[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

10 Networking Papers: readings for protocol design

Published: 05 July 2006 Publication History

Abstract

No abstract available.

References

[1]
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In 12th USENIX Security Symposium, 2003.
[2]
D. Bernstein. Syn cookies, 1997.
[3]
N. Brownlee, k claffy, and E. Nemeth. DNS Measurements at a Root Server. In Globecom 2001, 2001.
[4]
D. Brumley and D. Boneh. Remote Timing Attacks are Practical. In 12th USENIX Security Symposium, 2003.
[5]
D. D. Clark. The design philosophy of the DARPA internet protocols. In SIGCOMM '88, Aug. 1988.
[6]
D. D. Clark and D. L. Tennenhouse. Architectural considerations for a new generation of protocols. In SIGCOMM '90, 1990.
[7]
C. Frangouli, J. Le Boudec, and J. Widmer. Network coding: An instant primer. CCR, 26(1), Jan 2006.
[8]
D. Karger et al. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In STOC, May 1997.
[9]
T. Kohno, A. Broido, and k.c. Claffy. Remote physical device fingerprinting. In IEEE Symposium on Security and Privacy, 2005.
[10]
D. Kristol and L. Montulli. HTTP State Management Mechanism, Request For Comments 2965, 2000.
[11]
B. W. Lampson. Hints for computer system design. In 9th SOSP, 1983.
[12]
P. V. Mockapetris and K. J. Dunlap. Development of the domain name system. In SIGCOMM, 1988.
[13]
P. Newman, G. Minshall, and T. L. Lyon. IP switching - ATM under IP. IEEE/ACM Transactions on Networking, 6(2):117--129, 1998.
[14]
J. Postel. Transmission control protocol. Request for Comments 793, Sept. 1981.
[15]
R. Prasad, M. Murray, C. Dovrolis, and K. Claffy. Bandwidth estimation: Metrics, measurement techniques and tools. IEEE Network, Nov/Dec 2003.
[16]
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277--288, Nov. 1984.
[17]
A. Wolman et al. On the scale and performance of cooperative web proxy caching. In 17th SOSP, 1999.

Index Terms

  1. 10 Networking Papers: readings for protocol design

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 36, Issue 3
    July 2006
    97 pages
    ISSN:0146-4833
    DOI:10.1145/1140086
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 July 2006
    Published in SIGCOMM-CCR Volume 36, Issue 3

    Check for updates

    Author Tags

    1. protocol design
    2. readings

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 766
      Total Downloads
    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media