


default search action
Bell Labs Technical Journal, Volume 8
Volume 8, Number 1, 2003
- Kristin F. Kocan:

Capitalizing on the growing presence of IP networks in the telecom space. 1-3 - Lester T. W. Ho, Louis G. Samuel, Jonathan M. Pitts:

Applying emergent self-organizing behavior for the coordination of 4G networks using complexity metrics. 5-25 - Lynell E. Cannell, Michel L. F. Grech, Anne Y. Lee, Musa R. Unmehopa:

Service control for next-generation applications in wireless IP multimedia networks. 27-42 - Guy J. Zenner, Mark Hedley Jones, Amit A. Patel:

Emerging uses of SIP in service provider networks. 43-63 - Jeffrey G. Anderson, Steven L. Makowski, Stanley Tamras:

Optical interface unit - Bridge to the next-generation packet network. 65-81 - Vijay K. Gurbani, Kim Q. Liu:

Session initiation protocol: Service residency and resiliency. 83-94 - Marina Thottan, George K. Swanson, Michael Cantone, Tin Kam Ho, Yansong (Jennifer) Ren, Sanjoy Paul

:
SEQUIN: An SNMP-based MPLS network monitoring system. 95-111 - Andrew R. McGee, Chun K. Chan, David D. Picklesimer, Uma Chandrashekhar, Steven H. Richman, Edwin O. Lambert:

A brink of failure and breach of security detection and recovery system. 113-130 - Kyriakos Vlachos:

A novel network processor for security applications in high-speed data networks. 131-149 - Willem A. Romijn, Geert Jan Hoekstra, Joan Serrat, Eduardo Grampín

:
Enhancing network management by applying policy management principles. 151-156 - Kevin W. McKiou, Frank R. Buckley Jr.:

Data-driven fault management within a distributed object-oriented OAM&P framework. 157-179 - Marcus K. Weldon, Francis Zane:

The economics of fiber to the home revisited. 181-206 - Lily Cheng, John Ellson, Admela Jukan, Patrice N. Lamy, Eve L. Varma:

Network engineering - Control of dynamic link topology in user networks. 207-218 - Mansoor Alicherry, Sadanand Gogate, Rohit Khanna, Harsha S. Nagesh, Chitra Phadke, Vishy Poosala, Sathya Srinivasan:

WaveTunnel - Accurately designing deployable optical networks. 219-232 - Toby Joyce, Edward J. Lisay, Robert L. Nickerson:

An excel VBA application of Hoadley's QMP algorithm. 233-237 - Recent Lucent technologies patents. 239-246

Volume 8, Number 2, 2003
- Thomas V. Kurien, Gary N. Weber:

Overview. 1-2 - Avesh Kumar Agarwal, R. Krishna Kumar:

An evaluation of current QoS solutions for mobile IP networks. 3-13 - Isaac Samuel, Kishore Arora, Bhuvarahamurthy Narasimhan:

Location-based performance-measuring techniques in UMTS. 15-32 - Simon C. Borst, Kenneth L. Clarkson, John M. Graybeal, Harish Viswanathan, Philip A. Whiting:

User-level QoS and traffic engineering for 3G wireless 1xEV-DO systems. 33-47 - Jeffrey H. Dunn, Cynthia E. Martin:

The effect of physical and link layers on IP QoS. 49-63 - Bastien Peelen, Miroslav Zivkovic, Dennis J. A. Bijwaard

, Harold Teunissen:
Supporting QoS in broadband wireless and wired access. 65-81 - Richa Malhotra, Ronald van Haalen, Ronald de Man, Michiel van Everdingen:

Managing service-level agreements in metro ethernet networks using backpressure. 83-95 - David J. Houck, Eunyoung Kim, Hüseyin Uzunalioglu, Larry A. Wehr:

A measurement-based admission control algorithm for VoIP. 97-110 - Harald Graber, Humberto J. La Roche:

Multi-service switches and the Service IntelligentTM optical architecture for SONET/SDH metro networks. 111-127 - Bell Labs innovation briefs. 129-130

- Recent Lucent technologies patents. 131-139

Volume 8, Number 3, 2003
- Wim Sweldens:

Overview. 1-2
- Mansoor Alicherry, Randeep Bhatia, Harsha S. Nagesh, Chitra Phadke, Vishy Poosala:

Testing and verification of network management and design tools. 3-13 - Harold J. Batteram, Willem A. Romijn:

A test framework for CORBAstar component model-based software systems. 15-29 - Alan J. McBride, Mario Lobo Del Olmo, Brian T. Martin, Francis J. Finnegan:

Increased competitiveness through component technology for element management systems. 31-49 - Neil R. Bass:

Component architecture in a network management system. 51-65 - Indira Kuruganti, Dennis Mancl:

Building and applying requirements models. 67-73 - Robert S. Hanmer, John P. Letourneau:

A best practice for performance engineering. 75-89 - F. Michael Dedolph:

The neglected management activity: Software risk management. 91-95 - Bill Pyritz:

Extreme programming in the telecommunications domain. 97-100 - Bill Pyritz:

Craftsmanship versus engineering: Computer programming - An art or a science? 101-104 - Ai G. Nguyen, Richard L. Sohn:

Refactoring administrative services module platform software. 105-110 - Munirul Islam, Eugene P. Bordelon:

CCMS: A geographically distributed concurrent change and configuration management system. 111-133 - Recent Lucent technologies patents. 135-143

Volume 8, Number 4, 2004
- Uma Chandrashekhar, Steven H. Richman, Rati C. Thanawala:

Overview. 1-5
- Andrew R. McGee, S. Rao Vasireddy, Chen Xie, David D. Picklesimer, Uma Chandrashekhar, Steven H. Richman:

A framework for ensuring network security. 7-27 - Hemi Trickey, Alvin Barshefsky:

An access control architecture for managing large-scale network applications. 29-38 - Chun K. Chan, Himanshu Pant:

Reliability and security modeling in upgrading wireless backbone networks. 39-53 - Douglas H. Bellows:

Architectures for secure operation and maintenance of converged voice and data networks. 55-59 - Abdur Rahim Choudhary:

Service intelligence through agile information controls. 61-70 - Cynthia E. Martin, Jeffrey H. Dunn:

Authentication mechanisms for call control message integrity and origin verification. 71-91 - Sampath Rangarajan, Anil Takkallapalli, Sarit Mukherjee, Sanjoy Paul

, Scott C. Miller:
Adaptive VPN: Tradeoff between security levels and value-added services in virtual private networks. 93-113 - Vivek Sharma:

Intrusion detection in infrastructure wireless LANs. 115-119 - Yigang Cai, Jack Kozik, Helmut L. Raether, John B. Reid, Guy H. Starner, Sunil Thadani, Kumar V. Vemuri:

Authorization mechanisms for mobile commerce implementations in enhanced prepaid solutions. 121-131 - Chi-Hung Kelvin Chu, Ming Chu:

An integrated framework for the assessment of network operations, reliability, and security. 133-152 - David J. Houck, Eunyoung Kim, Gerard P. O'Reilly, David D. Picklesimer, Hüseyin Uzunalioglu:

A network survivability model for critical national infrastructures. 153-172 - William L. Fithen, Shawn V. Hernan, Paul F. O'Rourke, David A. Shinberg:

Formal modeling of vulnerability. 173-186 - S. Rao Vasireddy, Steven Wolter, Uma Chandrashekhar, Robert J. Thornberry Jr., Andrew R. McGee:

Security posture for civilian and non-civilian networks. 187-202 - Herbert Bertine, Igor Faynberg, Hui-Lan Lu:

Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF. 203-229 - Recent Lucent technologies patents. 231-241


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














