Шрифт:
Закладка:
DAVIE, B., and REKHTER, Y. (Дейви и Рехтер): «MPLS Technology and Applications», San Francisco: Morgan Kaufmann, 2000.
DAVIES, J. (Дэвис): «Understanding IPv6», 2nd ed., Redmond, WA: Microsoft Press, 2008.
DAVIS, J. (Дэвис): «Wifi Technology: Advances and Applications», New York: NY Research Press, 2018.
DAY, J.D. (Дэй): «The (Un)Revised OSI Reference Model», Computer Commun. Rev., vol. 25, pp. 39–55, Oct. 1995.
DAY, J.D., and ZIMMERMANN, H. (Дэй и Циммерман): «The OSI Reference Model», Proc. of the IEEE, vol. 71, pp. 1334–1340, Dec. 1983.
DE ANDRADE, M., MAIER, M., MCGARRY, M., REISSLEIN, M. (Де Андраде и др.): «Passive optical network (PON) supported networking», Optical Switching and Networking, 2014.
DE MARCO, G., and KOWALSKI, D. (Де Марко и Ковальски): «Contention Resolution in a Nonsynchronized Multiple Access Channel», J. of Theoretical Computer Science, vol. 689, pp. 1–13, Aug. 2017.
DEAN, J., and GHEMAWAT, S. (Дин и Гемават): «MapReduce: a Flexible Data Processing Tool», Commun. of the ACM, vol. 53, pp. 72–77, Jan. 2008.
DEERING, S.E. (Диринг): «SIP: Simple Internet Protocol», IEEE Network Magazine, vol. 7, pp. 16–28, May/June 1993.
DEERING, S.E., and CHERITON, D. (Диринг и Черитон): «Multicast Routing in Datagram Networks and Extended LANs», ACM Trans. on Computer Systems, vol. 8, pp. 85–110, May 1990.
DEMERS, A., KESHAV, S., and SHENKER, S. (Демерс и др.): «Analysis and Simulation of a Fair Queueing Algorithm», Internetwork: Research and Experience, vol. 1, pp. 3–26, Sept. 1990.
DENNING, D.E., and SACCO, G.M. (Деннинг и Сакко): «Timestamps in Key Distribution Protocols», Commun. of the ACM, vol. 24, pp. 533–536, Aug. 1981.
DIFFIE, W., and HELLMAN, M.E. (Диффи и Хеллман): «Exhaustive Cryptanalysis of the NBS Data Encryption Standard», IEEE Computer, vol. 10, pp. 74–84, June 1977.
DIFFIE, W., and HELLMAN, M.E. (Диффи и Хеллман): «New Directions in Cryptography», IEEE Trans. on Information Theory, vol. IT-2, pp. 644–654, Nov. 1976.
DIJKSTRA, E.W. (Дейкстра): «A Note on Two Problems in Connexion with Graphs», Numer. Math., vol. 1, pp. 269–271, Oct. 1959.
DIZDAREVIC, J., CARPIO, D., JUKAN, A., and MASIP-BRUIN, X. (Диздаревич и др.): «A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration», ACM Computing Surveys, vol. 51, Art. 116, Jan. 2019.
DONAHOO, M., and CALVERT, K. (Донаху и Калверт): «TCP/IP Sockets in C», 2nd ed., San Francisco: Morgan Kaufmann, 2009.
DONAHOO, M., and CALVERT, K. (Донаху и Калверт): «TCP/IP Sockets in Java», 2nd ed., San Francisco: Morgan Kaufmann, 2008.
DORFMAN, R. (Дорфман): «Detection of Defective Members of a Large Population», Annals Math. Statistics, vol. 14, pp. 436–440, 1943.
DU, W. (Ду): «Computer & Internet Security: A Hands-on Approach», 2nd ed., Seattle: Amazon, 2019.
DUTCHER, B. (Датчер): «The NAT Handbook», New York: John Wiley & Sons, 2001.
EL GAMAL, T. (Эль Гамаль): «A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms», IEEE Trans. on Information Theory, vol. IT-1, pp. 469–472, July 1985.
ESPOSITO, V. (Эспозито): «Cryptography for Beginners: a Useful Support for Understanding», Seattle: Amazon Digital Services, 2018.
FALL, K. (Фолл): «A Delay-Tolerant Network Architecture for Challenged Internets», Proc. SIG-COMM 2003 Conf., ACM, pp. 27–34, Aug. 2003.
FAWAZ, K., and SHIN, K.G. (Фаваз и Шин): «Security and Privacy in the Internet of Things», IEEE Computer, vol. 52, pp. 40–49, Apr. 2019.
FEAMSTER, N., BALAKRISHNAN, H., REXFORD, J., SHAIKH, A., and VAN DER MERWE, J. (Фимстер и др.): «The Case for Separating Routing from Routers», Proc. SIGCOMM Workshop on Future Directions in Network Architecture, ACM, pp. 5–12, 2004.
FEAMSTER, N., and LIVINGOOD, J. (Фимстер и Ливингуд): «Internet Speed Measurement: Current Challenges and Future Recommendations», Commun. of the ACM, ACM, 2020.
FEAMSTER, N., REXFORD, J., and ZEGURA, E. (Фимстер и др.): «The Road to SDN», ACM Queue, vol. 11, p. 20, Dec. 2013.
FENNER, B., HANDLEY, M., HOLBROOK, H., and KOUVELAS, I. (Феннер и др.): «Protocol Independent Multicast-Sparse Mode (PIM-SM)», RFC 4601, Aug. 2006.
FERGUSON, N., SCHNEIER, B., and KOHNO, T. (Фергюсон и др.): «Cryptography Engineering: Design Prin- ciples and Practical Applications», New York: John Wiley & Sons, 2010.
FLETCHER, J. (Флетчер): «An Arithmetic Checksum for Serial Transmissions», IEEE Trans. on Commun., vol. COM-0, pp. 247–252, Jan. 1982.
FLOYD, S., HANDLEY, M., PADHYE, J., and WIDMER, J. (Флойд и др.): «Equation-Based Congestion Control for Unicast Applications», Proc. SIGCOMM 2000 Conf., ACM, pp. 43–56, Aug. 2000.
FLOYD, S., and JACOBSON, V. (Флойд и Джейкобсон): «Random Early Detection for Congestion Avoidance», IEEE/ACM Trans. on Networking, vol. 1, pp. 397–413, Aug. 1993.
FLUHRER, S., MANTIN, I., and SHAMIR, A. (Флюрер и др.): «Weakness in the Key Scheduling Algorithm of RC4», Proc. Eighth Ann. Workshop on Selected Areas in Cryptography, Springer-Verlag LNCS 2259, pp. 1–24, 2001.
FONTUGNE, R., ABRY, P., FUKUDA, K., VEITCH, D., BORGNAT, P., and WENDT, H. (Фонтюнь и др.): «Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections», IEEE/ACM Trans. on Networking, vol. 25, pp. 2152–2165, Aug. 2017.
FORD, B. (Форд): «Structured Streams: A New Transport Abstraction», Proc. SIGCOMM 2007 Conf., ACM, pp. 361–372, 2007.
FORD, L.R., Jr., and FULKERSON, D.R. (Форд и Фалкерсон): «Flows in Networks», Princeton, NJ: Princeton University Press, 1962.
FORD, W., and BAUM, M.S. (Форд и Баум): «Secure Electronic Commerce», Upper Saddle River, NJ: Pren tice Hall, 2000.
FORNEY, G.D. (Форни): «The Viterbi Algorithm», Proc. of the IEEE, vol. 61, pp. 268–278, Mar. 1973.
FOSTER, N., HARRISON, R., FREEDMAN, M., MONSANTO, C., REXFORD, J., STORY, A., and WALKER, D. (Фостер и др.): «Frenetic: A Network Programming Language», ACM Sigplan Notices, vol. 46, pp. 279–291, Sep. 2011.
FRANCIS, P. (Фрэнсис): «A Near-Term Architecture for Deploying Pip», IEEE Network Magazine, vol. 7, pp. 30–37, May/June 1993.
FRASER, A.G. (Фрейзер): «Towards a Universal Data Transport System», IEEE J. on Selected Areas in Commun., vol. 5, pp. 803–816, Nov. 1983.
FRIDRICH, J. (Фридрих): «Steganography in Digital Media: Principles, Algorithms, and Applications», Cambridge: Cambridge University Press, 2009.
FULLER, V., and LI, T. (Фуллер и Ли): «Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan», RFC 4632, Aug. 2006.
GALLAGER, R.G. (Галлагер):