Secure and Open Programming Environment. IEICE Transactions on Communications, IEICE/IEEE Special Issue on Autonomous Decentralized Systems E83-B(5), 2000
-
(2000)
IEICE/IEEE Special Issue on Autonomous Decentralized Systems E83-B(5)
-
-
Bellavista, P.1
Corradi, A.2
Stefanelli, C.3
-
8
-
-
0032164539
-
Cryptographic Design Vulnerabilities
-
Schneier, B.: Cryptographic Design Vulnerabilities. IEEE Computer Magazine 31(9), 1998
-
(1998)
IEEE Computer Magazine
, vol.31
, Issue.9
-
-
Schneier, B.1
-
11
-
-
0033684311
-
A Distributed Resource Controller for QoS Applications
-
Wang, P. Y., Yemini, Y., Florissi, D., Zinky, J.: A Distributed Resource Controller for QoS Applications. IEEE/IFIP Network Operations and Management Symposium (2000)
-
(2000)
IEEE/IFIP Network Operations and Management Symposium
-
-
Wang, P.Y.1
Yemini, Y.2
Florissi, D.3
Zinky, J.4
-
12
-
-
0032066141
-
A Secure Active Network Environment Architecture: Realization in SwitchWare
-
Alexander, D. S., et al.: A Secure Active Network Environment Architecture: Realization in SwitchWare. IEEE Network Magazine 12(3), 1998
-
(1998)
IEEE Network Magazine
, vol.12
, Issue.3
-
-
Alexander, D.S.1
-
15
-
-
0033871229
-
Active Networks for Efficient Distributed Network Management
-
Raz, D., Shavitt, Y.: Active Networks for Efficient Distributed Network Management. IEEE Communications Magazine 38(3), 2000
-
(2000)
IEEE Communications Magazine
, vol.38
, Issue.3
-
-
Raz, D.1
Shavitt, Y.2
-
16
-
-
0033871228
-
The Phoenix Framework: A Practical Architecture for Programmable Networks
-
Putzolu, D., Bakshi, S., Yadav, S., Yavatkar, R.: The Phoenix Framework: A Practical Architecture for Programmable Networks. IEEE Communications Magazine 38(3), 2000
-
(2000)
IEEE Communications Magazine
, vol.38
, Issue.3
-
-
Putzolu, D.1
Bakshi, S.2
Yadav, S.3
Yavatkar, R.4
-
17
-
-
84937443841
-
-
TimeStep
-
TimeStep - http://www.timestep.com/HTML/ProdConGate.htm
-
-
-
-
18
-
-
84937443842
-
-
Entrust, Entrust Technologies Inc
-
Entrust, Entrust Technologies Inc. - http://developer.entrust.com/
-
-
-
|