No abstract available.
Specifications for a network design to connect the Apollo DOMAIN network with the VAX system are discussed in this paper. Three networking approaches were considered which represent three distinct chronological stages in the evolution of computer ...
Local networking can be treated as a subset of internetworking for remote terminal access and file transfer. However, a distributed operating system, such as the V-System uses a local network more as an extended backplane than a fast, minature long-haul ...
STELLA (Satellite Transmission Experiment Linking Laboratories) is a European wide-band data transmission experiment. STELLA makes use of the European Orbital Test Satellite (OTS) which provides a 2 Mb/s broadcast data transmission channel. The first ...
Interconnection of multiple broadband local area networks to form an integrated packet transport system presents several challenges. To take full advantage of broadband systems, assignment of nodes to channels must be dynamic, leading to the use of a ...
In order to understand the relationship of office information to office products and to telecommunications, the category of information media must be introduced. Voice, image, text and data information media can be related to one another, to computer ...
This paper arrived late and can be found published in full on pages 257-260 of this Proceedings.
The paper describes major issues and problems in the use of packet satellite channels for real-time video images and suggests some solutions. The DARPA Wide Band Communication Network provides the testbed for this activity.
The main idea in this paper ...
To communicate across a network system, entities within the system need to be able to identify one another. An identifier usually takes the form of a name or an address. Conventions for the assignment of these identifiers and their resolution affect ...
The ISO-OSI reference model was the design framework for the implementation of a heterogeneous network in a local environment. The HMINET-2 is a network based on standards in data communication. The paper focus on the OSI model feasability and outlines ...
This paper describes structures used for exception handling in multi-process implementations of the X.25 and X.29 protocols. Each protocol layer is implemented as a collection of cooperating processes. These are structured in one of two alternative ways,...
For many time-constrained communication applications, such as packetized voice, a critical performance measure is the percentage of messages which are transmitted within a given amount of time after their arrival at a sending station. We examine the use ...
Conventional routing protocols and algorithms work most efficiently on sparsely connected networks. Network topologies today include multiaccess links which include hundreds of nodes, all of which are capable of direct communication with each other. ...
A transmitter sends packets over a local area network to a receiver. The receiver has a finite amount of storage capacity for buffering messages. A sliding window protocol is employed to insure all packets are delivered without error in order of ...
As a message handling system installed in the public communication networks, SSC (Store and Processing Service Control Facility) provides convenient communication processing services using storage and conversion technologies. The SSC conversion ...
Novanet is a control system oriented fiber optic local area network that was designed to meet the unique and often conflicting requirements of the Nova laser control system which will begin operation in 1984. The computers and data acquisition devices ...
This paper involves the exploration of two very important security controls in a computerized accounting information system: (1) access controls, and (2) communication controls. The various specific access and communication controls are examined, ...
Since World War II, the US government has had a comprehensive way to deal with communication security. Under pressure from commercial interests, the government moved in the 70's to make some communication security technology available in the form of the ...
In a heterogeneous computer network, resources on each node are protected by the local security mechanism. Network services allow local resources to be accessed remotely from other nodes. Without appropriate network security measures, each node is ...
The combined problem of the communication network design and resource allocation is studied for Distributed Data Processing (DDP) networks. The reliability measure for a distributed data processing system is used in order to enhance network reliability.
...In this paper we present a new methodology for designing reliable communication protocols. This methodology enhances communicating processes with a synchronization mechanism so that they can detect and resolve the errors caused by collisions ...
Local networks offer unique opportunities for supporting multicast transmissions. This paper describes and analyzes several families of multicast algorithms for local networks. The algorithms examined provide reliable service by dealing with the effects ...
The performance characteristics of a reliable broadcast protocol in a local-area network environment are analyzed. This protocol involves a source broadcasting a message to all destinations and collecting replies from these destinations. Reliability is ...
Finite state automata have been applied with success to the modeling of Computer Network Protocols. The interaction of finite state machines can be very complex especially if the protocol involves a large number of states. To counteract the complexity ...
We describe a distributed method for keeping down “token-passing” overhead in a mobile multi-access network, by performing local corrections in the token-passing sequence as they become necessary due to changes in node spatial configuration. These ...
This paper discusses a powerful priority mechanism that can be used on a physical communication medium supporting multiple, independent, logical data links. This scheme allows a high priority message to immediately interrupt a lower priority message ...
A computer-based message system (CBMS) consists of computer facilities that expedite the creation, management, and nonreal time distribution of messages. These systems are increasingly being used for formal and informal communication, supporting the ...
In the sixties and early seventies, major activities in networking were focused on private and public data networks using either circuit and packet-switching technology or integrating both switching methods into a single network. In this time frame, ...
The ITT/NET is an internal corporate network built to satisfy the distributed programming requirements of ITT technology and engineering communities. This paper describes the network: its goals, its architecture, its operational environment and ...
This paper describes the design and implementation of filing and printing services in a distributed system based on a token-ring local-area network. The main emphasis is put on the communication aspects of the client/server scenario: roles of a client ...
In the Cambridge Distributed System, developed at the Computer Laboratory. Cambridge, terminals, machines and peripherals are separated by a ring network. A problem that arises is the establishment and control of suitable connexions between the ...
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| SIGCOMM '21 | 56 | 30 | 54% |
| SIGCOMM Posters and Demos '19 | 102 | 62 | 61% |
| SIGCOMM '16 | 231 | 39 | 17% |
| SIGCOMM '15 | 242 | 40 | 17% |
| SIGCOMM '14 | 242 | 45 | 19% |
| SIGCOMM '13 | 246 | 38 | 15% |
| SIGCOMM '11 | 223 | 32 | 14% |
| SIGCOMM '03 | 319 | 34 | 11% |
| SIGCOMM '02 | 300 | 25 | 8% |
| SIGCOMM '01 | 252 | 23 | 9% |
| SIGCOMM '00 | 238 | 26 | 11% |
| SIGCOMM '99 | 190 | 24 | 13% |
| SIGCOMM '98 | 247 | 26 | 11% |
| SIGCOMM '97 | 213 | 24 | 11% |
| SIGCOMM '96 | 162 | 27 | 17% |
| SIGCOMM '95 | 143 | 30 | 21% |
| SIGCOMM '94 | 141 | 29 | 21% |
| Overall | 3,547 | 554 | 16% |