共 12 条
[1]
[Anonymous], 2009, P 5 INT C EM NETW EX, DOI [DOI 10.1145/1658939.1658941, 10.1145/1658939.1658941]
[2]
Bharadwaj R., 1995, Algorithms, Concurrency and Knowledge. 1995 Asian Computing Science Conference ACSC'95. Proceedings, P335
[4]
Carofiglio G, 2012, IEEE CONF COMPUT, P304, DOI 10.1109/INFCOMW.2012.6193510
[5]
Clarke EM, 1999, MODEL CHECKING, P1
[6]
Felty AP, 1998, LECT NOTES COMPUT SC, V1427, P428, DOI 10.1007/BFb0028764
[7]
Goergen David., 2013, Data Privacy Management and Autonomous Spontaneous Security, P274
[9]
Killian C., 2007, Proceedings of the 4th USENIX conference on Networked systems design and implementation, NSDI'07, (Berkeley, CA, USA), P18
[10]
Formalization of the Behavior of Content-Centri Networking
[J].
10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS,
2015, 56
:197-204