


default search action
Computer Networks, Volume 34
Volume 34, Number 1, July 2000
- Demetres D. Kouvatsos:

Performance Modelling and Evaluation of ATM Networks. 1-2 - A. Evangelatos, Th. Rapsomanikis, Nikolas Mitrou, George I. Stassinopoulos:

A burst-level traffic analysis tool. 3-22 - Abdulmohsen A. Alheraish, D. G. Smith:

Cell rate moderation of VBR video under an FEC environment in ATM networks. 23-35 - Christos Stathis, Basil S. Maglaris

:
Modelling the self-similar behaviour of network traffic. 37-47 - Francesco Balestrieri, Pantelis L. Panteli, Vasillios Dionissopoulos, Trevor G. Clarkson:

ATM connection admission control using pRAM based artificial neural networks. 49-63 - John Soldatos, Evangelos Vayias, Nikolas Mitrou:

CAC and traffic shaping for performance control in ATM: the two-class paradigm. 65-83 - Monique Becker, André-Luc Beylot:

Performance comparison criteria for ATM switch models. 85-95 - Demetres D. Kouvatsos, Irfan-Ullah Awan, Rod J. Fretwell, George Dimakopoulos:

A cost-effective approximation for SRD traffic in arbitrary multi-buffered networks. 97-113 - Madhu D. K. Bhabuta, Peter G. Harrison

:
Optimising bandwidth of ABR sources. 115-128 - Ilhem Lengliz, Farouk Kamoun:

A rate-based flow control method for ABR service in ATM networks. 129-138 - Milan Vojnovic, Nikola Rozic:

An evaluation of the ABR explicit-rate allocation interfering with the guaranteed services traffic. 139-155 - Jan Naudts

:
Towards real-time measurement of traffic control parameters. 157-167 - Claudio Casetti, Renato Lo Cigno

, Marco Mellia
:
Load-balancing solutions for static routing schemes in ATM networks. 169-180 - Ádám Magi, Áron Szentesi, Balázs Szviatovszki:

Analysis of link cost functions for PNNI routing. 181-197 - Tien Van Do

, Thong T. Nguyen, Hung Tuan Tran, Gábor Kalvach, Balázs Varga:
Topology optimization of an overlay ATM network in an SDH infrastructure. 199-210 - Dee Denteneer, Verus Pronk, J. M. Griffiths, Laurie G. Cuthbert

:
Impact of the resource needed for renegotiating ATM rates. 211-225
Volume 34, Number 2, August 2000
- Sui Meng Poon, Jie Song, Bu-Sung Lee

, Chai Kiat Yeo:
Performance of buffer-based request-reply scheme for VoD streams over IP networks. 229-240 - Ren-Hung Hwang

, James F. Kurose, Donald F. Towsley
:
MDP routing for multi-rate loss networks. 241-261 - Fabrice Guillemin

, Olivier Dugeon, Jacqueline Boyer, Christophe Mangin:
Lightweight signaling in ATM networks for high quality transfer of Internet traffic. 263-278 - Shaowen Song:

A credit-based flow control algorithm for broadband access networks. 279-295 - Mahmoud Saleh, Mohammed Atiquzzaman

:
Analysis of shared buffer switches under non-uniform traffic pattern and global flow control. 297-315 - Peter Herrmann

, Heiko Krumm:
A framework for modeling transfer protocols. 317-337
Volume 34, Number 3, September 2000
- Antonios F. Atlasis, Nikolaos H. Loukas, Athanasios V. Vasilakos

:
The use of learning algorithms in ATM networks call admission control problem: a methodology. 341-353 - Mohammad Abdulrahman Al-Fawzan, Fahad Hoymany:

Placement of network servers in a wide-area network. 355-361 - Shatha K. Habra, Ahmed E. Kamal:

An MCR-weighted protocol for multipoint-to-point communication over ABR service. 363-378 - Michael Montgomery, Gustavo de Veciana:

Hierarchical source routing using implied costs. 379-397 - Robert Haas, Patrick Droz, Daniel Bauer:

PNNI Augmented Routing (PAR) and Proxy-PAR. 399-418 - Wei Kuang Lai, Mu-Rung Shiu:

Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes. 419-437 - Keith Mainwaring:

A role for ATM in telephony and IP networks. 439-454 - Larry Hughes, Omid Banyasad, Evan J. Hughes:

Cartesian routing. 455-466 - Yue-Shan Chang, Shyan-Ming Yuan

, Winston Lo:
A new multi-search engine for querying data through an Internet search service on CORBA. 467-480 - Yiwei Thomas Hou

, Bo Li, Shivendra S. Panwar, Henry H.-Y. Tzeng:
On network bandwidth allocation policies and feedback control algorithms for packet networks. 481-501 - Eerke A. Boiten

, Howard Bowman, John Derrick
, Peter F. Linington, Maarten Steen:
Viewpoint consistency in ODP. 503-537
Volume 34, Number 4, October 2000
- Deborah A. Frincke, Ming-Yuh Huang:

Recent advances in intrusion detection systems. 541-545 - Eugene H. Spafford

, Diego Zamboni:
Intrusion detection using autonomous agents. 547-570 - Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz:

A data mining analysis of RTID alarms. 571-577 - Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:

The 1999 DARPA off-line intrusion detection evaluation. 579-595 - Richard Lippmann, Robert K. Cunningham:

Improving intrusion detection performance using keyword selection and neural networks. 597-603 - Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:

Intrusion detection inter-component adaptive negotiation. 605-621 - Emilie Lundin, Erland Jonsson:

Anomaly-based intrusion detection: privacy concerns and other problems. 623-640 - Peter Mell, Donald G. Marks, Mark McLarnon:

A denial-of-service resistant intrusion detection architecture. 641-658 - Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto:

Towards trapping wily intruders in the large. 659-670 - Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery:

Intrusion-detection for incident-response, using a military battlefield-intelligence process. 671-697
Volume 34, Number 5, November 2000
- Luigi Logrippo, John Visser:

Future wireless networks. 701-703 - Harald Schmidts, John Visser:

Framework for IMT-2000 networks. 705-715 - Jean Claude Samou, Drissa Houatra, Philippe Godlewski, Elie Najm:

IMT-2000 wireless terminal mobility over object-oriented distributed platforms. 717-743 - Alfio Lombardo

, Ferdinando Lucidi, Marina Samarotto, Sebastiano Trigila:
Personal mobility aspects in service architectures: extensions to TINA. 745-762 - Brahim Ghribi, Luigi Logrippo:

Understanding GPRS: the GSM packet radio service. 763-779 - Fawzi Daoud:

Hybrid satellite/terrestrial networks integration. 781-797 - Giulio Maggiore, Giulio Brusasco, Marco Vecchiato:

Network integration testing: concepts, test specifications and tools for automatic telecommunication services verification. 799-819
Volume 34, Number 6, December 2000
- Claudio Allocchio:

Guest editorial. 821-822 - Claudia Raibulet

, Claudio Demartini:
Mobile agent technology for the management of distributed systems - a case study. 823-830 - Torsten Bissel, Manfred Bogen, Christian Bonkowski, Volker Hadamschek:

Service level management with agent technology. 831-841 - Peter Ørbæk:

An experimental system for distributed classroom education. 843-850 - Pierluigi Bonetti

, Stefano Ravaioli, Simone Piergallini:
The Italian academic community's electronic voting system. 851-860 - Gregory Karvounarakis, Sarantos Kapidakis:

Submission and repository management of digital libraries, using WWW. 861-872 - Luca Deri, Stefano Suin:

Practical network security: experiences with ntop. 873-880 - Madalina Baltatu, Antonio Lioy

, Fabio Maino, Daniele Mazzocchi:
Security issues in control, management and routing protocols. 881-894 - Ferdinand Hommes, Eva Pless, Lothar Zier:

Did MPOA achieve its objective? 895-904 - Tiziana Ferrari:

End-to-end performance analysis with traffic aggregation. 905-914 - Volker Sander

, Ian T. Foster
, Alain J. Roy, Linda Winkler:
A differentiated services implementation for high-performance TCP flows. 915-929 - Thomas Boudier

, David M. Shotton:
VIDOS, a system for video editing and format conversion over the Internet. 931-944 - Pantelis Balaouras, Ioannis Stavrakakis

, Lazaros F. Merakos
:
Potential and limitations of a teleteaching environment based on H.323 audio-visual communication systems. 945-958 - Gertraud Hoffmann:

G-WiN - the Gbit/s infrastructure for the German scientific community. 959-964 - Stanislav Milanovic, Alessandro Maglianella:

ATM over ADSL probe in Telecom Italia environment. 965-980

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














