Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 16 Feb 2025Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. ACM
    Valcourt S Major Factors in Science DMZ Deployment at Small Institutions Proceedings of the Practice and Experience on Advanced Research Computing: Seamless Creativity, (1-8)
  2. Azodi A, Cheng F and Meinel C (2017). Event Driven Network Topology Discovery and Inventory Listing Using REAMS, Wireless Personal Communications: An International Journal, 94:3, (415-430), Online publication date: 1-Jun-2017.
  3. Hu R and Yoshida N Explicit Connection Actions in Multiparty Session Types Proceedings of the 20th International Conference on Fundamental Approaches to Software Engineering - Volume 10202, (116-133)
  4. Kettimuthu R, Vardoyan G, Agrawal G and Sadayappan P Modeling and optimizing large-scale wide-area data transfers Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (196-205)
  5. ACM
    Schuster F and Holz T Towards reducing the attack surface of software backdoors Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (851-862)
  6. Liu Z, Veeraraghavan M, Yan Z, Tracy C, Tie J, Foster I, Dennis J, Hick J, Li Y and Yang W On using virtual circuits for GridFTP transfers Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  7. ACM
    Krueger T, Gascon H, Krämer N and Rieck K Learning stateful models for network honeypots Proceedings of the 5th ACM workshop on Security and artificial intelligence, (37-48)
  8. ACM
    Balman M, Pouyoul E, Yao Y, Bethel E, Loring B, Prabhat M, Shalf J, Sim A and Tierney B Experiences with 100Gbps network applications Proceedings of the fifth international workshop on Data-Intensive Distributed Computing Date, (33-42)
  9. ACM
    Kettimuthu R, Link S, Bresnahan J, Link M and Foster I Globus XIO pipe open driver Proceedings of the 2011 TeraGrid Conference: Extreme Digital Discovery, (1-7)
  10. ACM
    Antunes J and Neves N Automatically complementing protocol specifications from network traces Proceedings of the 13th European Workshop on Dependable Computing, (87-92)
  11. ACM
    Liu W, Tieman B, Kettimuthu R and Foster I A data transfer framework for large-scale science experiments Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, (717-724)
  12. ACM
    deGrandis P and Valetto G Elicitation and utilization of application-level utility functions Proceedings of the 6th international conference on Autonomic computing, (107-116)
  13. ACM
    Anastasiadis S, Wickremesinghe R and Chase J (2009). Rethinking FTP, ACM Transactions on Storage (TOS), 4:4, (1-27), Online publication date: 1-Jan-2009.
  14. ACM
    Cui W, Peinado M, Chen K, Wang H and Irun-Briz L Tupni Proceedings of the 15th ACM conference on Computer and communications security, (391-402)
  15. Liaw J, Wu C and Chang L A Distributed File Transfer Protocol based on P-FTP Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, (84-89)
  16. ACM
    Lee A, Winslett M, Basney J and Welch V (2008). The Traust Authorization Service, ACM Transactions on Information and System Security (TISSEC), 11:1, (1-33), Online publication date: 1-Feb-2008.
  17. ACM
    Ford B (2007). Structured streams, ACM SIGCOMM Computer Communication Review, 37:4, (361-372), Online publication date: 1-Oct-2007.
  18. ACM
    Ford B Structured streams Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (361-372)
  19. Nguyen T, Magoulès F and Révillon C GRAVY Proceedings of the 2nd international conference on Advances in grid and pervasive computing, (567-578)
  20. ACM
    Rubin S, Jha S and Miller B Protomatching network traffic for high throughputnetwork intrusion detection Proceedings of the 13th ACM conference on Computer and communications security, (47-58)
  21. Sohail S, Jha S, Kanhere S and Chou C (2006). QoS Driven Parallelization of Resources to Reduce File Download Delay, IEEE Transactions on Parallel and Distributed Systems, 17:10, (1204-1215), Online publication date: 1-Oct-2006.
  22. ACM
    Venugopal S, Buyya R and Ramamohanarao K (2006). A taxonomy of Data Grids for distributed data sharing, management, and processing, ACM Computing Surveys (CSUR), 38:1, (3-es), Online publication date: 29-Jun-2006.
  23. Zheng W, Liu L, Hu M, Wu Y, Li L, He F and Tie J CGSV Proceedings of the 2005 IFIP international conference on Network and Parallel Computing, (22-31)
  24. ACM
    Komu M, Tarkoma S, Kangasharju J and Gurtov A Applying a cryptographic namespace to applications Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (23-27)
  25. ACM
    Walker R and Viggers K (2004). Implementing protocols via declarative event patterns, ACM SIGSOFT Software Engineering Notes, 29:6, (159-169), Online publication date: 1-Nov-2004.
  26. ACM
    Walker R and Viggers K Implementing protocols via declarative event patterns Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (159-169)
  27. Anastasiadis S, Wickremesinghe R and Chase J Circus: Opportunistic Block Reordering for Scalable Content Servers Proceedings of the 3rd USENIX Conference on File and Storage Technologies, (201-212)
  28. ACM
    Allman M On the performance of middleboxes Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (307-312)
  29. ACM
    Shinjo Y, Kubo T and Pu C Efficient mediators through dynamic code generation Proceedings of the 2003 ACM symposium on Applied computing, (1147-1154)
  30. Hoschek W The Web Service Discovery Architecture Proceedings of the 2002 ACM/IEEE conference on Supercomputing, (1-15)
  31. Eckert C and Pircher A Internet anonymity Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (35-50)
  32. Curtin M Shibboleth Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (20-20)
  33. ACM
    Fielding R and Taylor R Principled design of the modern Web architecture Proceedings of the 22nd international conference on Software engineering, (407-416)
  34. Whitehead E and Goland Y WebDAV Proceedings of the sixth conference on European Conference on Computer Supported Cooperative Work, (291-310)
  35. ACM
    Cheshire S and Baker M (2019). Consistent overhead byte stuffing, ACM SIGCOMM Computer Communication Review, 27:4, (209-220), Online publication date: 1-Oct-1997.
  36. ACM
    Cheshire S and Baker M Consistent overhead byte stuffing Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (209-220)
  37. ACM
    Relihan L, Cahill T and Hinchey M Untangling the World-Wide Web Proceedings of the 12th annual international conference on Systems documentation: technical communications at the great divide, (17-24)
  38. Rao H and Peterson L (2019). Accessing Files in an Internet, IEEE Transactions on Software Engineering, 19:6, (613-624), Online publication date: 1-Jun-1993.
  39. ACM
    Kumar B (1993). Effect of packet losses on end-user cost in internetworks with usage based charging, ACM SIGCOMM Computer Communication Review, 23:2, (9-15), Online publication date: 1-Apr-1993.
  40. ACM
    Maffeis S (1993). File access patterns in public FTP archives and an index for locality of reference, ACM SIGMETRICS Performance Evaluation Review, 20:3, (22-35), Online publication date: 1-Mar-1993.
  41. ACM
    Turner C and Peterson L (2019). Image transfer, ACM SIGCOMM Computer Communication Review, 22:4, (258-268), Online publication date: 1-Oct-1992.
  42. ACM
    Turner C and Peterson L Image transfer Conference proceedings on Communications architectures & protocols, (258-268)
  43. ACM
    Saito K (1987). The Sigma network, ACM SIGCOMM Computer Communication Review, 17:5, (88-97), Online publication date: 1-Oct-1987.
  44. ACM
    Saito K The Sigma network Proceedings of the ACM workshop on Frontiers in computer communications technology, (88-97)
Contributors
  • Information Sciences Institute
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations