Back to Results
First PageMeta Content
Network protocols / Communication / Communications protocol / Data transmission / Protocols / Public-key cryptography / Email / Direct Client-to-Client / Actor model / Computing / Information / Internet


Using Strongly Typed Networking to Architect for Tussle Chitra Muthukrishnan† , Vern Paxson‡,¶ , Mark Allman‡ , Aditya Akella† † ‡
Add to Reading List

Document Date: 2010-10-17 18:13:37


Open Document

File Size: 325,52 KB

Share Result on Facebook

City

San Francisco / /

Company

Computer Communication Networks / /

Country

United States / /

Currency

USD / /

/

Event

Person Communication and Meetings / /

Facility

USA International Computer Science Institute / University of California-Berkeley / University of Wisconsin-Madison / /

IndustryTerm

end systems / end-systems / typed protocols / neutral network / pervasive network / typed networking / Internet Technol / law enforcement monitoring / Internet Measurement Conference / Internet architecture calls / private networks / transport protocol / particular applications / sample network / /

Organization

University of California / National Science Foundation / Differentiated Service / University of Wisconsin / USA International Computer Science Institute / /

Person

G. Chun / R. Morris / P. B. Godfrey / J. Stribling / H. Balakrishnan / R. H. Katz / S. Shenker / Scott Shenker / M. Krohn / Kevin Fall / K. H. Kim / R. Fonseca / G. Porter / M. Walfish / Somesh Jha / A. Ermolinskiy / Eric Rescorla / I. Stoica / I. Ganichev / Mark Allman / /

Position

Architect / General / Porter / /

ProgrammingLanguage

R / HTML / /

ProvinceOrState

Nebraska / California / /

Technology

encryption / XML / public key / jpeg / Hypertext Transfer Protocol / transport protocol / HTTP / ISP / private key / caching / MTU / strongly typed protocols / application protocol / UDP / HTML / mobile devices / encrypted using the recipient’s public key / /

SocialTag