default search action
Tony Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i35]Tony Li:
Revision to Registration Procedures for IS-IS Neighbor Link-Attribute Bit Values. RFC 9650: 1-3 (2024) - 2021
- [c4]Muhammad Usman, Pradeep Rajagopalan, Aryel Beck, Jennifer Nathania, Tony Li, Toon Wei Lim:
Impact of Demographics on Short-term Heart Rate Variability for Detecting Hypertension. CinC 2021: 1-4 - 2020
- [c3]Andrzej Janusz, Guohua Hao, Daniel Kaluza, Tony Li, Robert Wojciechowski, Dominik Slezak:
Predicting Escalations in Customer Support: Analysis of Data Mining Challenge Results. IEEE BigData 2020: 5519-5526 - [i34]Les Ginsberg, Paul Wells, Tony Li, Tony Przygienda, Shraddha Hegde:
Invalid TLV Handling in IS-IS. RFC 8918: 1-8 (2020)
2010 – 2019
- 2012
- [j2]Manuel A. Candales, Adrian Duong, Keyar S. Hood, Tony Li, Ryan A. E. Neufeld, Runda Sun, Bonnie A. McNeil, Li Wu, Ashley M. Jarding, Steven Zimmerly:
Database for bacterial group II introns. Nucleic Acids Res. 40(Database-Issue): 187-190 (2012) - 2011
- [i33]Tony Li:
Recommendation for a Routing Architecture. RFC 6115: 1-73 (2011) - [i32]Tony Li:
Design Goals for Scalable Internet Routing. RFC 6227: 1-8 (2011) - [i31]Fang Wei, Yue Qin, Zhenqiang Li, Tony Li, Jie Dong:
Purge Originator Identification TLV for IS-IS. RFC 6232: 1-6 (2011) - [i30]Tony Li, Les Ginsberg:
IS-IS Registry Extension for Purges. RFC 6233: 1-4 (2011)
2000 – 2009
- 2009
- [i29]Manav Bhatia, Vishwas Manral, Tony Li, Randall J. Atkinson, Russ White, Matthew J. Fanto:
IS-IS Generic Cryptographic Authentication. RFC 5310: 1-12 (2009) - [i28]Manav Bhatia, Vishwas Manral, Matthew J. Fanto, Russ White, Michael Barnes, Tony Li, Randall J. Atkinson:
OSPFv2 HMAC-SHA Cryptographic Authentication. RFC 5709: 1-14 (2009) - 2008
- [i27]Tony Li, Henk Smit, Tony Przygienda:
Domain-Wide Prefix Distribution with Two-Level IS-IS. RFC 5302: 1-16 (2008) - [i26]Tony Li, Randall J. Atkinson:
IS-IS Cryptographic Authentication. RFC 5304: 1-11 (2008) - [i25]Tony Li, Henk Smit:
IS-IS Extensions for Traffic Engineering. RFC 5305: 1-17 (2008) - 2007
- [c2]Zongjian Chen, Priya Ananthanarayanan, Sukalp Biswas, Brian Campbell, Hao Chen, Shaishav Desai, Dominic Go, Rajat Goel, Vincent von Kaenel, Jason Kassoff, Fabian Klass, Weichun Ku, Tony Li, Jonathon Lin, Khurram Malik, Anup Mehta, Daniel Murray, Eric Shiu, Chris Shuler, Sribalan Santhanam, Greg Scott, Junji Sugisawa, Toshinari Takayanagi, Honkai John Tarn, Pradeep Trivedi, James Wang, Ricky Wen, John Yong:
A 25W SoC with Dual 2GHz Power Cores and Integrated Memory and I/O Subsystems. ISSCC 2007: 104-105 - 2006
- [i24]Yakov Rekhter, Tony Li, Susan Hares:
A Border Gateway Protocol 4 (BGP-4). RFC 4271: 1-104 (2006) - [i23]Vince Fuller, Tony Li:
Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan. RFC 4632: 1-27 (2006) - 2005
- [i22]Erik Nordmark, Tony Li:
Threats Relating to IPv6 Multihoming Solutions. RFC 4218: 1-31 (2005) - 2004
- [i21]Henk Smit, Tony Li:
Intermediate System to Intermediate System (IS-IS) Extensions for Traffic Engineering (TE). RFC 3784: 1-13 (2004) - 2003
- [i20]Tony Li, Randall J. Atkinson:
Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication. RFC 3567: 1-6 (2003) - 2001
- [i19]Eric C. Rosen, Dan Tappan, Guy C. Fedorkow, Yakov Rekhter, Dino Farinacci, Tony Li, Alex Conta:
MPLS Label Stack Encoding. RFC 3032: 1-23 (2001) - [i18]Daniel O. Awduche, Lou Berger, Der-hwa Gan, Tony Li, Vijay Srinivasan, George Swallow:
RSVP-TE: Extensions to RSVP for LSP Tunnels. RFC 3209: 1-61 (2001) - 2000
- [i17]Dino Farinacci, Tony Li, Stan Hanks, David Meyer, Paul Traina:
Generic Routing Encapsulation (GRE). RFC 2784: 1-9 (2000) - [i16]Tony Li, Tony Przygienda, Henk Smit:
Domain-wide Prefix Distribution with Two-Level IS-IS. RFC 2966: 1-14 (2000)
1990 – 1999
- 1999
- [j1]Tony Li:
MPLS and the evolving Internet architecture. IEEE Commun. Mag. 37(12): 38-41 (1999) - [c1]Tony Li:
BGP Origin Authentication. NDSS 1999 - 1998
- [i15]Tony Li, Bruce Cole, Phil Morton, Dawn Li:
Cisco Hot Standby Router Protocol (HSRP). RFC 2281: 1-17 (1998) - [i14]Tony Li, Yakov Rekhter:
A Provider Architecture for Differentiated Services and Traffic Engineering (PASTE). RFC 2430: 1-16 (1998) - 1996
- [i13]Deborah Estrin, Tony Li, Yakov Rekhter, Kannan Varadhan, Daniel Zappala:
Source Demand Routing: Packet Format and Forwarding Specification (Version 1). RFC 1940: 1-27 (1996) - [i12]Ravishanker Chandra, Paul Traina, Tony Li:
BGP Communities Attribute. RFC 1997: 1-5 (1996) - [i11]Yakov Rekhter, Tony Li:
Implications of Various Address Allocation Policies for Internet Routing. RFC 2008: 1-13 (1996) - 1995
- [i10]Yakov Rekhter, Tony Li:
A Border Gateway Protocol 4 (BGP-4). RFC 1771: 1-57 (1995) - [i9]Jon Postel, Tony Li, Yakov Rekhter:
Best Current Practices. RFC 1818: 1-3 (1995) - [i8]Yakov Rekhter, Tony Li:
An Architecture for IPv6 Unicast Address Allocation. RFC 1887: 1-26 (1995) - 1994
- [i7]Yakov Rekhter, Tony Li:
A Border Gateway Protocol 4 (BGP-4). RFC 1654: 1-56 (1994) - [i6]Deborah Estrin, Tony Li, Yakov Rekhter:
Unified Routing Requirements for IPng. RFC 1668: 1-3 (1994) - [i5]Stan Hanks, Tony Li, Dino Farinacci, Paul Traina:
Generic Routing Encapsulation (GRE). RFC 1701: 1-8 (1994) - [i4]Stan Hanks, Tony Li, Dino Farinacci, Paul Traina:
Generic Routing Encapsulation over IPv4 networks. RFC 1702: 1-4 (1994) - 1993
- [i3]Yakov Rekhter, Tony Li:
An Architecture for IP Address Allocation with CIDR. RFC 1518: 1-27 (1993) - [i2]Vince Fuller, Tony Li, Jie Yun (Jessica) Yu, Kannan Varadhan:
Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy. RFC 1519: 1-24 (1993) - 1992
- [i1]Vince Fuller, Tony Li, Jie Yun (Jessica) Yu, Kannan Varadhan:
Supernetting: an Address Assignment and Aggregation Strategy. RFC 1338: 1-20 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-29 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint