Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4486 + 2220 = 6706
Home Page
Ad Hoc Networks 4003-543-01/4005-742-01 Spring Quarter 2007
Course Page

4003-543-01/4005-742-01 Ad Hoc Networks
Bibliography and Links

Prof. Alan Kaminsky -- Spring Quarter 2007
Rochester Institute of Technology -- Department of Computer Science

Java Tutorials
Java Documentation
Ad Hoc Networking Books
Data Communications and Networks Books
Network Security Books and Papers
Cryptography Books
Books on the Above in Java
M2MI and M2MP
Tuple Spaces
Tuple Board
Internet Standards


Java Tutorials

The Java Tutorial. http://java.sun.com/docs/books/tutorial

Java I/O Tutorial (including object serialization). http://java.sun.com/docs/books/tutorial/essential/io/index.html

Java Threads Tutorial. http://java.sun.com/docs/books/tutorial/essential/threads/index.html

Java Exceptions Tutorial. http://java.sun.com/docs/books/tutorial/essential/exceptions/index.html

Java Networking Tutorial. http://java.sun.com/docs/books/tutorial/networking/index.html

Java RMI Tutorial. http://java.sun.com/docs/books/tutorial/rmi/index.html


Java Documentation

Java 2 Standard Edition Software Development Kit Version 1.5.0 Documentation. http://java.sun.com/j2se/1.5.0/docs/index.html

Java 2 Standard Edition Software Development Kit Version 1.5.0 API Specification. http://java.sun.com/j2se/1.5.0/docs/api/index.html


Ad Hoc Networking Books

B. Tavli and W. Heinzelman. Mobile Ad Hoc Networks: Energy-Efficient Real-Time Data Communications. Springer Publishers, 2006.

Stefano Basagni, Marco Conti, Silvia Giordano, and Ivan Stojmenovic. Mobile Ad Hoc Networking. John Wiley & Sons, 2004.

Charles E. Perkins, editor. Ad Hoc Networking. Addison-Wesley, 2001.


Data Communications and Networks Books

Behrouz A. Forouzan. Data Communications and Networking, Fourth Edition. McGraw-Hill, 2007.

James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach Featuring the Internet, Third Edition. Addison-Wesley, 2005.

Douglas E. Comer. Computer Networks and Internets with Internet Applications, Fourth Edition. Prentice-Hall, 2004.

William Stallings. Data and Computer Communications, Seventh Edition. Prentice Hall, 2004.

Larry L. Peterson and Bruce S. Davie. Computer Networks: A Systems Approach, Third Edition. Morgan Kaufmann Publishers, 2003.

Andrew S. Tanenbaum. Computer Networks, Fourth Edition. Prentice Hall PTR, 2003.

Alan Dennis. Networking in the Internet Age. John Wiley & Sons, 2002.

Radia Perlman. Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, Second Edition. Addison-Wesley, 2000.

Sidnie Feit. TCP/IP: Architecture, Protocols, and Implementation. McGraw-Hill, 1993.

Dimitri Bertsekas and Robert Gallager. Data Networks, Second Edition. Prentice Hall, 1992.


Network Security Books and Papers

Ryan Russell, Tim Mullen (Thor), FX, Dan "Effugas" Kaminsky, Joe Grand, Ken Pfeil, Ido Dubrawsky, Mark Burnett, and Paul Craig. Stealing the Network: How to Own the Box. Syngress Publishing, 2003.

Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.

Kevin D. Mitnick and William L. Simon. The Art of Deception. Wiley Publishing, Inc., 2002.

Anonymous. Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation, Second Edition. Sams Publishing, 2001.

Anonymous. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network, Third Edition. Sams Publishing, 2001.

Jeff Crume. Inside Internet Security: What Hackers Don't Want You to Know. Addison-Wesley, 2000.

Bruce Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000.

R. Perlman. Network layer protocols with Byzantine robustness. Ph.D. dissertation, Massachusetts Institute of Technology, August 1988. http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-429.pdf, retrieved 17-Apr-2006.


Cryptography Books

Douglas R. Stinson. Cryptography: Theory and Practice, Third Edition. Chapman & Hall, 2005.

Niels Ferguson and Bruce Schneier. Practical Cryptography. Wiley Publishing, 2003.

Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.

Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

Bruce Schneier. Applied Cryptography, Second Edition. John Wiley & Sons, 1996.


Books on the Above in Java

Rich Helton and Johennie Helton. Java Security Solutions. Wiley Publishing, Inc., 2002.

David Reilly and Michael Reilly. Java Network Programming and Distributed Computing. Addison-Wesley, 2002.

Marco Boger. Java in Distributed Systems: Concurrency, Distribution and Persistence. John Wiley & Sons, Ltd., 2001.

Esmond Pitt and Kathleen McNiff. java.rmi: The Remote Method Invocation Guide. Addison-Wesley, 2001.

Troy Bryan Downing. Java RMI: Remote Method Invocation. IDG Books Worldwide, 1998.


M2MI and M2MP

Hans-Peter Bischof, Alan Kaminsky, and Joseph Binder. A new framework for building secure collaborative systems in ad hoc network. Second International Conference on AD-HOC Networks and Wireless (ADHOC-NOW '03), Montreal, Canada, October 2003.
(http://www.cs.rit.edu/~anhinga/publications/montreal_October_03.pdf, 253,664 bytes)

Alan Kaminsky and Hans-Peter Bischof. New architectures, protocols, and middleware for ad hoc collaborative computing. Middleware 2003 Workshop on Middleware for Pervasive and Ad Hoc Computing, Rio de Janeiro, Brazil, June 2003.
(http://www.cs.rit.edu/~anhinga/publications/mw2003cr.pdf, 243,645 bytes)

Hans-Peter Bischof and Alan Kaminsky. Many-to-Many Invocation: A new framework for building collaborative applications in ad hoc networks. CSCW 2002 Workshop on Ad Hoc Communication and Collaboration in Ubiquitous Computing Environments, New Orleans, Louisiana, USA, November 2002.
(http://www.cs.rit.edu/~anhinga/publications/m2mi20021015.pdf, 89,779 bytes)

Alan Kaminsky and Hans-Peter Bischof. Many-to-Many Invocation: A new object oriented paradigm for ad hoc collaborative systems. 17th Annual ACM Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2002), Onward! track, Seattle, Washington, USA, November 2002.
(http://www.cs.rit.edu/~anhinga/publications/m2mi20020716.pdf, 872,653 bytes)

The Anhinga Project. http://www.cs.rit.edu/~anhinga/


Tuple Spaces

JavaSpaces™ is a trademark of Sun Microsystems.

JavaSpaces Service Specification, v1.2.1. http://wwws.sun.com/software/jini/specs/jini1.2html/js-title.html
(PDF: http://wwws.sun.com/software/jini/specs/js1_2_1.pdf)

Commercial implementations of the JavaSpaces specification:

IBM's TSpaces, an alternative tuple space implementation in Java. http://www.alphaworks.ibm.com/tech/tspaces

Philip Bishop and Nigel Warren. JavaSpaces in Practice. Addison-Wesley, 2003.

Eric Freeman, Susanne Hupfer, and Ken Arnold. JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, 1999.

David Gerlernter. Mirror Worlds. Oxford University Press, 1991.

Nicholas Carriero and David Gelernter. How to Write Parallel Programs: A First Course. MIT Press, 1990.

Nicholas Carriero and David Gelernter. How to write parallel programs: A guide to the perplexed. ACM Computing Surveys, Volume 21, Number 3, September 1989, pages 323–357.
(Available online from the Wallace Library, Research Databases, ACM Digital Library)

David Gelernter. Generative communication in Linda. ACM Transactions on Programming Languages and Systems, Volume 7, Number 1, January 1985, pages 80–112.
(Available online from the Wallace Library, Research Databases, ACM Digital Library)


Tuple Board

Alan Kaminsky and Chaithanya Bondada. Tuple Board: A new distributed computing paradigm for mobile ad hoc networks. Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences First Annual Conference on Computing and Information Sciences, Rochester, New York, USA, January 2005.
(Extended abstract PDF, 41,357 bytes) (Slide presentation)


Internet Standards

Internet Engineering Task Force (IETF). http://www.ietf.org

IETF Requests for Comments (RFCs) -- Internet standards. http://www.ietf.org/rfc.html

Internet Assigned Numbers Authority (IANA). http://www.iana.org

Ad Hoc Networks 4003-543-01/4005-742-01 Spring Quarter 2007
Course Page
Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4486 + 2220 = 6706
Home Page
Copyright © 2007 Alan Kaminsky. All rights reserved. Last updated 08-Mar-2007. Please send comments to ark­@­cs.rit.edu.