Онлайн
библиотека книг
Книги онлайн » Разная литература » Компьютерные сети. 6-е изд. - Эндрю Таненбаум

Шрифт:

-
+

Закладка:

Сделать
1 ... 324 325 326 327 328 329 330 331 332 ... 335
Перейти на страницу:
(Боггс и др.): «Measured Capacity of an Ethernet: Myths and Reality», Proc. SIGCOMM ’88 Conf., ACM, pp. 222–234, 1988.

BORISOV, N., GOLDBERG, I., and WAGNER, D. (Борисов и др.): «Intercepting Mobile Communications: The Insecurity of 802.11», Seventh Int’l Conf. on Mobile Computing and Networking, ACM, pp. 180–188, 2001.

BOSSHART, P., DALY, D., GIBB, G., IZZARD, M., MCKEOWN, N., REXFORD, J., and WALKER, D. (Босхарт и др.): «P4: Programming Protocol-Independent Packet Processors», Computer Commun. Review, vol. 44, pp. 87–95, Apr., 2014.

BOSSHART, P., GIBB, G., KIM, H.-S., VARGHESE, G., MCKEOWN, N., IZZARD, M., MUJICA, F., and HOROWITZ, M. (Босхарт и др.): «Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN», Computer Commun. Review, vol. 43, pp. 99–110, Apr., 2013.

BRADEN, R. (Брейден): «Requirements for Internet Hosts—Communication Layers», RFC 1122, Oct. 1989.

BRADEN, R., BORMAN, D., and PARTRIDGE, C. (Брейден и др.): «Computing the Internet Checksum», RFC 1071, Sept. 1988.

BRESLAU, L., CAO, P., FAN, L., PHILLIPS, G., and SHENKER, S. (Бреслау и др.): «Web Caching and Zipf-like Distributions: Evidence and Implications», Proc. INFOCOM Conf., IEEE, pp. 126–134, 1999.

BRONZINO, F., SCHMITT, P., AYOUBI, S., MARTINS, G., TEIXEIRA, R., and FEAMSTER, N. (Бронзино и др.): «Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience», ACM SIGMETRICS, 2020.

BUSH, V. (Буш): «As We May Think», Atlantic Monthly, vol. 176, pp. 101–108, July 1945.

CALDER, M., FAN, X., HU, Z., KATZ-BASSETT, E., HEIDEMANN, J. and GOVINDAN, R. (Колдер и др.): «Mapping the Expansion of Google’s Serving Infrastructure», ACM SIGCOMM Internet Measurement Conf., ACM, pp. 313–326, 2013.

CAPETANAKIS, J.I. (Капетанакис): «Tree Algorithms for Packet Broadcast Channels», IEEE Trans. on Information Theory, vol. IT-5, pp. 505–515, Sept. 1979.

CASADO, M., FREEDMAN, M.J., PETIT, J., LUO, J., MCKEOWN, N., and SCHENKER, S. (Касадо и др.): «Ethane: Taking Control of the Enterprise», Proc. SIGCOMM 2007 Conf., ACM, pp. 1–12, 2007.

CASTAGNOLI, G., BRAUER, S., and HERRMANN, M. (Кастаньоли и др.): «Optimization of Cyclic Redundancy-Check Codes with 24 and 32 Parity Bits», IEEE Trans. on Commun., vol. 41, pp. 883–892, June 1993.

CERF, V., and KAHN, R. (Серф и Кан): «A Protocol for Packet Network Interconnection», IEEE Trans. on Commun., vol. COM-2, pp. 637–648, May 1974.

CHAKRABORTY, T., MISRA, S., and PRASAD, R. (Чакраборти и др.): «VoIP Technology: Applications and Challenges», Berlin: Springer, 2019.

CHANG, F., DEAN, J., GHEMAWAT, S., HSIEH, W., WALLACH, D., BURROWS, M., CHANDRA, T., FIKES, A., and GRUBER, R. (Чан и др.): «Bigtable: A Distributed Storage System for Structured Data», Proc. OSDI 2006 Symp., USENIX, pp. 15–29, 2006.

CHASE, J.S., GALLATIN, A.J., and YOCUM, K.G. (Чейз и др.): «End System Optimizations for High-Speed TCP», IEEE Commun. Magazine, vol. 39, pp. 68–75, Apr. 2001.

CHAUDHARY, A, and CHAUBE, M.K. (Чаудхари и Чаубе): «Hiding MP3 in Colour Image Using Whale Optimization», Proc. Second Int’l Conf. on Vision, Image, and Signal Processing, ACM, Art. 54, 2018.

CHEN, S., and NAHRSTEDT, K. (Чэнь и Нарштедт): «An Overview of QoS Routing for Next-Generation Networks», IEEE Network Magazine, vol. 12, pp. 64–69, Nov./Dec. 1998.

CHEN, X., FEIBISH, S., KORAL, Y., REXFORD, J., ROTTENSTREICH, O., MONETTI, S., WANG, T. (Чэнь и др.): «Fine-Grained Queue Measurement in the Data Plane», CoNext, ACM, Dec. 2019.

CHIU, D., and JAIN, R. (Чиу и Джейн): «Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks», Comput. Netw. ISDN Syst., vol. 17, pp. 1–4, June 1989.

CLANCY, T.C., MCGWIER, R.W., and CHEN, L. (Клэнси и др.): «Post-Quantum Crypto­graphy and 5G Security: A Tutorial», Proc. WiSec, ACM, pp. 285–287, 2019.

CLARK, D.D. (Кларк): «The Design Philosophy of the DARPA Internet Protocols», Proc. SIG-COMM ’88 Conf., ACM, pp. 106–114, 1988.

CLARK, D.D.: «Window and Acknowledgement Strategy in TCP», RFC 813, July 1982.

CLARK, D.D., JACOBSON, V., ROMKEY, J., and SALWEN, H. (Кларк и др.): «An Analysis of TCP Processing Overhead», IEEE Commun. Magazine, vol. 27, pp. 23–29, June 1989.

CLARK, D.D., SHENKER, S., and ZHANG, L. (Кларк и др.): «Supporting Real-Time Applications in an Integrated Services Packet Network», Proc. SIGCOMM ’92 Conf., ACM, pp. 14–26, 1992.

CLARKE, A.C. (Кларк): «Extra-Terrestrial Relays», Wireless World, 1945.

CLARKE, I., MILLER, S.G., HONG, T.W., SANDBERG, O., and WILEY, B. (Кларк и др.): «Protecting Free Expression Online with Freenet», IEEE Internet Computing, vol. 6, pp. 40–49, Jan.–Feb. 2002.

CODING, M. (Кодинг): «JavaScript for Beginners», Seattle: Amazon, 2019.

COHEN, B. (Коэн): «Incentives Build Robustness in BitTorrent», Proc. First Workshop on Economics of Peer-to-Peer Systems, June 2003.

COLBACH, B. (Кольбах): «Bluetooth Tutorial: Design, Protocol and Specifications for BLE — Bluetooth Low Energy 4.0 and Bluetooth 5», Seattle: Amazon Kindle, 2019.

COMER, D.E. (Комер): The Internet Book, 4th ed., Upper Saddle River, NJ: Prentice Hall, 2007.

COMER, D.E.: «Internetworking with TCP/IP», vol. 1, 6th ed., Upper Saddle River, NJ: Pren- tice Hall, 2013.

CRAVER, S.A., WU, M., LIU, B., STUBBLEFIELD, A., SWARTZLANDER, B., WALLACH, D.W., DEAN, D., and FELTEN, E.W. (Крейвер и др.): «Reading Between the Lines: Lessons from the SDMI Challenge», Proc. 10th USENIX Security Symp., USENIX, 2001.

CROCKER, S.D. (Крокер): «The Arpanet and Its Impact on the State of Networking», IEEE Computer, vol. 52, pp-14–23, Oct. 2019.

CROVELLA, M., and KRISHNAMURTHY, B. (Кровелла и Кришнамурти): «Internet Measurement», New York: John Wiley & Sons, 2006.

CUEVAS, R., KRYCZKA, M., GINZALEZ, R., CUEVAS, A., and AZCORRZ, A. (Куэвас): «Torrent-Guard: Stopping Scam and Malware Distribution in the BitTorrent Ecosystem», Com puter Networks, vol. 59, pp. 77–90, 2014.

DAEMEN, J., and RIJMEN, V. (Дамен и Рэймен): «The Design of Rijndael», Berlin: Sprin­ger-Verlag, 2002.

DAGON, D., ANTONAKAKIS, M., VIXIE, P., JINMEI, T., and LEE, W. (Дейгон и др.): «Increased DNS Forgery Resistance Through 0x20-bit Encoding», Proceedings of the 15th ACM Conf. on Computer and Commun. Security, ACM, pp. 211–222, 2008.

DALAL, Y., and METCLFE, R. (Далал и Меткалф): «Reverse Path Forwarding of Broadcast Packets», Commun. of the ACM, vol. 21, pp. 1040–1048, Dec. 1978.

DAN, K., KITAGAWA, N., SAKURABA, S., and YAMAI, N. (Дэн и др.): «Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log», Proc. 43rd Computer Softw. and Appl. Conf., IEEE, pp. 896–899, 2019.

DAVIE, B., and FARREL,

1 ... 324 325 326 327 328 329 330 331 332 ... 335
Перейти на страницу:

Еще книги автора «Эндрю Таненбаум»: