Content Frame
Skip Breadcrumb Navigation
Home  arrow Student Resources  arrow References  arrow References Rh-Z

References Rh-Z

[Rhee 1998] I. Rhee, “Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet,” Proceedings ACM SIGCOMM'98, Vancouver BC, (Aug. 31–Sept. 4, 1998).

[Roberts 1967] L. Roberts, T. Merril, “Toward a Cooperative Network of Time-Shared Computers,” AFIPS Fall Conference, Oct. 1966.

[Rom 1990] R. Rom, M. Sidi, Multiple Access Protocols: Performance and Analysis, Springer-Verlag, New York, 1990.

[Root Servers 2004]

[Rose 1996] M. Rose, The Simple Book: An Introduction to Internet Management, Revised Second Edition, Prentice Hall, Englewood Cliffs, NJ, 1996.

[Rosenberg 2000] J. Rosenberg, L. Qiu, H. Schulzrinne, “Integrating Packet FEC into Adaptive Playout Buffer Algorithms on the Internet,” IEEE INFOCOM 2000 (Tel Aviv, 2000).

[Ross 1995] K. W. Ross, Multiservice Loss Models for Broadband Telecommunication -Networks, Springer, Berlin, 1995.

[Ross 2003] K. W. Ross, “Asynchronous Voice: A Personal Account,” IEEE Multimedia, pp. 70–74, April/June 2003.

[Rowston 2001] A. Rowston, and P. Druschel, “Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems,” in Proceedings of IFIP/ACM Middleware 2001, 2001, Heidelberg, Germany, 2001.

[RSA 1978] R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120–126, Feb. 1978.

[RSA Challenge 2002] RSA Data Security Inc., “What is the RSA Secret Key Challenge?”

[RSA FAQ 2004] RSA Inc., “RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1,”

[RSA Fast 2004] RSA Laboratories, “How fast is RSA?”

[RSA Key 2004] RSA Laboratories, “How large a key should be used in the RSA Crypto system?”

[Rubenstein 1998] D. Rubenstein, J. Kurose, D. Towsley “Real-Time Reliable Multicast Using Proactive Forward Error Correction,” Proceedings of NOSSDAV ‘98 (Cambridge, UK, July 1998).

[Rubin 2001] A. Rubin, White-Hat Security Arsenal: Tackling the Threats, Addison-Wesley, 2001.

[Saltzer 1984] J. Saltzer, D. Reed, D. Clark, “End-to-End Arguments in System Design,” ACM Transactions on Computer Systems (TOCS), 2(4) (November 1984)..

[Saroiu 2002] S. Saroiu, K. Gummadi, R. Dunn, S. Gribble, H. Levy, “An Analysis of Internet Content Delivery Systems,” Proc. Usenix OSDI 2002, pp. 315–328.

[Savage 1999] S. Savage, A. Collins, E. Hoffman, J. Snell, T. Anderson, “The End-to-End Effects of Internet Path Selection,” in Proceedings of 1999 ACM SIGCOM M, Boston, MA, September 1999

[Savage 2000] S. Savage, D. Wetherall, A. Karlin, T. Anderson, “Practical Network Support for IP Traceback, Proceedings of the 2000 ACM SIGCOMM Conference, (Stockholm, Sweden), August 2000, pp. 295–306,

[Saydam 1996] T. Saydam and T. Magedanz, “From Networks and Network Management into Service and Service Management,” Journal of Networks and System Management, Vol. 4, No. 4 (Dec. 1996), pp. 345–348.

[Schneier 1995] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley and Sons, 1995.

[Schulzrinne 1997] H. Schulzrinne, “A Comprehensive Multimedia Control Architecture for the Internet,” NOSSDAV'97 (Network and Operating System Support for Digital Audio and Video), St. Louis, Missouri; May 19, 1997.

[Schulzrinne-RTP 2004] Henning Schulzrinne's RTP site,

[Schulzrinne-RTSP 2004] Henning Schulzrinne's RTSP site,

[Schulzrinne-SIP 2004] Henning Schulzrinne's SIP site,

[Schurmann 1996] G. Schurmann, “Multimedia Mail,” ACM Multimedia Systems, Oct. 1996, pp. 281–295.

[Schwartz 1977] M. Schwartz, Computer-Communication Network Design and Analysis, Prentice-Hall, Englewood Cliffs, N.J., 1997.

[Schwartz 1980] M. Schwartz, Information, Transmission, Modulation, and Noise, McGraw Hill, NY, NY 1980.

[Schwartz 1982] M. Schwartz, “Performance Analysis of the SNA Virtual Route Pacing Control,” IEEE Transactions on Communications, Vol. COM-30, No. 1, (Jan. 1982), pp. 172–184.

[Schwiebert 2001] L. Schwiebert, S. Gupta, J. Weinmann, “Research Challenges in Wireless Networks of Biomedical Sensors,” ACM Mobicom 2001, 2001, pp. 151-165.

[Scourias 2001] J. Scourias, T. Farley, “Overview of the Global System for Mobile Communications: GSM.”

[Segaller 1998] S. Segaller, Nerds 2.0.1, A Brief History of the Internet, TV Books, New York, 1998.

[Semeria 1996] C. Semeria, “Understanding IP addressing: Everything you ever wanted to know,”

[Shacham 1990] N. Shacham, P. McKenney, “Packet Recovery in High-Speed Networks Using Coding and Buffer Management,” Proc. IEEE Infocom Conference (San Francisco, 1990), pp. 124–131..

[Sharma 1997] Puneet Sharma, Deborah Estrin, Sally Floyd, Van Jacobson, “Scalable Timers for Soft State Protocols,” Proc. IEEE Infocom ‘97 Conference, Apr. 1997 (Kobe, Japan).

[Shipley 2001] P. Shipley, “Open WLANS: The Early Results of War Driving,”

[Sidor 1998] D. Sidor, “TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow,” IEEE Communications Magazine, Vol. 36, No. 3 (Mar. 1998), pp. 54–64.

[Singh 1999] S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scotsto Quantum Cryptography, Doubleday Press, 1999.

[SIP Software 2004] H. Schulzrinne Software Package site,

[SMIL 2004] W3C Synchronized Multimedia homepage,

[Snoeren 2001] A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, W. T. Strayer, “Hash-Based IP Traceback,” Proceedings of the 2001 ACM Sigcomm,

[Solari 1997] S. J. Solari, Digital Video and Audio Compression, McGraw Hill, NY, NY, 1997.

[Solensky 1996] F. Solensky, “IPv4 Address Lifetime Expectations,” in IPng: Internet Protocol Next Generation (S. Bradner, A. Mankin, ed), Addison-Wesley, Reading, MA, 1996.

[Spragins 1991] J. D. Spragins, Telecommunications Protocols and Design, Addison-Wesley, Reading, MA, 1991.

[Sprint 2004] Sprint, “Network Overview: SLAs,”

[Spurgeon 2002] C. Spurgeon, “Charles Spurgeon's Ethernet Web Site,”

[Srinivasan 1999] V. Srinivasan and G. Varghese, “Fast Address Lookupp Using Controlled Prefix Expansion,” ACM Transactions Computer Sys ., Vol 17, No. 1 (Feb 1999), pp. 1–40.

[Stallings 1993] W. Stallings, SNMP, SNMP v2, and CMIP The Practical Guide to Network Management Standards, Addison-Wesley, Reading, MA, 1993.

[Stallings 1999] W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, Addison-Wesley, Reading, MA, 1999.

[Steinder 2002] M. Steinder, A. Sethi, “Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms,” in Proc. IEEE INFOCOM, 2002.

[Stevens 1990] W. R. Stevens, Unix Network Programming, Prentice-Hall, Englewood Cliffs, NJ.

[Stevens 1994] W. R. Stevens, TCP/IP Illustrated, Vol. 1: The Protocols, Addison-Wesley, Reading, MA, 1994.

[Stevens 1997] W.R. Stevens, Unix Network Programming, Volume 1: Networking APIs-Sockets and XTI, 2nd edition, Prentice-Hall, Englewood Cliffs, NJ, 1997.

[Stewart 1999] J. Stewart, BGP4: Interdomain Routing in the Internet, Addison-Wesley, 1999..

[Stoica 2001] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” In Proceedings of ACM SIGCOMM, 2001, (San Diego, CA), 2001.

[Stoll 1995] C. Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Pocket Books, 1995.

[Stone 1998] J. Stone, M. Greenwald, C. Partridge, and J. Hughes, “Performance of Check-sums and CRC's Over Real Data,” IEEE/ACM Transactions on Networking, Vol. 6, No. 5 (Oct. 1998), pp 529–543

[Stone 2000] J. Stone, C. Partridge, “When Reality and the Checksum Disagree,” Proceedings of ACM SIGCOMM ‘00, (Stockholm, Sweden, Aug. 2000).

[Strayer 1992] W. T. Strayer, B. Dempsey, A. Weaver, XTP: The Xpress Transfer Protocol, Addison-Wesley, Reading, MA, 1992.

[Stubblefield 2002] A. Stubblefield, J. Ioannidis, A. Rubin, “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,” Proceedings of the 2002 Network and Distributed Systems Security Symposium (2002), 17–22.

[Subramanian 2000] M. Subramanian, Network Management: Principles and Practice, Addison-Wesley, Reading, MA, 2000.

[Subramanian 2002] L. Subramanian, S. Agarwal, J. Rexford, R. Katz, “Characterizing the Internet Hierarchy from Multiple Vantage Points,” Proc. 2002 IEEE Infocom.

[Sun 2004] Sun Microsystems, “System and Network Management,”

[Sunshine 1978] C. Sunshine and Y. K. Dalal, “Connection Management in Transport Proto-cols,” Computer Networks, North-Holland, Amsterdam, 1978.

[T-Mobile 2004] T-Mobile HotSpot US Location Map,

[Tangmunarunkit 2001] H. Tangmunarunkit, R. Govindan, D. Estrin, S. Shenker, “The Impact of Routing Policy on Internet Paths,” Proceedings 2001 IEEE INFOCOM, Alaska, April 2001.

[TechnOnLine 2004] TechOnLine, “Protected Wireless Networks,” online webcast tutorial,

[Teleography 2002] Teleography—a research division of Pirmetrica, “WorldCom Controls the Most Internet Bandwidth, Connections, and Revenue,”

[Thaler 1997] D. Thaler and C. Ravishankar, “Distributed Center-Location Algorithms,” IEEE Journal on Selected Areas in Communications, Vol. 15, No. 3, (Apr. 1997), pp. 291–303.

[Think 2002] Technical History of Network Protocols, “Cyclades,”

[Thinplanet 2002] Thinplanet homepage,

[Thottan 1998] M. Thottan and C. Ji, “Proactive Anomaly Detection Using Distributed Intelligent Agents,” IEEE Network Magazine, Vol. 12, No. 5 (Sept./ Oct. 1998), pp. 21–28.

[Tobagi 1990] F. Tobagi, “Fast Packet Switch Architectures for Broadband Integrated Net-works,” Proc. of the IEEE, Vol. 78, No. 1 (Jan. 1990), pp. 133–167..

[Turner 1986] J. Turner, “New Directions in Communications (or Which Way to the Information Age?),” Proceedings of the Zürich Seminar on Digital Communication, (Zurich, Switzerland, Mar. 1986), pp. 25–32.

[Turner 1988] J. S. Turner “Design of a Broadcast packet switching network,” IEEE Transactions on Communications, Vol. 36, No. 6 (June 1988), pp. 734–743.

[Utah 2004] Utah Division of Corporations and Commercial Codes, Digital Signature Licensing Information,

[Varghese 1997] G. Varghese and A. Lauck, “Hashed and Hierarchical Timing Wheels: Efficient Data Structures for Implementing a Timer Facility,” IEEE/ACM Transactions on Networking, Vol. 5, No. 6, (Dec. 1997), pp. 824–834.

[Verisign 2004]

[Verizon 2004] Verizon Communication, Verizon Broadband Anytime.

[Verma 2001] D.C. Verma, Content Distribution Networks: An Engineering Approach, John Wiley, 2001

[Viterbi 1995] A. Viterbi, CDMA: Principles of Spread Spectrum Communication, Addison-Wesley, Reading, MA, 1995.

[VON 2004] Voice on the Net,

[von Lohmann 2003] F. von Lohmann, “Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers,” 2nd International Workshop on Peer-to-Peer Systems (IPTPS ‘03), Berkeley, 2003.

[Voydock 1983] V. L. Voydock, and S.T. Kent, “Security Mechanisms in High-Level Net-work Protocols,” ACM Computing Surveys Vol. 15, No. 2 (June 1983), pp. 135–171.

[W3C 1995] The World Wide Web Consortium, “A Little History of the World Wide Web,” 1995.

[WAP 2004] WAP Forum, “WAP 2.0 Technical White Paper,”

[Wakeman 1992] Ian Wakeman, Jon Crowcroft, Zheng Wang, and Dejan Sirovica, “Layering Considered Harmful,” IEEE Network, Jan. 1992, pp. 20–24.

[Waldvogel 1997] M. Waldvogel et al., “Scalable High Speed IP Routing Lookup,” Proceedings of ACM SIGCOMM ‘97 (Cannes, France, Sept. 1997).

[Walker 2000] J. Walker, “IEEE P802.11 Wireless LANs, Unsafe at Any Key Size; An Analysis of the WEP Encapsulation,” Oct. 2000,

[Weatherspoon 2000] S. Weatherspoon, “Overview of IEEE 802.11b Security,” Intel Technology Journal, (2nd Quarter 2000),

[Web ProForum 1999] Web ProForum, “Tutorial on H.323,” 1999.

[Wei 2004] W. Wei, B. Wang, J. Kurose, D. Towsley, “Detecting and Distinguishing Wired and Wireless Packet Losses in an End-End Connection,” Technical Report, Dept. Computer Science, University of Massachusetts, 2004.

[Weinstein 2002] S. Weinstein, “The Mobile Internet:Wireless LAN vs. 3G Cellular Mobil e,” IEEE Communications Magazine (February 2002). pp. 26–28.

[Weiser 1991] M. Weiser, “The Computer for the Twenty-First Century,” Scientific American (September 1991): 94–10.

[Wessels 2001] D. Wessels, Web Caching, O'Reilly, Sebastopol, CA, 2001.

[Wimba 2004] Wimba homepage,

[Woo 1994] T. Woo, R. Bindignavle, S. Su, and S. Lam. SNP: an interface for secure network programming. In Proceedings of 1994 Summer USENIX, pages 45—58, Boston, MA, June 1994.

[Wood 2004] L. Wood, “Lloyds Satellites Constellations,”

[Xiao 2000] X. Xiao, A. Hannan, B. Bailey, L. Ni, “Traffic Engineering with MPLS in the Internet,” IEEE Network, March/April 2000.

[Yahoo-MIME 1999] Yahoo MIME WWWpage, Internet/Multimedia/MIME/

[Yeager 1996] N. J. Yeager and R. E. McGrath, Web Server Technology, Morgan Kaufmann Publishers, San Francisco, 1996.

[Zegura 1997] E. Zegura, K. Calvert, M. Donahoo, “A Quantitative Comparison of Graph-based Models for Internet Topology,” IEEE/ACM Transactions on Networking, Vol. 5, No. 6, (Dec. 1997). See also for a software package that generates networks with realistic structure.

[Zhang 1991] L. Zhang, S. Shenker, and D. D. Clark, “Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two Way Traffic,” Proceedings of ACM SIGCOMM ‘91, Zürich, 1991.

[Zhang 1993] L. Zhang, S. Deering, D. Estrin, S. Shenker, D. Zappala, “RSVP: A New Resource Reservation Protocol,” IEEE Network Magazine, Vol. 7, No. 9 (Sept. 1993), pp. 8–18.

[Zhang 1998] L. Zhang, R. Yavatkar, Fred Baker, Peter Ford, Kathleen Nichols, M. Speer, Y. Bernet, “A Framework for Use of RSVP with Diffserv Networks,” <draft-ietf-diffservrsvp-01. txt>, 11/20/1998. Work in progress.

[Zhao 2004] B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, J. Kubiatowicz, “Tapestry: A Resilient Global-scale Overlay for Service Deployment,” IEEE Journal on Selected Areas in Communications, January 2004, 22(1).

[Ziff-Davis 1998] Ziff-Davis Publishing, “Ted Nelson: Hypertext pioneer,” 1998.,3656,2127396-2102293,00.html

[Zimmermann 2004] P. Zimmermann, “Why do you need PGP?”

Copyright © 1995 - 2017 Pearson Education . All rights reserved. Pearson Addison Wesley is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page