Abstract
No abstract available.
RFC Downloads
ZIP
Cited By
- Valcourt S Major Factors in Science DMZ Deployment at Small Institutions Proceedings of the Practice and Experience on Advanced Research Computing: Seamless Creativity, (1-8)
- Azodi A, Cheng F and Meinel C (2017). Event Driven Network Topology Discovery and Inventory Listing Using REAMS, Wireless Personal Communications: An International Journal, 94:3, (415-430), Online publication date: 1-Jun-2017.
- Hu R and Yoshida N Explicit Connection Actions in Multiparty Session Types Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (116-133)
- Kettimuthu R, Vardoyan G, Agrawal G and Sadayappan P Modeling and optimizing large-scale wide-area data transfers Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (196-205)
- Schuster F and Holz T Towards reducing the attack surface of software backdoors Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (851-862)
- Liu Z, Veeraraghavan M, Yan Z, Tracy C, Tie J, Foster I, Dennis J, Hick J, Li Y and Yang W On using virtual circuits for GridFTP transfers Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
- Krueger T, Gascon H, Krämer N and Rieck K Learning stateful models for network honeypots Proceedings of the 5th ACM workshop on Security and artificial intelligence, (37-48)
- Balman M, Pouyoul E, Yao Y, Bethel E, Loring B, Prabhat M, Shalf J, Sim A and Tierney B Experiences with 100Gbps network applications Proceedings of the fifth international workshop on Data-Intensive Distributed Computing Date, (33-42)
- Kettimuthu R, Link S, Bresnahan J, Link M and Foster I Globus XIO pipe open driver Proceedings of the 2011 TeraGrid Conference: Extreme Digital Discovery, (1-7)
- Antunes J and Neves N Automatically complementing protocol specifications from network traces Proceedings of the 13th European Workshop on Dependable Computing, (87-92)
- Liu W, Tieman B, Kettimuthu R and Foster I A data transfer framework for large-scale science experiments Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, (717-724)
- deGrandis P and Valetto G Elicitation and utilization of application-level utility functions Proceedings of the 6th international conference on Autonomic computing, (107-116)
- Anastasiadis S, Wickremesinghe R and Chase J (2009). Rethinking FTP, ACM Transactions on Storage (TOS), 4:4, (1-27), Online publication date: 1-Jan-2009.
- Cui W, Peinado M, Chen K, Wang H and Irun-Briz L Tupni Proceedings of the 15th ACM conference on Computer and communications security, (391-402)
- Liaw J, Wu C and Chang L A Distributed File Transfer Protocol based on P-FTP Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, (84-89)
- Lee A, Winslett M, Basney J and Welch V (2008). The Traust Authorization Service, ACM Transactions on Information and System Security (TISSEC), 11:1, (1-33), Online publication date: 1-Feb-2008.
- Ford B (2007). Structured streams, ACM SIGCOMM Computer Communication Review, 37:4, (361-372), Online publication date: 1-Oct-2007.
- Ford B Structured streams Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (361-372)
- Nguyen T, Magoulès F and Révillon C GRAVY Proceedings of the 2nd international conference on Advances in grid and pervasive computing, (567-578)
- Rubin S, Jha S and Miller B Protomatching network traffic for high throughputnetwork intrusion detection Proceedings of the 13th ACM conference on Computer and communications security, (47-58)
- Sohail S, Jha S, Kanhere S and Chou C (2006). QoS Driven Parallelization of Resources to Reduce File Download Delay, IEEE Transactions on Parallel and Distributed Systems, 17:10, (1204-1215), Online publication date: 1-Oct-2006.
- Venugopal S, Buyya R and Ramamohanarao K (2006). A taxonomy of Data Grids for distributed data sharing, management, and processing, ACM Computing Surveys (CSUR), 38:1, (3-es), Online publication date: 29-Jun-2006.
- Zheng W, Liu L, Hu M, Wu Y, Li L, He F and Tie J CGSV Proceedings of the 2005 IFIP international conference on Network and Parallel Computing, (22-31)
- Komu M, Tarkoma S, Kangasharju J and Gurtov A Applying a cryptographic namespace to applications Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (23-27)
- Walker R and Viggers K (2004). Implementing protocols via declarative event patterns, ACM SIGSOFT Software Engineering Notes, 29:6, (159-169), Online publication date: 1-Nov-2004.
- Walker R and Viggers K Implementing protocols via declarative event patterns Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (159-169)
- Anastasiadis S, Wickremesinghe R and Chase J Circus: Opportunistic Block Reordering for Scalable Content Servers Proceedings of the 3rd USENIX Conference on File and Storage Technologies, (201-212)
- Allman M On the performance of middleboxes Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (307-312)
- Shinjo Y, Kubo T and Pu C Efficient mediators through dynamic code generation Proceedings of the 2003 ACM symposium on Applied computing, (1147-1154)
- Hoschek W The Web Service Discovery Architecture Proceedings of the 2002 ACM/IEEE conference on Supercomputing, (1-15)
- Eckert C and Pircher A Internet anonymity Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (35-50)
- Curtin M Shibboleth Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (20-20)
- Fielding R and Taylor R Principled design of the modern Web architecture Proceedings of the 22nd international conference on Software engineering, (407-416)
- Whitehead E and Goland Y WebDAV Proceedings of the sixth conference on European Conference on Computer Supported Cooperative Work, (291-310)
- Cheshire S and Baker M (2019). Consistent overhead byte stuffing, ACM SIGCOMM Computer Communication Review, 27:4, (209-220), Online publication date: 1-Oct-1997.
- Cheshire S and Baker M Consistent overhead byte stuffing Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (209-220)
- Relihan L, Cahill T and Hinchey M Untangling the World-Wide Web Proceedings of the 12th annual international conference on Systems documentation: technical communications at the great divide, (17-24)
- Rao H and Peterson L (2019). Accessing Files in an Internet, IEEE Transactions on Software Engineering, 19:6, (613-624), Online publication date: 1-Jun-1993.
- Kumar B (1993). Effect of packet losses on end-user cost in internetworks with usage based charging, ACM SIGCOMM Computer Communication Review, 23:2, (9-15), Online publication date: 1-Apr-1993.
- Maffeis S (1993). File access patterns in public FTP archives and an index for locality of reference, ACM SIGMETRICS Performance Evaluation Review, 20:3, (22-35), Online publication date: 1-Mar-1993.
- Turner C and Peterson L (2019). Image transfer, ACM SIGCOMM Computer Communication Review, 22:4, (258-268), Online publication date: 1-Oct-1992.
- Turner C and Peterson L Image transfer Conference proceedings on Communications architectures & protocols, (258-268)
- Saito K (1987). The Sigma network, ACM SIGCOMM Computer Communication Review, 17:5, (88-97), Online publication date: 1-Oct-1987.
- Saito K The Sigma network Proceedings of the ACM workshop on Frontiers in computer communications technology, (88-97)
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
A file transfer protocol and implementation
This paper presents a file transfer service in a heterogeneous computer network (HMINET). The basic architecture models are presented, the file transfer protocol is described and the implementation in the HMINET is shown with the functional capabilities ...