(Status: UNKNOWN) (DOI: 10.17487/RFC0061)
0062 Systems for Interprocess Communication in a Resource Shar... s in the Optimization
of Data Communications Systems. V.G. Cerf. May 1971. (Format: TXT,
HTML) (S... 87/RFC0499)
0500 Integration of data management systems on a computer network. A.
Shoshani, I. Spieg... hnical meeting: Digital image processing software systems. W.K.
Pratt. June 1973. (Format: TXT, HTML)
g/info/rfc61>.
RFC0062 | | Walden, D., "Systems for Interprocess Communication in a Resource Shar... oblems in the Optimization of Data Communications Systems", RFC 157, DOI 10.17487/RFC0157, May 1971, <https... and I. Spiegler, "Integration of data management systems on a computer network", RFC 500, DOI 10.17487/RFC... hnical meeting: Digital image processing software systems", RFC 526, DOI 10.17487/RFC0526, June 1973, <http
cess Model
4. Taxonomy of Traffic-Engineering Systems
4.1. Time-Dependent versus State-Dependent ... tralized versus Distributed
4.3.1. Hybrid Systems
4.3.2. Considerations for Software-Define... (online) Internet TE
capabilities and support systems.
Even though Internet TE is most effective wh...
qualitative measures of the performance of systems or subsystems
of interest.
Performance
pers
of DNS protocols, and by operators of DNS systems, has changed in the
decades since the DNS was ... system associates names with data. Naming
systems have many significant facets that help differenti... people have
identified over time for naming systems, and the IETF has yet to
agree on a good se... f facets that can be used to compare naming
systems. For example, other facets might include "protoc
milarly, they
tune real-time content heuristic systems to map their assessments
onto categories of ob... luster of machines
running Intrusion Detection Systems (IDSs) configured for censorship.
Trade-offs:... en used
as a keyword filter for TCP flows, DPI systems can cause also major
over-blocking problems. ... hip
Another feature of some modern censorship systems is residual
censorship, a punitive form of cen
ications. For example, some
popular operating systems still fail to implement transport-protocol
eph... eld can be
exploited to count the number of systems behind a NAT.
October 2003:
OpenBSD imp... ntification
values by a number of operating systems.
June 2011:
[Gont2011] describes how to... ication generators of two
popular operating systems are flawed.
4.2. TCP Initial Sequence Numbers (
poster, or provide credentials for access control systems with
a simple touch.
NFC's bidirectional c... ===+============+===========+==========+
| PLC Systems | Frequency Range | Type | Data | Dist... automation
* home/building energy management systems
* smart street lighting
* AMI backbone ... ace over the High-Voltage
segment. Smart grid systems include AMI, Demand Response, Home
Energy Mana
Cisco Systems
... across an IGP domain or even
across Autonomous Systems (ASes) as required. This allows
applications ... il: arjunhrs@gmail.com
Les Ginsberg
Cisco Systems
United States of America
Email: ginsberg@ci... ra.ietf@gmail.com
Clarence Filsfils
Cisco Systems
Belgium
Email: cfilsfil@cisco.com
Keta
0-1721 Cisco Systems, Inc.
... Cisco Systems, Inc.
... Ramakrishnan Chokkanathapuram Sundaram
Cisco Systems, Inc.
Tasman Drive
San Jose, CA 95134
Un... l: rbanthia@apstra.com
Ananya Gopal
Cisco Systems, Inc.
Tasman Drive
San Jose, CA 95134
Un
Cisco Systems
Category: Standards Track ... cee.ietf@gmail.com
Ketan Talaulikar
Cisco Systems
India
Email: ketant.ietf@gmail.com
Han... ors' Addresses
Peter Psenak (editor)
Cisco Systems
Slovakia
Email: ppsenak@cisco.com
Les Ginsberg
Cisco Systems
United States of America
Email: ginsberg@ci
resource usage by BFD from "unexpected" remote systems. To mitigate
such risks, several mechanisms a... ve resource usage by BFD from "unexpected" remote systems. To
mitigate such risks, implementations of u
ginally introduced in the context of digital cash systems by Chaum
for untraceable payments [Chaum83], R... Diffie-Hellman, RSA, DSS, and Other Systems", Advances in
Cryptology - CRYPTO '
e this and other similar mechanisms.
Operating systems could continually protect their users by ensuring... Line Rate", Network and Distributed
Systems Security (NDSS) Symposium,
DOI 10.1
e. The solution can coexist in a network with systems supporting or
not supporting this specification. Non-supporting systems ignore
the B-MAC/I-SID routes; however, th