\REF{[1]} Subin Shen, Guanqun Gu. Network architectures and solutions to network problems. {\it Journal of Southeast University (Natural Science Edition)}, 1999, 29(5): 1--10. (in Chinese) \REF{[2]} Clark D, Wroclawski J, Sollins K \it et al. \rm Tussle in cyberspace: Defining tomorrow's Internet. In {\it Proc. ACM SIGCOMM'02}, Pittsburgh, PA, August 19--23, 2002, pp.347--356. \REF{[3]} Blumenthal M S, Clark D D. Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world. {\it ACM Trans. Internet Technology}, August 2001, 1(1): 70--109. \REF{[4]} Saltzer J H, Reed D P, Clark D D. End-to-end arguments in system design. {\it ACM Trans. Computer Systems}. 1984, 2(4): 277--288. \REF{[5]} Chuang Lin, Fengyuan Ren. Controllable, trustworthy and scalable new generation Internet. {\it Journal of Software}, December 2004, 15(12): 1815--1821. (in Chinese) \REF{[6]} Carpenter B. Internet transparency. {RFC 2775}, Feb. 2000. \REF{[7]} Bush R, Meyer D. Some Internet architectural guidelines and philosophy. {RFC 3439}, December 2002. \REF{[8]} Bocking S. Object-oriented network protocols. In {\it Proc. IEEE INFOCOM'97}, Kobe, Japan, 1997, pp.1245--1252. \REF{[9]} Clark D, Chapin L, Cerf V \it et al. \rm Towards the future Internet architecture. {RFC1287}, December 1991. \REF{[10]} Tennenhouse D. Layered multiplexing considered harmful. In {\it Proc. IFIP Workshop on Protocols for High-Speed Networks}, North Holland, Amsterdam, 1989, pp.143--148. \REF{[11]} Clark D, Tennenhouse D. Architectural considerations for a new generation of protocols. {\it ACM SIGCOMM Computer Communications Review}, 1990, 20(4): 200--208. \REF{[12]} Tennenhouse D L, Smith J M, Sincoskie W D \it et al. \rm A survey of active network research. {\it IEEE Communications Magazine}, 1997, 35(1): 80--86. \REF{[13]} Campbell A T, De Meer H G, Kounavis M E \it et al. \rm A survey of programmable networks. {\it ACM SIGCOMM Computer Communication Review}, April 1999, 29(2): 7--23. \REF{[14]} NewArch Project: Future-Generation Internet Architecture. {\it http://www.isi.edu/newarch/}. \REF{[15]} Clark D D, Partridge C, Ramming J C \it et al. \rm A knowledge plane for the Internet. In {\it Proc. ACM SIGCOMM'03}, Karlsruhe, Germany, August 25--29, 2003, pp.3--10. \REF{[16]} PlanetLab. http://www.planet-lab.org. \REF{[17]} CNGI. http://www.ndrc.gov.cn/gjscy/xxcy2/t20050714\_35576. htm. \REF{[18]} Computer Science and Telecommunications Board (CSTB), National Research Council. Realizing the Information Future: The Internet and Beyond. Washington DC: National Academy Press, 1994. \REF{[19]} Peng Yang, Jiagao Wu. Interaction based, service oriented model of network architecture. {\it Acta Electronica Sinica}, 2005, 33(5): 804--809. (in Chinese) \REF{[20]} Studt C. An analysis of ``quality of service''. University of Illinois at Chicago, USA, 2003, http://www. mythdragon.com/QoS/. \REF{[21]} Tangmunarunkit H, Govindan R, Shenker S \it et al. \rm The impact of routing policy on Internet paths. In {\it Proc. IEEE INFOCOM'01}, Anchorage, AK, April 2001, pp.736--742. \REF{[22]} Mankin F, Braden B B \it et al. \rm RSVP applicability and deployment. {RFC2208}, September 1997. \REF{[23]} Xipeng Xiao, Lionel M Ni. Internet QoS: A big picture. {\it IEEE Network}, 1999, 13(2): 8--18. \REF{[24]} Nichols K, Blake S, Baker F \it et al. \rm Definition of the differentiated services field (DS field) in the IPv4 and IPv6 headers. {RFC2474}, December 1998. \REF{[25]} Blake S, Black D, Carlson M \it et al. \rm An architecture for differentiated services. {RFC 2475}, December 1998. \REF{[26]} Rosen E, Viswanathan A, Callon R. Multiprotocol label switching architecture. {RFC3031}, January 2001. \REF{[27]} Crawley E, Nair R, Rajagopalan B \it et al. \rm A framework for QoS-based routing in the Internet. {RFC2386}. August 1998. \REF{[28]} Mazumdar R R, Mason L, Douligeris C. Fairness in network optimal flow control: Optimality of productforms. {\it IEEE Trans. Communications}, 1991, 39(5): 775--782. \REF{[29]} Shigang Chen, S Nahrstedt K. An overview of Quality-of-Service routing for the next generation high-speed networks: Problems and solutions. {\it IEEE Network}, 1998, 12(6): 64--79. \REF{[30]} Floyd S, Jacobson V. Random early detection gateways for congestion avoidance. {\it IEE/ACM Trans. Networking}, 1993, 1(4): 397--413. \REF{[31]} Hollot C, Misra V, Towsley D, Gong W B. On designing improved controllers for AQM routers supporting TCP flows. In {\it Proc. IEEE INFOCOM'01}, Anchorage, Alaska, 2001, pp.1726--1734. \REF{[32]} Bailey J, McKnight L. Internet Economics. Cambridge: MIT Press, 1997. \REF{[33]} Shenker S. Fundamental design issues for the future Internet. {\it IEEE Journal on Selected Areas in Communications}, September 1995, 13(7): 1176--1188. \REF{[34]} Yongqiang Dong, Jun Tao, Xiaojun Ma. A feedback merging algorithm based on utility distance in adaptive layered multicast. {\it Journal of China Institute of Communications}, 2004, 25(2): 16--25. (in Chinese) \REF{[35]} Yongqiang Dong, Jun Tao, Qijin Ji. Welfare-economic model of the network resource allocation. {\it Journal of Southeast University (Natural Science Edition)}, 2005, 35(3): 361--365. (in Chinese) \REF{[36]} Jun Tao. Research on the key technologies of QoS-allocation based on non-cooperative game theory model [Dissertation]. Southeast University, 2005. (in Chinese) \REF{[37]} Klerer S Mark. The OSI management architecture: An overview. {\it IEEE Network Magazine}, 1988, 2(2): 20--29. \REF{[38]} Fedor M, Schoffstall M, Davin C \it et al. \rm A simple network management protocol (SNMP). {RFC1098}, April 1989. \REF{[39]} Jun Shen, Yun Yang. RDF-based knowledge model for network management. In {\it Proc. 8th IFIP/IEEE International Symposium on Integrated Network Management (IM2003)}, Colorado, USA, 2003, pp.123--126. \REF{[40]} Hinrichs S. Integrating changes to a hierarchical policy model. In {\it 9th IFIP/IEEE Int. Symp. Integrated Network Management (IM2005)}, Nice, France, May 16--19, 2005, pp.441--454. \REF{[41]} Tripathi A, Ahmed T, Pathak S \it et al. \rm Paradigms for mobile agent based active monitoring of network systems. In {\it Proc. IEEE Network Operation and Management Symposium (NOMS 2002)}, Florence, Italy, 2002, pp.65--78. \REF{[42]} Xiaoyun Wang, Hongbo Yu. How to break MD5 and other hash functions. In {\it Proc. Eurocrypt'2005: 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques}, Aarhus, Denmark, May 22--26, 2005, pp.19--35. \REF{[43]} Xiaoyun Wang, Xuejia Lai, Dengguo Feng \it et al. \rm Cryptanalysis of the hash functions MD4 and RIPEMD. In {\it Proc. Eurocrypt'2005: 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques}, Aarhus, Denmark, May 22--26, 2005, pp.1--18. \REF{[44]} Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In {\it Proc. IEEE Int. Conf. Computers, Systems and Signal Processing}, Bangalore, India; New York, 1984, pp.175--179. \REF{[45]} Bennett C H, Brassard G \it et al. \rm Experimental quantum cryptography. {\it Journal of Cryptology}, 1992, 5(1): 3--28. \REF{[46]} Ekert A. Quantum cryptography based on Bell's theorem. {\it Phys. Rev. Lett}., 1991, 67: 661--663. \REF{[47]} Bennett C H. Quantum cryptography using any two nonorthogonal states. {\it Phy. Rev. Lett}, 1992, 68: 3121--3123. \REF{[48]} Szabolcs Szigeti, P\'eter Risztics. Will IPv6 bring better security? In {\it Proc. 30th Euromicro Conference (Euromicro'04)}, Rennes, France, September 2004, pp.532--537. \REF{[49]} Chaterine A Meadows. Formal verification of cryptographic protocols: A survey. In {\it Proc. 4th Int. Conf. the Theory and Applications of Cryptology: Advances in Cryptology}, Wollongong, Australia, November 28--December 1, 1994, pp.135--150. \REF{[50]} Levente Buttyan. Formal methods in the design of cryptographic protocols. {\it Technical Report SSC/1999/038}, Swiss Federal Institute of Technology, Institute for Computer Communications and Applications (ICA), November 1999. \REF{[51]} Botao Li, Junzhou Luo. Modeling and analysis of non-repudiation protocols by using Petri nets. {\it J. Computer Research and Development}, 2005, 42(9): 1571--1577. (in Chinese) \REF{[52]} Catherine Meadows. Formal methods for cryptographic protocol analysis: Emerging issues and trends. {\it IEEE Journal on Selected Areas in Communications}. 2003, 21(1): 44--54. \REF{[53]} Clark D, Pasquale J \it et al. \rm Strategic directions in networks and telecommunications. {\it ACM Computing Surveys}, 1996, 28(4): 679--690. \REF{[54]} Anderson J P. Computer security technology planning study. {\it ESD-TR-73-51}, Vol.II, ESD/AFSC, Hanscom Field, Bedford, MA 01730, October, 1972. \REF{[55]} Milojicic D. Middleware's role, today and tomorrow. {\it IEEE Concurrency}, 1999, 7(2): 70--80. \REF{[56]} The Open Group. DCE 1.1: Remote procedure call. {Open Group Technical Standard, Document Number C706}, August 1997. \REF{[57]} Schmidt D C, Vinoski S. Comparing alternative client-side distributed programming techniques (column 3). SIGS C++ Report, May 1995, 7(4). \REF{[58]} Schmidt D C, Vinoski S. Comparing alternative server distributed programming techniques. SIGS C++ Report, October 1995, 7(8). \REF{[59]} Menasce D A. MOM vs. RPC: Communication models for distributed applications. {\it IEEE Internet Computing}, 2005, 9(2): 90--93. \REF{[60]} Junqing Xie, Yun Wang, Guanqun Gu. ORBUS: An implementation of CORBA specification. {\it Journal of Software}, 1998, 9(Supplement): 192--196. \REF{[61]} Junqing Xie, Yun Wang, Guanqun Gu. CORBA specification, implementation and application in CIMS environment. {\it Computer Integrated Manufacturing System}, 1999, 5(2): 16--20. \REF{[62]} Zhuowei Shen, Junqing Xie, Yun Wang. Research on end-to-end scheduling model for real-time CORBA system and its schedulability. {\it Chinese Journal of Computers}, 2003, 26(4): 397--405. (in Chinese) \REF{[63]} Zhuowei Shen, Yun Wang. Improved schedulability analysis algorithm for end-to-end real-time CORBA scheduling model. {\it Journal of Southeast University (Natural Science Edition)}, 2003, 33(6): 685--688. \REF{[64]} Yun Wang, Emmanuelle Anceaume, Francisco Brasileiro \it et al. \rm Solving the group priority inversion problem in a timed asynchronous system. {\it IEEE Trans. Computers}, 2002, 51(8): 900--915. \REF{[65]} Elizabeth M R, Santa Barbara. A review of current routing protocol for ad hoc mobile wireless networks. {\it IEEE Personal Communication}, 1999, 6(2): 46--55. \REF{[66]} Hong D, Rappaport S S. Traffic model and performance analysis for cellular mobile radio telephone system with prioritized and non-prioritized handoff procedures. {\it IEEE Trans. Vehicular Technology}, 1986, 35(3): 77--92. \REF{[67]} Xue Zhang. Survey on call admission control models in wireless mobile networks. {\it Journal of Communications}, 2005, 26(8): 99--106. (in Chinese) \REF{[68]} Fang Y, Chlamtac I. A new mobility model and its application in the channel holding time characterization in PCS networks. In {\it Proc. IEEE INFOCOM '99, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies}, New York, USA, Mar. 1999, 1: 20--27. \REF{[69]} Levine D A, Akyildiz I F, Naghshineh M. A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept. {\it IEEE/ACM Trans. Networking}, 1997, 5(1): 1--12. \REF{[70]} Jiang J, Lai T H. Call admission control vs. bandwidth reservation: Reducing handoff call dropping rate and providing bandwidth efficiency in mobile networks. In {\it Proc. 2000 Int. Conf. Parallel Processing}, Toronto, Canada, August 2000, pp.581--588. \REF{[71]} Kwon T, Choi Y, Bisdikian C \it et al. \rm QoS provisioning in wireless/mobile multimedia networks using an adaptive framework. {\it ACM Wireless Networks}, 2003, 9(1): 51--59. \REF{[72]} Xue Zhang. Pricing based adaptive call admission control algorithm for wireless networks. {\it Engineering Science}, 2005, 8(4): 32--38. (in Chinese) \REF{[73]} Linfeng Liu, Ye Liu. Dynamic management scheme of multilevel hierarchical mobile IPv6. {\it Journal of Southeast University (Natural Science Edition)}, 2005, 35(6): 838--842. (in Chinese) \REF{[74]} Subramanian L, Stoica I, Balakrishnan H \it et al. \rm OverQoS: Offering Internet QoS using overlays. {\it ACM SIGCOMM Computer Communication Review}, 2003, 33(1): 11--16. \REF{[75]} Chu Y H, Rao S G, Zhang H. A case for end system multicast. In {\it Proc. 2000 ACM SIGMETRICS Int. Conf. Measurement and Modeling of Computer Systems}, June 2000, pp.1--12. \REF{[76]} Balakrishnan H, Snoeren A C. An end-to-end approach to host mobility. In {\it Proc. 6th Annual Int. Conf. Mobile Computing and Networking}, Boston, Massachusetts, 2000, pp.155--166. \REF{[77]} Jiagao Wu, Xiaoguo Ye, Aiquan Jiang. A routing algorithm in heterogeneous overlay multicast networks. {\it Journal of Software}, 2005, 16(6): 1112--1120. (in Chinese) \REF{[78]} Stoica I, Morris R, Karger D \it et al. \rm Chord: A scalable peer-to-peer lookup service for Internet applications. In {\it Proc. ACM SIGCOMM'01}, San Diego, California, Aug. 2001, pp.149--160. \REF{[79]} Rowstron A, Druschel P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In {\it Proc. 18th IFIP/ACM Int. Conf. Distributed Systems Platforms (Middleware 2001)}, Heidelberg, Germany, November 2001, pp.329--350. \REF{[80]} Ye Liu, Peng Yang. Study on mechanism of trust management to P2P networks based on the repeated game theory. {\it Journal of Computer Research and Development}, 2006, 43(4): 586--593. (in Chinese) \REF{[81]} Web Services Architecture. 2004, http://www.w3.org/TR/ws-arch/. \REF{[82]} Kun Yue, Xiaoling Wang, Aoying Zhou. Underlying techniques for Web services: A survey. {\it Journal of Software}, 2004, 15(3): 428--442. (in Chinese) \REF{[83]} Mennie D, Pagurek B. An architecture to support dynamic composition of service components. In {\it Proc. 5th Int. Workshop on Component-Oriented Programming (WCOP 2000)}, Sophia Antipolis, France, 2000, pp.1--8. \REF{[84]} Yang J, Papazoglou M P. Web Component: A substrate for Web service reuse and composition. In {\it Proc. 14th Conf. Advanced Information Systems Eng. (CAiSE 02)}, Toronto, Canada, May 27--31, 2002, pp.21--36. \REF{[85]} Jinghai Rao, Peep Kungas, Mihhail Matskin. Application of linear logic to Web service composition. In {\it Proc. Int. Conf. Web Services (ICWS 2003)}, Las Vegas, NV, United States, CSREA Press, 2003, pp.3--9. \REF{[86]} Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, 1999. \REF{[87]} DeFanti T, Foster I, Papka M \it et al. \rm Overview of the I-WAY: Wide area visual supercomputing. {\it International Journal of Supercomputer Applications and High Performance Computing}, 1996, 10(2): 123--130. \REF{[88]} Foster I, Kesselman C. Globus: A metacomputing infrastructure toolkit. {\it International Journal of Supercomputer Applications}, 1997, 11(2): 115--128. \REF{[89]} Grimshaw A, Wulf W \it et al. \rm The legion vision of a worldwide virtual computer. {\it Communications of the ACM}, 1997, 40(1): 39--45. \REF{[90]} OGSA Working Group. {The open grid architecture, version 1.0.} GGF Working Draft, http://forge.gridfo\-rum.org/projects/ogsa-wg. \REF{[91]} Floyd S, Paxson V. Difficulties in simulating the Internet. {\it IEEE/ACM Trans. Networking}, August 2001, 9(4): 392--403. \REF{[92]} Watts D, Strogatz S. Collective dynamics of ``Small-world'' networks. {\it Nature}, 1998, 393(4): 440--442. \REF{[93]} Carlson J, Doyle J. Highly Optimized Tolerance: Robustness and design in complex systems. {\it Physics Review Letters}, 2000, 84(11): 2529--2532. \REF{[94]} Barabasi A L, Albert R. Scale-free network. {\it Science}, 1999: 286: 509. \REF{[95]} Guanrong Chen, Zhengping Fan, Xiang Li. Modeling the complex Internet topology. {\it Complex Dynamics Communication Networks}, Springer, 2005, pp.213--234. \REF{[96]} Youping Li. Constructing broadcasting and storage networks. {\it Computer World}, September 2005. (in Chinese) \REF{[97]} Leland W, Taqqu M, Willinger W, Wilson D. On the self-similar nature of Ethernet traffic (extended version). {\it IEEE/ACM Trans. Networking}, 1994, 2(1): 1--15. \REF{[98]} Norros I. On the use of fractional Brownian motion in the theory of connectionless networks. {\it IEEE JSAC}, 1995, 13(6): 953--962. \REF{[99]} Feldmann A, Gilbert A, Willinger W. Data network as cascades: Investigating the multifractal nature of Internet WAN traffic. In {\it Proc. ACM SIGCOMM'98}, Sep.~1998, 28(4): 42--55. \REF{[100]} Erramilli A, Narayan O, Neidhardt A \it et al. \rm Experimental queueing analysis with long-range dependent packet traffic. {\it IEEE/ACM Trans. Networking}, April 1996, 4(2): 209--223.
|