Author:
Wang Li-Jing,Lv Yong-Qiang,Moiseenko Ilya,Wang Dong-Sheng
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference19 articles.
1. Jacobson V, Smetters D K, Thornton J D, Plass M F, Briggs N H, Braynard R L. Networking named content. In Proc. the 5th Int. Conf. Emerging Networking Experiments and Technologies, December 2009.
2. Zhang L X, Estrin D, Burke J, Jacobson V, Thornton J D, Smetters D K, Zhang B C, Tsudik G, Claffy K, Krioukov D, Massey D, Papadopoulos C, Abdelzaher T, Wang L, Crowley P, Yeh E. Named Data Networking (NDN) project. PARC Technical Report 2010-003, 2010. http://www.parc.com/content/attachments/named-data-networking.pdf , Dec. 2017
3. Zhang L X, Afanasyev A, Burke J, Jacobson V, Crowley P, Papadopoulos C, Wang L, Zhang B C. Named data networking. ACM SIGCOMM Computer Communication Review, 2014, 44(3): 66-73.
4. Yi C, Abraham J, Afanasyev A,Wang L, Zhang B C, Zhang L X. On the role of routing in Named Data Networking. In Proc. the 1st ACM Conf. Information-Centric Networking, September 2014, pp.27-36.
5. Yi C, Afanasyev A, Wang L, Zhang B C, Zhang L X. Adaptive forwarding in Named Data Networking. ACM SIGCOMM Computer Communication Review, 2012, 42(3): 62-67.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vision: information-centric dataflow;Proceedings of the 8th ACM Conference on Information-Centric Networking;2021-09-22
2. Detecting and Mitigating DDoS Attack in Named Data Networking;Journal of Network and Systems Management;2020-05-30