MILLER, B.A., and BISDIKIAN, C.,: Bluetooth Revealed, Upper Saddle River, NJ: Prentice Hall,
2001.
MILLER, P., and CUMMINS, M.:
LAN Technologies Explained, Woburn, MA: Butterworth-
Heinemann, 2000.
MINOLI, D.:
Video Dialtone Technology, New York: McGraw-Hill, 1995.
MINOLI, D., and VITELLA, M.:
ATM & Cell Relay for Corporate Environments, New York:
McGraw-Hill, 1994.
MISHRA, P.P., and KANAKIA, H.:
"A Hop by Hop Rate-Based Congestion Control Scheme,"
Proc. SIGCOMM '92 Conf., ACM, pp. 112-123, 1992.
MISRA, A., DAS, S., DUTTA, A., MCAULEY, A., and DAS, S.:
"IDMP-Based Fast Handoffs and
Paging in IP-Based 4G Mobile Networks,"
IEEE Commun. Magazine, vol. 40, pp. 138-145,
March 2002.
MOGUL, J.C.:
"IP Network Performance," in Internet System Handbook, Lynch, D.C. and Rose,
M.T. (eds.), Boston: Addison-Wesley, pp. 575-675, 1993.
MOK, A.K., and WARD, S.A.:
"Distributed Broadcast Channel Access," Computer Networks, vol.
3, pp. 327-335, Nov. 1979.
MOY, J.:
"Multicast Routing Extensions," Commun. of the ACM, vol. 37, pp. 61-66, AUg. 1994.
MULLINS, J.:
"Making Unbreakable Code," IEEE Spectrum, pp. 40-45, May 2002.
NAGLE, J.:
"On Packet Switches with Infinite Storage," IEEE Trans. on Commun., vol. COM-35,
pp. 435-438, April 1987.
NAGLE, J.:
"Congestion Control in TCP/IP Internetworks," Computer Commun. Rev., vol. 14,
pp. 11-17, Oct. 1984.
NARAYANASWAMI, C., KAMIJOH, N., RAGHUNATH, M., INOUE, T., CIPOLLA, T., SANFORD, J.,
SCHLIG, E., VENTKITESWARAN, S., GUNIGUNTALA, D., KULKARNI, V., and YAMAZAKI, K.:
"IBM's Linux Watch: The Challenge of Miniaturization," Computer, vol. 35, pp. 33-41, Jan.
2002.
NAUGHTON, J.:
"A Brief History of the Future," Woodstock, NY: Overlook Press, 2000.
NEEDHAM, R.M., and SCHROEDER, M.D.:
"Authentication Revisited," Operating Systems Rev.,
vol. 21, p. 7, Jan. 1987.
NEEDHAM, R.M., and SCHROEDER, M.D.:
"Using Encryption for Authentication in Large
Networks of Computers,"
Commun. of the ACM, vol. 21, pp. 993-999, Dec. 1978.
NELAKUDITI, S., and ZHANG, Z.-L.:
"A Localized Adaptive Proportioning Approach to QoS
Routing,"
IEEE Commun. Magazine vol. 40, pp. 66-71, June 2002.
NEMETH, E., SNYDER, G., SEEBASS, S., and HEIN, T.R.:
UNIX System Administration
Handbook
, 3rd ed., Englewood Cliffs, NJ: Prentice Hall, 2000.
NICHOLS, R.K., and LEKKAS, P.C.:
Wireless Security, New York: McGraw-Hill, 2002.