


default search action
Computer Communications, Volume 17
Volume 17, Number 1, January 1994
- Jeremy B. Thompson:

Editorial. 3 - Goopeel Chung, Kevin Jeffay, Hussein M. Abdel-Wahab:

Dynamic participation in a computer-based conferencing system. 7-16 - Jeremiah F. Hayes, F. Ayadi:

Performance calculation for an optical MAN. 17-24 - J. K. Roussos, E. G. Economou, George Philokyprou:

Congestion control protocols for interconnected LANs supporting voice and data traffic. 25-34 - R. M. Watson, S. Ward:

Prioritization in FDDI networks. 35-45 - Alfred C. Weaver

:
The Xpress Transfer Protocol. 46-52 - Yusheng Liu, Doan B. Hoang:

OSI RPC model and protocol. 53-66 - Randy L. Borchardt, Tri T. Ha:

Capture Aloha with two random power levels. 67-71
Volume 17, Number 2, February 1994
- Koon-Seng Lim, Robert Huijie Deng

, Kisenchand Ranai:
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems. 83-93 - Sridhar Narasimhan:

Locating concentrators in a computer network with multiple coverage for terminals. 94-102 - Ahmed Patel, Paul Gardiner:

A Database Handler (DBH) for broadband network administration. 103-118
- Neil Williams, Gordon S. Blair:

Distributed multimedia applications: A review. 119-132
- K. C. Chua, S. Guo:

Simulation of a TDM-like protocol for Gbit/s MANs. 133-138
- Ray Hunt:

Useful tutorial on OSI applications. 141 - Brian W. Marsden:

Authoritative and up to date book. 141-142
Volume 17, Number 3, March 1994
- Gee-Swee Poo:

Editorial. 146-147 - Wai Lung Loh, Gee-Swee Poo:

Object-oriented modelling and specification of the X.400 mail system. 148-155 - Michael Sample, Gerald W. Neufeld:

High-performance ASN.1 compiler. 156-171 - Richard Lai, Ajin Jirachiefpattana:

Verification of ISO ACSE protocol specified in Estelle. 172-188 - Sujata Banerjee

, Victor O. K. Li, Chihping Wang:
Performance analysis of the send-on-demand: A distributed database concurrency control protocol for high-speed networks. 189-204 - Raj Yavatkar, Leelanivas Manoj:

End-to-end approach to large-scale multimedia dissemination. 205-217 - Y. Ni, Andrzej M. Goscinski:

Trader cooperation to enable object sharing among users of homogeneous distributed systems. 218-229 - Thomas Hardjono, Tadashi Ohta:

Secure end-to-end delegations in distributed systems. 230-238
Volume 17, Number 4, April 1994
- J. K. Roussos, E. G. Economou, Panagiotis Georgiadis:

Congestion avoidance in high speed interconnected voice data traffic LANs. 242-250 - Koon-Seng Lim, Robert H. Deng

, Kisenchand Ranai:
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. 251-256 - Son T. Vuong, H. Janssen, Y. Lu, C. Mathieson, B. Do:

TESTGEN: An environment for protocol test suite generation and selection. 257-270 - Jean-Lien C. Wu, Tien-Yu Huang:

Delay analysis of a dual-bus LAN with reservation. 271-276 - Adelino Santos, Bernhard Tritsch:

Cooperative multimedia editing tool for enhanced group communication. 277-287 - W. S. Chung, C. K. Un, Byung-Choel Shin:

Analysis of delay bounds of a tree protocol with collision detection. 288-296 - Gilbert M. Lundy:

1st International Conference on Network Protocols. 299-300
Volume 17, Number 5, May 1994
- Hasan Pirkul, Ali Amiri:

Routing in packet-switched communication networks. 307-316 - Jim E. Cooling:

Survivable LANs for distributed control systems. 317-331 - Tien-Yu Huang, Jean-Lien C. Wu:

Priority promotion DQDB networks to improve fairness. 332-338 - John A. Robinson:

Communications services architecture for CSCW. 339-347 - Jeong-Ky Min:

Performance of end-to-end flow control in LAN/WAN interconnection. 348-362 - Kin Mun Lye, G. Y. Loo, Kee Chaing Chua, Winston Khoon Guan Seah

:
Adaptive self-stabilizing connection control scheme for server-based networks. 363-368 - Marion J. Dearlove:

The adoption of electronic trading in Western Europe. 369-374
Volume 17, Number 6, June 1994
- A. S. Andreatos, Emmanuel N. Protonotarios:

Receiver synchronization of a packet video communication system. 387-395 - Nen-Fu Huang, Chung-Ching Chiou:

Reservation scheme for CRMA high-speed networks. 396-406 - Salvatore Casale, Vincenzo Catania, Aurelio La Corte

:
Service integration issues on an ATM DQDB MAN. 407-418 - Ananthanarayanan Chockalingam, Pallapa Venkataram, A. Prabhakar:

Throughput-delay characteristics of OCUM protocol for media access in multihop wireless networks with buffers. 419-427 - George D. Stamoulis, Miltiades E. Anagnostou

, A. D. Georgantas:
Traffic source models for ATM networks: a survey. 428-438 - Jorge Santos, M. L. Gastaminza, Javier Orozco, C. Matrangolo:

802.5 priority mechanism in hard real-time RMS applications. 439-442
Volume 17, Number 7, July 1994
- Sead Muftic:

Editorial. 451-452 - Dorothy E. Denning:

The US key escrow encryption technology. 453-457 - Rainer A. Rueppel, Paul C. van Oorschot

:
Modern key agreement techniques. 458-465 - Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, Steffen Stempel:

TESS: A security system based on discrete exponentiation. 466-475 - Per Kaijser:

Security protection for parts of a data structure. 476-482 - John Linn:

Generic interface to security services. 483-491 - Sead Muftic, Morris Sloman:

Security architecture for distributed systems. 492-500 - Per Kaijser, Tom Parker, Denis Pinkas:

SESAME: The solution to security for open distributed systems. 501-518 - Peter T. Kirstein, Peter Williams:

Piloting authentication and security services in the 'PASSWORD' project. 519-531 - Terry Dosdale:

Security in EDIFACT systems. 532-537 - Stephan Lechner:

SAMSON: Management of security in open systems. 538-543 - Ahmed Patel:

Security management for OSI networks. 544-553
Volume 17, Number 8, August 1994
- K. E. Mourelatou, Anastasios T. Bouloutas, Miltiades E. Anagnostou

:
An approach to identifying QoS problems. 563-570 - Dong Geun Jeong, Chong-Ho Choi, Wha Sook Jeon:

Adaptive bandwidth waste rate: a fair bandwidth sharing scheme for the DQ protocol with multiple priority classes. 571-580 - Lek Heng Ngoh, Aurel A. Lazar:

Design and implementation of a manageable B-ISDN host interface. 581-588 - Ahmed E. Kamal, Hossam S. Hassanein:

Analysis of collision-avoidance star LANs. 589-599 - Lakshmana N. Kumar, Christos Douligeris, George Develekos:

Implementation of a decentralized Pareto optimal algorithm. 600-610 - Richard Cardinali, Daniel Hunt:

Growth and implications of network systems: technological and legislative issues. 611-618
Volume 17, Number 9, September 1994
- Christopher Ward, Sujata Mitra, Thomas M. Phillips:

Throughput efficiency of an enhanced link management procedure. 626-636 - Fabrice Guillemin

, Wei Monin:
Analysis of cell clumping caused by ATM network GFC protocols. 637-646 - Samir M. Koriem, Lalit M. Patnaik:

Performance of the node/link behaviour of multicomputer networks with input buffer limiting and channel contention. 647-656 - Efstathios D. Sykas, Konstantinos M. Vlakos, Ioannis Ch. Paschalidis, Georgia Mourtzinou:

Congestion avoidance for ATM networks. 657-662 - George M. Stamatelos, Jeremiah F. Hayes:

Admission-control techniques with application to broadband networks. 663-673 - Ming-Yung Ko, Tzonelih Hwang, Chin-Chen Chang:

Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. 674-676 - G. F. Zhao, Kin Mun Lye:

Synchronization protocol for high quality and single-point playout multimedia applications. 677-683
Volume 17, Number 10, October 1994
- Ahmed N. Tantawy:

Editorial. 690 - Stephen S. Yau, Doo-Hwan Bae:

Object-oriented and functional software design for distributed real-time systems. 691-698 - K. H. (Kane) Kim:

Fair distribution of concerns in design and evaluation of fault-tolerant distributed computer systems. 699-707 - Amr El-Kadi:

Tap processes. 708-716 - Volker Tschammer, Thomas Magedanz, Michael Tschichholz, Adam Wolisz:

Cooperative management in open distributed systems. 717-728 - Dominique Gaïti:

Introducing intelligence in distributed systems management. 729-738 - Clemens A. Szyperski

, Giorgio Ventre:
Guaranteed quality of service for efficient multiparty communication. 739-749 - Seung-Woo Seo, Tse-Yun Feng:

Modified composite Banyan network with an enhanced terminal reliability. 750-757
Volume 17, Number 11, November 1994
- Theodoros Mastichiadis, Eleftheris Economou, Anthony Davies:

Design principles and performance for flooding routing mesh topology spread spectrum LANs. 762-770 - Kin Mun Lye, L. Chan, Kee Chaing Chua:

Performance of a network protocol processor. 771-776 - Achim Karduck:

TeamBuilder: a CSCW tool for identifying expertise and team formation. 777-787 - Jiunn-Jian Li, Cheng-Ming Weng:

Self-routing multistage switch with repeated contention resolution algorithm for B-ISDN. 788-798 - Deepak Cherian, Ravi Mittal:

Analysis of 1-ROR networks. 799-804 - Chu-Hsing Lin, Chin-Chen Chang:

Method for constructing a group-oriented cipher system. 805-808 - Harold Lorin:

The economics of astonishing counter-example. 809-812
Volume 17, Number 12, December 1994
- Saewoong Bahk, Magda El Zarki:

Congestion control based dynamic routing in ATM networks. 826-835 - R. Clark Robertson, Tri T. Ha:

Effect of capture on throughput of variable length packet Aloha systems. 836-842 - Sameer M. Bataineh, Mohammad Al-Ibrahim:

Effect of fault tolerance and communication delay on response time in a multiprocessor system with a bus topology. 843-851 - G. J. Lu, H. K. Pung, T. S. Chua, S. F. Chan:

Temporal synchronization support for distributed multimedia information systems. 852-862 - Kassem Saleh, Hasan Ural, Anjali Agarwal:

Modified distributed snapshots algorithm for protocol stabilization. 863-870 - Debashis Saha

, Amitava Mukherjee
, Sourav K. Dutta:
Capacity assignment in computer communication networks with unreliable links. 871-875 - Damjan Zazula:

EDIpro - an integrated environment for electronic data interchange. 876-885

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














