Selected Papers on 

INTERNET APPLICATIONS & SYSTEMS, 1999

 
Each paper has a local copy. To get the local copy click on the format tag at the end of each paper.

These paper reflects the latest in the four theme topics of this years course. During the course we will study about 20-25 papers from this list. 

CH-A: Performance Modeling:

  1. Modeling the performance of HTTP over several transport protocols, John Heidemann, Katia Obraczka and Joe Touch. IEEE/ACM Transactions on Networking,Volume 5, No. 5 (Oct. 1997), Pages 616-630, [PDF]
  2. Internet Web servers: workload characterization and performance implications, Martin F. Arlitt and Carey L. Williamson,  IEEE/ACM Transactions on Networking,Volume 5, No. 5 (Oct. 1997),Pages 631-645, [PDF]

CH-B: Web Cache:

  1. Removal policies in network caches for World-Wide Web documents  Marc Abrams, Charles R. Standridge, Ghaleb Abdulla, Edward A., Fox and Stephen Williams,  ACM SIGCOMM '96.  Aug. 26-30, 1996, Stanford, CAPages 293-305,  [ PDF] [Presentation Material PDF122 KB] ( Good comparisons of page removal policies)
  2. A Simple Yet Robust Caching Algorithm Based on Dynamic Access Patterns, Jim Pitkow and Mimi Recker, 2nd Int. WWW Conf, pp-1039-1045, Chicago, Oct 1994, [HTML], ( Interesting Algorithm Based on Human Memory model, It discusses removal policies, Lot of papers refer to this paper).
  3. Using Network Level Support to Improve Cache Routing, Ulana Legedza and John Guttag, 3rd International Web Caching Workshop, June 1998. [Postcript] ( Active Networking based Caching)
  4. Potential Benefits of Delta-encoding and Data Compression for HTTP, J.C. Mogul, F. Douglis, A. Feldmann, and B. Krishnamurthy, in: ACM SIGCOMM'97 Conference, September 1997, [PDF] 
  5. Cache Digests, Alex Rousskov and Duane Wessels, Proceedings of the Third International Web Caching Workshop, (to appear),[PostScript] ( A future proposal for using lossy compression based intercache dialogue protocol)
  6. Adaptive Web Caching. Lixia Zhang, Sally Floyd, and Van Jacobson, NLANR Web cache workshop, June 1997. [PostScript] (Describes Adaptive Cacheing for Harvest/SQUID)
  7. Piggyback Server Invalidation for Proxy Cache Coherency, B. Krishnamurthy and C.E. Wills 7th WWW Conf, 1998,  Also in journal Computer Networks and ISDN Systems, Volume 30, issues 1-7. [HTML]

CH-C: Hardware Web Systems:

  1. Memory-based Architecture for Distributed WWW Caching Prox, N. Nishikawa, T. Hosokawa, Y. Mori, K. Yoshida and H. Tsuji, 7th WWW Conf, 1998,  Also in journal Computer Networks and ISDN Systems, Volume 30, issues 1-7 [HTML]
  2. DynaCache: Weaving Caching into the Internet. Abdelsalam Heddaya, Presented at the 3rd International WWW Caching Workshop, Manchester, England, June 1998. [PDF].
  3. Cisco Cache Engine, Cisco Systems, September 1997. [HTML].
  4. Transparent Web Caching Solutions. Bert Williams, Presented at the 3rd International WWW Caching Workshop, Manchester, England, June 1998. [HTML].

CH-D: Multimedia:

  1. Videoconferencing on the Internet, Thierry Turletti and Christian Huitema, IEEE/ACM Transactions on Networking, Volume 4, No. 3 (June 1996), Pages 340-35, [PDF]
  2. Iterative transmission of media streams , Michael Merz, Konrad Froitzheim, Peter Schulthess and Heiner Wolf, Proceedings of the conference on ACM Multimedia '97, November 9-13, 1997, Seattle, WAPages 283-29,  [PDF] (Explains architecture for sclable transmission)
  3. Packet loss effects on MPEG video sent over the public Internet, Jill M. Boyce and Robert D. Gaglianello Pages 181-190 [Citation],[PDF]
  4. A real-time scalable software video codec for collaborative applications over packet networks J. Hartung, A. Jacquin, J. Pawlyk and K. L. Shipley, Pages 419-426, [Citation],[ PDF]

CH-E: Web Security:

  1. Cryptography and the Web, Simson Garfinkel, Gene Spafford, W3C Electronic Jounral, VOLUME II, ISSUE 3, SUMMER 1997, [HTML]
  2. Meta-Firewall: A Sixth Generation Firewall -- Part 1,  Lau, O., Network Security , Vol: 1998, Issue: 6, June 1998 , pp. 10-16 [PDF]
  3. Meta-Firewall: A Sixth Generation Firewall -- Part 2,  Lau, O., Network Security , Vol: 1998, Issue: 7, July 1998 , pp. 14-19 [PDF])
  4. The Electronic Medical Record: Promises and Threats, Lincoln D. Stein, W3C Electronic Jounral, VOLUME II, ISSUE 3, SUMMER 1997, [HTML]
  5. Physical Layer Network Security: What your LAN can do for you, Banes, D.W. Network Security , Vol: 1995, Issue: 10, October 1995 , pp. 17-19  [PDF]

  6. IPV6 Security Enhancements Still Not Everything You Need, Hancock, B., Network Security , Vol: 1998, Issue: 6, June 1998 , pp. 8-10 [PDF]

CH-F: Application Protocols:

  1. The Amsterdam hypermedia model: adding time and context to the Dexter model Lynda Hardman, Dick C. A. Bulterman and Guido van Rossum, Communications of the ACM, Volume 37, No. 2 (Feb. 1994), Pages 50-62, [PDF] (Language model for time synchronization)
  2. A Technical Introduction to XML, Norman Walsh, [HTML] (Good overview of XML)

  3. HTTP-ng Architectural Model, IETF Internet Draft, August 1, 1998, [Text]