31![Joint Design of Multicast Loss Recovery and Forwarding Service Extensions Adam M. Costello http://www.cs.berkeley.edu/˜amcMay-05 Joint Design of Multicast Loss Recovery and Forwarding Service Extensions Adam M. Costello http://www.cs.berkeley.edu/˜amcMay-05](https://www.pdfsearch.io/img/d5a32343a81b335e954d91108f2cc21c.jpg) | Add to Reading ListSource URL: www.nicemice.netLanguage: English - Date: 1999-11-07 15:38:21
|
---|
32![Implementing Policy Control as a Virtual Network Function: Challenges and Considerations An Industry Whitepaper Contents Implementing Policy Control as a Virtual Network Function: Challenges and Considerations An Industry Whitepaper Contents](https://www.pdfsearch.io/img/050d7501760ed658110a259edbf35919.jpg) | Add to Reading ListSource URL: www.sandvine.comLanguage: English |
---|
33![Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Jennifer Rexford Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Jennifer Rexford](https://www.pdfsearch.io/img/9edbc0245712c49b1915595c766a1d55.jpg) | Add to Reading ListSource URL: conferences.sigcomm.orgLanguage: English - Date: 2009-07-22 15:07:29
|
---|
34![IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARYEfficient and Dynamic Routing Topology Inference From End-to-End Measurements IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARYEfficient and Dynamic Routing Topology Inference From End-to-End Measurements](https://www.pdfsearch.io/img/8e03c44158a8587819d3de3bb06453eb.jpg) | Add to Reading ListSource URL: www.ifp.illinois.eduLanguage: English - Date: 2010-07-21 12:11:11
|
---|
35![bloc marque driving trust cmjn bloc marque driving trust cmjn](https://www.pdfsearch.io/img/1326f194ea75a4b420ce768dca3e5e2a.jpg) | Add to Reading ListSource URL: www.insidesecure.comLanguage: English |
---|
36![Secure and Scalable Fault Localization under Dynamic Traffic Patterns Secure and Scalable Fault Localization under Dynamic Traffic Patterns](https://www.pdfsearch.io/img/457530ee9eaf9feaf6b639e2a7274c50.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2012-05-22 01:34:31
|
---|
37![Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui](https://www.pdfsearch.io/img/958fa5626e120e818bc2129f138d0eee.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-05-06 01:09:23
|
---|
38![Fractional Lambda Switching™ Mario Baldi and Yoram Ofek Synchrodyne Networks, Inc. 75 Maiden Lane, Suite 317 New York, NY10038 Abstract - Fractional Lambda (λ Fractional Lambda Switching™ Mario Baldi and Yoram Ofek Synchrodyne Networks, Inc. 75 Maiden Lane, Suite 317 New York, NY10038 Abstract - Fractional Lambda (λ](https://www.pdfsearch.io/img/f47e62769386c1e8fe202ae9eb67becb.jpg) | Add to Reading ListSource URL: netgroup.polito.itLanguage: English - Date: 2007-11-05 06:22:54
|
---|
39![draft-ietf-rtgwg-mofrr-06 - Multicast only Fast Re-Route draft-ietf-rtgwg-mofrr-06 - Multicast only Fast Re-Route](https://www.pdfsearch.io/img/8a8ae729c5dcaa9897a9672b94d7c70d.jpg) | Add to Reading ListSource URL: tools.ietf.orgLanguage: English - Date: 2015-05-22 11:03:01
|
---|
40![IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, 1 AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, 1 AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks](https://www.pdfsearch.io/img/64c36880a2a480e758a1a6aeedee5d2d.jpg) | Add to Reading ListSource URL: www2.engr.arizona.eduLanguage: English - Date: 2012-12-13 01:47:45
|
---|