Компьютерные сети. 6-е изд.
Шрифт:
BARAN, P. (Бэран): «On Distributed Communications: I. Introduction to Distributed Communication Networks», Memorandum RM-420-PR, Rand Corporation, Aug. 1964.
BASU, S., SUNDARRAJAN, A., GHADERTI, J., SHAKKOTTAI, S., and SITARAMAN, R. (Басу и др.): «Adaptive TTL-Based Caching for Content Delivery»,’ IEEE/ACM Trans. on Networking, vol. 26, pp. 1063–1077, June 2018.
BELLMAN, R.E. (Беллман): «Dynamic Programming», Princeton, NJ: Princeton University Press, 1957.
BELLOVIN, S. (Белловин):
BELSNES, D. (Белснес): «Flow Control in the Packet Switching Networks», Commun. Networks, Uxbridge, England: Online, pp. 349–361, 1975.
BENNET, C.H., and BRASSARD, G. (Беннет и Брассар): «Quantum Cryptography: Public Key Distribution and Coin Tossing», Proc. Int’l Conf. on Computer Systems and Signal Processing, pp. 175–179, 1984.
BERESFORD, A., and STAJANO, F. (Бересфорд и Стаяно): «Location Privacy in Pervasive Computing», IEEE Pervasive Computing, vol. 2, pp. 46–55, Jan. 2003.
BERNAL, P. (Бернал): «The Internet, Warts and All», Cambridge, U.K.: Cambridge University Press, 2018.
BERNASCHI, M., CELESTINI, A., GUARINO, S., LOMBARDI, F., and MASTROSTEFANO, E. (Берначи и др.): «Spiders Like Onions: on the Network of Tor Hidden Services», Proc. World Wide Web Conf., ACM, pp. 105–115, May 2019.
BERNERS-LEE, T., CAILLIAU, A., LOUTONEN, A., NIELSEN, H.F., and SECRET, A. (Бернерс-Ли и др.): «The World Wide Web», Commun. of the ACM, vol. 37, pp. 76–82, Aug. 1994.
BERTSEKAS, D., and GALLAGER, R. (Берцекас и Галлагер): «Data Networks», 2nd ed., Upper Saddle River, NJ: Prentice Hall, 1992.
BHATTI, S.N., and CROWCROFT, J. (Бхатти и Кроукрофт): «QoS Sensitive Flows: Issues in IP Packet Handling», IEEE Internet Computing, vol. 4, pp. 48–57, July–Aug. 2000.
BIHAM, E., and SHAMIR, A. (Бихам и Шамир): «Differential Fault Analysis of Secret Key Cryptosystems», Proc. 17th Ann. Int’l Cryptology Conf., Springer-Verlag LNCS 1294, pp. 513–525, 1997.
BING, B. (Бинг): «Wi-Fi Technologies and Applications», Seattle: Amazon, 2017.
BIRD, R., GOPAL, I., HERZBERG, A., JANSON, P.A., KUTTEN, S., MOLVA, R., and YUNG, M. (Берд и др.): «Systematic Design of a Family of Attack-Resistant Authentication Protocols», IEEE J. on Selected Areas in Commun., vol. 11, pp. 679–693, June 1993.
BIRRELL, A.D., and NELSON, B.J. (Биррелл и Нельсон): «Implementing Remote Procedure Calls», ACM Trans. on Computer Systems, vol. 2, pp. 39–59, Feb. 1984.
BIRYUKOV, A., SHAMIR, A., and WAGNER, D. (Бирюков и др.): «Real Time Cryptanalysis of A5/1 on a PC», Proc. Seventh Int’l Workshop on Fast Software Encryption, Springer-Verlag LNCS 1978, pp. 1–8, 2000.
BISCHOF, Z., BUSTAMANTE, F., and FEAMSTER, N. (Бишоф
BOCCARDI, F., HEATH, R.W., LOZANO, A., MARZETTA, T.L., and POPOVSKI, P. (Боккарди и др.): «Five Disruptive Technology Directions for 5G», IEEE Commun. Magazine, vol. 52, pp. 74–80, Feb. 2014.
BOGGS, D., MOGUL, J., and KENT, C. (Боггс и др.): «Measured Capacity of an Ethernet: Myths and Reality», Proc. SIGCOMM ’88 Conf., ACM, pp. 222–234, 1988.
BORISOV, N., GOLDBERG, I., and WAGNER, D. (Борисов и др.): «Intercepting Mobile Communications: The Insecurity of 802.11», Seventh Int’l Conf. on Mobile Computing and Networking, ACM, pp. 180–188, 2001.
BOSSHART, P., DALY, D., GIBB, G., IZZARD, M., MCKEOWN, N., REXFORD, J., and WALKER, D. (Босхарт и др.): «P4: Programming Protocol-Independent Packet Processors», Computer Commun. Review, vol. 44, pp. 87–95, Apr., 2014.
BOSSHART, P., GIBB, G., KIM, H.-S., VARGHESE, G., MCKEOWN, N., IZZARD, M., MUJICA, F., and HOROWITZ, M. (Босхарт и др.): «Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN», Computer Commun. Review, vol. 43, pp. 99–110, Apr., 2013.
BRADEN, R. (Брейден): «Requirements for Internet Hosts—Communication Layers», RFC 1122, Oct. 1989.
BRADEN, R., BORMAN, D., and PARTRIDGE, C. (Брейден и др.): «Computing the Internet Checksum», RFC 1071, Sept. 1988.
BRESLAU, L., CAO, P., FAN, L., PHILLIPS, G., and SHENKER, S. (Бреслау и др.): «Web Caching and Zipf-like Distributions: Evidence and Implications», Proc. INFOCOM Conf., IEEE, pp. 126–134, 1999.
BRONZINO, F., SCHMITT, P., AYOUBI, S., MARTINS, G., TEIXEIRA, R., and FEAMSTER, N. (Бронзино и др.): «Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience», ACM SIGMETRICS, 2020.
BUSH, V. (Буш): «As We May Think», Atlantic Monthly, vol. 176, pp. 101–108, July 1945.
CALDER, M., FAN, X., HU, Z., KATZ-BASSETT, E., HEIDEMANN, J. and GOVINDAN, R. (Колдер и др.): «Mapping the Expansion of Google’s Serving Infrastructure», ACM SIGCOMM Internet Measurement Conf., ACM, pp. 313–326, 2013.
CAPETANAKIS, J.I. (Капетанакис): «Tree Algorithms for Packet Broadcast Channels», IEEE Trans. on Information Theory, vol. IT-5, pp. 505–515, Sept. 1979.
CASADO, M., FREEDMAN, M.J., PETIT, J., LUO, J., MCKEOWN, N., and SCHENKER, S. (Касадо и др.): «Ethane: Taking Control of the Enterprise», Proc. SIGCOMM 2007 Conf., ACM, pp. 1–12, 2007.
Наследник
1. Рюрикова кровь
Фантастика:
научная фантастика
попаданцы
альтернативная история
рейтинг книги
