Author of the publication

Designing an Academic Firewall: Policy, Practice, and Experience with SURF.

, , , and . NDSS, page 79-92. IEEE Computer Society, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Java Factor - Introduction., and . Commun. ACM, 41 (6): 34-37 (1998)Exploring Position History for Efficient Remote Rendering in Networked Virtual Reality., and . Presence Teleoperators Virtual Environ., 4 (2): 169-193 (1995)Log-Based Receiver-Reliable Multicast for Distributed Interactive Simulation., , and . SIGCOMM, page 328-341. ACM, (1995)Private Peer-to-Peer Overlay for Real-Time Monitoring of a Deployed Internet-Scale Peer-to-Peer Overlay., , and . Peer-to-Peer Computing, page 235-236. IEEE Computer Society, (2007)Registration rooms, lobbies, and portals: interconnecting large-scale networked virtual environments and collaborations., and . VRAIS, page 213. IEEE Computer Society, (1998)Scalable networked virtual environments using unstructured overlays.. ICPADS, page 1-8. IEEE Computer Society, (2007)Authoring Tool for Web Content Transcoding., , , and . Markup Languages, 2 (1): 65-80 (2000)P2P-IM: A P2P Presence System for the Internet., and . Peer-to-Peer Computing, page 233-234. IEEE Computer Society, (2007)Internet Scale Testing of PNRP Using WiDS Network Simulator., , and . Peer-to-Peer Computing, page 227-228. IEEE Computer Society, (2006)Designing an Academic Firewall: Policy, Practice, and Experience with SURF., , , and . NDSS, page 79-92. IEEE Computer Society, (1996)