http:^^www.cs.wisc.edu^~cs640-1^s96-schedule.html

来自「This data set contains WWW-pages collect」· HTML 代码 · 共 190 行

HTML
190
字号
Date: Tue, 05 Nov 1996 20:52:51 GMTServer: NCSA/1.5Content-type: text/htmlLast-modified: Thu, 18 Apr 1996 17:06:43 GMTContent-length: 6035<html><head><title> Class Schedule </title></head><body><h1> Spring 1996 Class Schedule </h1><pre>* = papers to DOIT % = papers available online1/22 - Introduction1/24 - No Class1/26 - No Class1/29 - Landweber - Overview of Internet1/31 - Landweber R. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," CACM 21, (February 1978), pp. 120-126.2/2 - No Class2/5 - No Class2/7 - No Class*2/9 - Weiqing Huang G. Wallace, "The JPEG Still Picture Compression Standard," 2/12 - No Class*2/14 - Jim BasneyS. Deering, D. Cheriton, "Multicast Routing in Datagram Internetworksand Extended LANs," TOCS 8, (May 1990), pp. 85-110.%2/16 - A. BiggsM. Peirce, D. O'Mahony, "Scalable, Secure, Cash Payment for WWW Resources with the PayMe Protocol Set," Fourth International World Wide Web Conference December 1995. Boston, Massachusetts. <!WA0><a href="http://www.w3.org/pub/Conferences/WWW4/Papers/228/">Peirce Paper</a>%2/19 - A. OgrenR. Atkinson, "Security Architecture for the Internet Protocol,"Request for Comments: 1825 August 1995.  <!WA1><a href="http://www.cs.wisc.edu/~cs640-1/security-ip.text">IP Security Paper</a> %2/21 - Brian ColeR. Braden, L. Zhang, S.Berson, S. Herzog, J. Wroclawski, "ResourceReservation Protocol (RSVP) - Version 1 Functional Specification,"Internet Draft: draft-ietf-rsvp-spec-08.ps, November 22, 1995.<!WA2><a href="http://www.cs.wisc.edu/~cs640-1/rsvp.ps">RSVP Paper</a> - review pages 1-56.%2/23 - Tony MoyC. Bowman, P. Danzig, D. Hardy, U. Manber, M. Schwartz, and D. Wessels, "Harvest: A Scalable, Customizable Discovery and Access System," Technical Report CU-CS-732-94, Department of Computer Science, University of Colorado, Boulder, August 1994 (revised March 1995). Submitted for publication.  <!WA3><a href="http://www.cs.wisc.edu/~cs640-1/harvest.ps">Harvest Paper</a>*2/26 - Muralidhar KrishnaprasadJ. Steiner, C. Neuman, J. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Winter Usenix Conference, Dallas, 1988. *2/28 - Donko DonjerkovicS. Deering, D. Estrin, D. Farinacci, V. Jacobson, "An Architecture for Wide-area Multicast Routing," ACM SIGCOMM 94, pp. 126-135.%3/1 - Zeyu Chen S. Bellovin, "Security Problems in the TCP/IP Protocol Suite," CCR 19 (April 1989), pp. 32-48. <!WA4><a href="http://www.cs.wisc.edu/~cs640-1/bellovin.ps">Bellovin Paper</a>*3/4 - Qi JinV. Paxson, S. Floyd,  "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. on Networking 3 (June 1995), pp. 226-244.*3/6 Srinivasa NarayananS. Kent, "Internet Privacy Enhanced Mail," CACM 36 (August 1993), pp. 48-59.3/8 - No Class3/11 - Spring Break3/13 - Spring Break3/15 - Spring Break3/18 *3/20 - Maryan StubbsL. Brakmo, L. Peterson, "TCP Vegas: End to End Congestion Avoidance on a Global Internet," IEEE JSAC 13 (October 1995), pp. 1465-1480.3/22 - No Class*3/25 - Rob MellencampD. Mills, "Improved Algorithms for Synchronizing Computer Network Clocks," IEEE/ACM Trans. on Networking 3 (June 1995), pp. 245-254.%3/27 - Tim JungC. Perkins, "IP Mobility Support," (draft-ietf-mobileip-protocol-15.txt),February 9, 1996. <!WA5><a href = "http://www.cs.wisc.edu/~cs640-1/draft-ietf-mobileip-protocol-15.txt">Mobile IP </a>%3/29 - Bill AlfordJ. Scourias, "Overview of the Global System for Mobile Communications,"University of Waterloo, May 19, 1995. <!WA6><a href="http://www.cs.wisc.edu/~cs640-1/gsmreport.ps">GSM</a>(http://ccnga.uwaterloo.ca/~jscouria/GSM/)*4/1 - Wenjun QiuR. Banchini, H. Kim, "The Tera Project: A Hybrid Queueing ATM SwitchArchitecture for LANs," IEEE JSAC 13 (May 1995), pp. 673-685.%4/3 - Zhongbin YinT. Berners-Lee, R. Fielding, H. Frystyk, "Hypertext Transfer Protocol - HTTP/1.0," Internet Draft (draft-ietf-http-v10-speci-05.txt) Expires 8/19/96. <!WA7><a href="http://www.cs.wisc.edu/~cs640-1/draft-ietf-http-v10-spec-05.txt">HTTP/1.0</a>4/5 - Good Friday4/8 - No Class%4/10 - Nathan BockrathJ. Mogul, "The Case for Persistent-Connection HTTP," ACM Sigcomm 95,pp. 299-313.  Following is DEC WRL Research Report 95/4 <!WA8><a href="http://www.cs.wisc.edu/~cs640-1/mogul.ps">Mogul Paper</a>*4/12 - Xinyi Wang S. Jamin, B. Danzig, S. Shenker, L. Zhang, "A Measurement-based Admission Control Algorithm for Integrated Services Packet Networks," ACM Sigcomm 95, pp. 2-13.%4/15 - Steven FoughtP. Barham, M. Hayter, D. McAuley, I. Pratt, "Devices on the Desk AreaNetwork," IEEE Journal on Selected Areas in Communications, May 1995.<!WA9><a HREF="http://www.cs.wisc.edu/~cs640-1/desk-area-net.ps">Paper</A>*4/17 - Chengjie LiuR. Bagrodia, W. Chu, L. Kleinrock, G.Popek, "Vision, Issues, and Architecture for Nomadic Computing," IEEE Personal CommunicationsDecember 1995, pp. 14-27.%4/19 - Lei CaoJ. Case, K. McCloghrie, M. Rose, S. Waldbusser, " Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2),"RFC 1905, January 1996. <!WA10><a href="http://www.cs.wisc.edu/~cs640-1/snmpv2.txt">SNMP V2</a>K. McCloghrie, Editor, "Administrative Infrastructure for SNMPv2,"RFC 1909, February 1996. <!WA11><a href="http://www.cs.wisc.edu/~cs640-1/snmpv2-admin.txt">REVIEW THIS ONE</a>*4/22 - Yufei ZhuF. Toubagi, "Fast Packet Switch Architectures for Broad-band Integrated Services Digital Networks"%4/24 - Mohamed Asgarian S. Keshav, "On the Efficient Implementation of Fair Queueing"Journal of Internetworking 2, pp. 157-173, September 1991.<!WA12><a href="http://www.cs.wisc.edu/~cs640-1/keshav.ps">Fair Queuing"</a>4/26 - No Class%4/29 - Dan PrinceC. Venkatramani, T. Chiueh, "Design, Implementation, and Evaluation of a Software-based Real-Time Ethernet Protocol," ACM Sigcomm 95, pp. 27-37.<!WA13><a href="http://www.cs.wisc.edu/~cs640-1/real-time-ethernet.ps">Paper</a>%5/1 - Ben Teitelbaum Peter B. Danzig, Katia Obraczka, Anant Kumar, "An Analysis of Wide-Area Name Server Traffic". <!WA14><a href="http://www.cs.wisc.edu/~cs640-1/dns.ps">Review This One</a>P. Mockapetris, "Doamin Name -- Concepts and Facilities", RFC 1034, November 1987. <!WA15><a href="http://www.cs.wisc.edu/~cs640-1/dns.txt">DNS REFERENCE</a>%5/3 Dhaval ShahD. Dean, D. Wallach, "Security Flaws in the HotJava Web Browser," CS Dept.  Technical Report TR-501-95, Princeton Univ., November 1995. <!WA16><a href="http://www.cs.wisc.edu/~cs640-1/hotjava.ps">Hot Java Paper</a>F. Yellin, "Low Level Security in Java." Fourth International World Wide Web Conference, Boston, December 1995. <!WA17><a href="http://www.cs.wisc.edu/~cs640-1/java.html">Java Paper</a>5/65/85/10</pre></body></html>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?