


default search action
Computer Communications, Volume 22
Volume 22, Number 1, 15 January 1999
- Sheng-Tzong Cheng:

Backtrack Routing and Priority-Based Wavelength Assignment in WDM Networks. Comput. Commun. 22(1): 1-10 (1999) - Georgios I. Papadimitriou:

Centralized Packet Filtering Protocols: A New Family of MAC Protocols for WDM Star Networks. Comput. Commun. 22(1): 11-19 (1999) - Periklis Tsingotjidis, Jeremiah F. Hayes:

Proactive Congestion Controls for the Support of Variable Bit Rate Services on Broadband satellite Networks - A Feasibility Study. Comput. Commun. 22(1): 20-29 (1999) - Nada Golmie, Mark D. Corner, Jörg Liebeherr, David H. Su:

ATM Traffic Control in Hybrid Fiber-Coax Networks - Problems and Solutions. Comput. Commun. 22(1): 30-39 (1999) - Xinyu Wang, James S. Meditch:

Adaptive Wavelet Predictor to Improve Bandwidth Allocation Efficiency of VBR Video Traffic. Comput. Commun. 22(1): 40-45 (1999) - Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu:

Optimal Assignment of Mobile Agents for Software Authorization and Protection. Comput. Commun. 22(1): 46-55 (1999) - Jau-Hsiung Huang, Chun-Chuan Yang, Nai-Cheng Fang:

A Novel Congestion Control Mechanism for Multicast Real-Time Connections. Comput. Commun. 22(1): 56-72 (1999) - Wen-Shenq Juang, Chin-Laung Lei:

Partially Blind Threshold signatures Based on Discrete Logarithm. Comput. Commun. 22(1): 73-86 (1999) - Narn-Yih Lee, Tzonelih Hwang:

Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy". Comput. Commun. 22(1): 87-89 (1999)
Volume 22, Number 2, 25 January 1999
- Jung-Shian Li, Adam Wolisz, Radu Popescu-Zeletin:

Measurement and Performance Evaluation of NFS Traffic in ATM Network. Comput. Commun. 22(2): 101-109 (1999) - Hasan Cam:

A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network. Comput. Commun. 22(2): 110-119 (1999) - Robert M. Hierons:

Minimizing the Cost of Fault Location when Testing from a Finite State Machine. Comput. Commun. 22(2): 120-127 (1999) - Samphel Norden, S. Balaji, G. Manimaran, C. Siva Ram Murthy:

Deterministic Protocols for Real-Time Communication in Multiple Access Networks. Comput. Commun. 22(2): 128-136 (1999) - Yong Lee, JooSeok Song:

An Overload Control of SCP in Advanced Intelligent Network with Fairness and Priority. Comput. Commun. 22(2): 137-143 (1999) - Jhyda Lin, Ruay Shiung Chang:

A Comparison of the Internet Multicast Routing Protocols. Comput. Commun. 22(2): 144-155 (1999) - Debanjan Saha, M. D. Purkayastha, Amitava Mukherjee:

An Approach to Wide Area WDM Optical Network Design Using Genetic Algorithm. Comput. Commun. 22(2): 156-172 (1999) - Sooyong Kang, Heon Young Yeom:

Transmission of Video Streams with Constant Bandwidth Allocation. Comput. Commun. 22(2): 173-180 (1999) - Chor Ping Low:

Loop-Free Multicast Routing with End-to-End Delay Constraint. Comput. Commun. 22(2): 181-192 (1999) - Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun:

A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Comput. Commun. 22(2): 193-194 (1999)
Volume 22, Number 3, February 1999
- Giuseppe Ficili, Daniela Panno:

A fuzzy algorithm for combined control of traffic parameters: assessment and key issues. 199-210 - Stefan Fischer:

Towards the automatic generation of quality-of-service-preserving implementations from formal specifications. 211-223 - W. K. Lai, R. F. Chang:

Virtual path layout in ATM networks based on the P-median problem. 224-231 - Gurusamy Mohan, C. Siva Ram Murthy:

Efficient algorithms for wavelength rerouting in WDM multi-fiber unidirectional ring networks. 232-243 - K. R. Venugopal, E. Ezhil Rajan, P. Sreenivasa Kumar:

Impact of wavelength converters in wavelength routed all-optical networks. 244-257 - Vincenzo Catania, Giuseppe Ficili, Daniela Panno:

On the impact of traffic control algorithms on resource management in ATM networks. 258-265 - D. Venkatesulu, Timothy A. Gonsalves:

Efficient fault-tolerant reliable broadcast in a multi-switch extended LAN. 266-278 - Wei-Chi Ku, Sheng-De Wang:

A secure and practical electronic voting scheme. 279-286 - Narn-Yih Lee, Tzonelih Hwang:

On the security of fair blind signature scheme using oblivious transfer. 287-290
- Rita Puzmanova:

Daniel Minoli and Andrew Schmidt: Network Layer Switched Services. 291-292
Volume 22, Number 4, March 1999
- Neeraj K. Sharma

:
Review of recent shared memory based ATM switches. 297-316 - Ibrahim W. Habib, Tarek N. Saadawi:

Dynamic bandwidth control in ATM networks. 317-339 - Elias Drakopoulos:

Enterprise network planning and design: methodology and application. 340-352 - Anirban Roy, Pallapa Venkataram:

A multiple access scheme for VBR traffic in broadband wireless local communication. 353-360 - Evangelia Tzifa, Panagiotis Demestichas, Malamati D. Louta

, E. S. Tsouka, Michael E. Theologou, Miltiades E. Anagnostou
:
Adaptive radio spectrum allocation through mid-term reconfigurations for cellular communications systems. 361-375 - Robert Leslie, Sati McKenzie:

Evaluation of loadsharing algorithms for heterogeneous distributed systems. 376-389 - Kaijun Tan, Hongwen Zhu:

Remote password authentication scheme based on cross-product. 390-393
Volume 22, Number 5, April 1999
- Reuven Cohen:

An efficient scheme for accommodating synchronous traffic in a cable-modem network while avoiding segmentation of asynchronous packets. 399-410 - Gung-Chou Lai, Ruay Shiung Chang:

Support QoS in IP over ATM. 411-418 - Li-Shen Juhn, Li-Ming Tseng:

Achieve high accuracy of network time with proper parameters. 419-431 - Chi-Chun Lo, Shing Hong Chen:

A scheduling-based event correlation scheme for fault identification in communications network. 432-438 - Diane Gan, Sati McKenzie:

Traffic policing in ATM networks with multimedia traffic: the super leaky bucket. 439-450 - Y. J. Cho:

Discrete-time analysis of throughput and response time for LAP derivative protocols under Markovian block-error pattern. 451-462 - R. Radhakrishna Pillai, Su Kwe Long, Jit Biswas, Chen-Khong Tham

:
Call performance studies on the ATM forum UNI signalling implementations. 463-469 - Tae-Joon Kim, Byung-Choel Shin:

Improving the performance of distributed queue dual bus with slot reuse at overload conditions. 470-482 - Chin-Ling Chen, Ruay Shiung Chang:

Dynamic priority transmission mechanism for DQDB. 483-490
- Rolf Oppliger:

D. B. Parker: Fighting computer crimes: a new framework for protecting information. 491-492 - Z. Fan:

G. N. Higginbottom: Performance evaluation of communication networks. 492 - Jerzy Wechta:

B. Haverkort: Performance of computer communication systems. 492-493 - Tee Hiang Cheng, Andrew T. Campbell, Klara Nahrstedt:

Building QoS into distributed systems. 493-494
Volume 22, Number 6, April 1999
- Z. Fan:

New trends in ATM networks: a research view. 499-515 - Mahmoud Saleh, Mohammed Atiquzzaman

:
An accurate performance model of shared buffer ATM switches under hot spot traffic. 516-522 - Gee-Swee Poo, Q. Zeng:

Design, implementation and performance study of reliable transactions in X.500 directory service. 523-542 - W. K. Lai, J.-Y. Tsai:

A flow control scheme on ATM networks with max-min fairness. 543-555 - Woei Lin, Wen-Shyen E. Chen:

Efficient nonblocking multicast communications on baseline networks. 556-567 - Kee Chaing Chua, Y. Z. Li, C. C. Foo:

On a Linux implementation of mobile IP and its effects on TCP performance. 568-588
- Rita Puzmanova:

Virtual LANs: construction, implementation, and management. New York: John Wiley and Sons, 1997, ISBN 0-471-17732-6, US$ 39.33, 321 pages: High-speed networking with LAN switches. 589-590 - Tom Pfeifer:

Speech technology for telecommunications - BT telecommunication series; Vol. 11; F.A. Westall, R.D. Johnston, A.V. Lewis (Eds.). 590 - Robert H. Deng

:
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. 591
Volume 22, Number 7, May 1999
- Senad Busovaca:

Editorial. 597- - Yuanyuan Yang

:
An analytical model for the performance of buffered multicast banyan networks. 598-607 - Dimiter R. Avresky, Vladimir Shurbanov, Robert W. Horst:

Optimizing router arbitration in point-to-point networks. 608-620 - S. A. M. Makki:

Eulerian tour construction in a distributed environment. 621-628 - Farid G. Hatefi, Forouzan Golshani:

A new framework for secure network management. 629-636 - Kia Makki, Niki Pissinou:

Efficient detection and resolution of deadlocks in distributed databases. 637-643 - Mohammad S. Obaidat

, Jun Teng:
A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks. 644-650 - Niki Pissinou, Kia Makki, William J. Campbell:

On the design of a location and query management strategy for mobile and wireless environments. 651-666 - Jaihyung Cho, James Breen:

Analysis of the performance of dynamic multicast routing algorithms. 667-674 - Jerrold F. Stach, Eun Kyo Park, Kia Makki:

Performance of an enhanced GSM protocol supporting non-repudiation of service. 675-680 - Dimiter R. Avresky:

Formal verification and testing of protocols. 681-690
Volume 22, Number 8, May 1999
- Stefanos Gritzalis

, Diomidis Spinellis
, Panagiotis Georgiadis:
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. 697-709 - Jianying Zhou, Kwok-Yan Lam:

Securing digital signatures for non-repudiation. 710-716 - Hung-Min Sun:

An efficient nonrepudiable threshold proxy signature scheme with known signers. 717-722 - Wei-Hua He, Tzong-Chen Wu:

Cryptanalysis of Lee and Chang's ID-based information security functions. 723-726 - Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang:

New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. 727-729 - Narn-Yih Lee, Tzonelih Hwang:

Group-oriented undeniable signature schemes with a trusted center. 730-734 - Kaijun Tan, Hongwen Zhu:

A conference key distribution scheme based on the theory of quadratic residues. 735-738 - B. Zhan, Z. Li, Y. Yang, Z. Hu:

On the security of HY-key authentication scheme. 739-741 - Min-Shiang Hwang:

Cryptanalysis of a remote login authentication scheme. 742-744 - Hung-Min Sun:

On-line multiple secret sharing based on a one-way function. 745-748 - Yuh-Min Tseng, Jinn-ke Jan:

Anonymous conference key distribution systems based on the discrete logarithm problem. 749-754 - Kaijun Tan, Hongwen Zhu:

General secret sharing scheme. 755-757 - Valdemar Cardoso da Rocha Jr.

, David Lopes de Macêdo:
A secret-key cipher based on a non-linear structured code. 758-761 - Kaijun Tan, Hongwen Zhu, S.-J. Gu:

Cheater identification in (t, n) threshold scheme. 762-765
Volume 22, Number 9, June 1999
- Ming-Huang Guo, Ruay Shiung Chang:

Design issues for multicast ATM switches. 771-777 - Giovanni Fruscio, A. Ishaq, Valentina Petrone:

A signalling server prototype for the support of multipoint to multipoint multimedia services. 778-791 - HungKei Keith Chow, Alberto Leon-Garcia:

Integrated services internet with RSVP over ATM short cuts: Implementation and performance evaluation. 792-802 - Tee-Hiang Cheng, Y.-K. Sze, Wesley Chee-Wah Tan:

A heuristic algorithm for allocating virtual path bandwidth in an ATM network. 803-810 - Georgios I. Papadimitriou, Amalia N. Miliou

, Andreas S. Pomportsis:
OCON: an optically controlled optical network. 811-824 - Ahmed E. Kamal, Hossam S. Hassanein

:
Capacity enhancement of local area bus networks using wavelength division multiplexing. 825-839 - Debabrata Das

, S. S. Saini, Debasish Datta:
Performance analysis of computer networks employing linked-cluster topology with single-wavelength and WDM optical backbones. 840-848 - Liren Zhang, Chih-Hong Eyoh, Chee Hock Ng:

An ATM cross-connecting node using optical CDMA. 849-857 - Hairong Sun, Xinyu Zang, Kishor S. Trivedi:

A stochastic reward net model for performance analysis of prioritized DQDB MAN. 858-870 - Chien-Yuan Chen, T.-C. Liu:

A fast modular multiplication method based on the Lempel-Ziv binary tree. 871-874
- Y.-C. Chen:

M. Sexton, A. Reid: Broadband networking: ATM, SDH and SONET. 875 - Debashis Saha:

Mobile systems. I. Groves (Ed.). 876 - Debashis Saha:

Broadband communications: the future of telecommunications by P. Kuhn & R. Ulrich (Eds.). 877-878
Volume 22, Number 10, June 1999
- B. Harris, Ray Hunt:

TCP/IP security threats and attack methods. 885-897 - Cheng-Shong Wu, Steven Shi-Wei Lee

:
Backup VP planning for multicast connections in ATM networks. 898-906 - Q. Wu, Thierry Divoux, Francis LePage:

Integrating multimedia communications into an MMS environment. 907-918 - Israel Cidon, Raphael Rom, Yuval Shavitt

:
Bandwidth reservation for bursty traffic in the presence of resource availability uncertainty. 919-929 - Joseph Kee-Yin Ng, Victor C. S. Lee

:
Transmitting real-time VBR traffic with QoS control in a timed token medium access control network. 930-941 - George Mamais, George A. Politis, Iakovos S. Venieris:

Design and implementation of a broadband intelligent peripheral. 942-954 - Jerzy Wechta, Armin Eberlein

, Fred Halsall:
The impact of topology and choice of TCP window size on the performance of switched LANs. 955-965 - Tong Shan, Oliver W. W. Yang:

An efficient admission control scheme for the real-time VBR traffic in the ATM network: deterministic bandwidth allocation. 966-979
- Georgios I. Papadimitriou, Andreas S. Pomportsis:

Optical network design and modelling, by H.R. van As, A. Jukan (Eds.). 980 - Hairong Sun:

Performance Modelling with Deterministic and Stochastic Petri Nets; C. Lindemann (Ed.). 980 - Yonghuan Cao, Hairong Sun:

Quality of service: delivering QoS on the internet and in corporate networks; P. Ferguson, G. Huston. 981
Volume 22, Number 11, July 1999
- Gee-Swee Poo, Andrzej M. Goscinski:

Introduction to special issue on network-based parallel and distributed computing. 987-988 - Amnon Barak, Ilia Gilderman, Igor Metrik:

Performance of the communication layers of TCP/IP with the Myrinet gigabit LAN. 989-997 - Andrzej M. Goscinski:

Finding, expressing and managing parallelism in programs executed on clusters of workstations. 998-1016 - Shiping Chen, Jingling Xue

:
Partitioning and scheduling loops on NOWs. 1017-1033 - Micah Beck, Henri Casanova, Jack J. Dongarra, Terry Moore, James S. Plank

, Francine Berman, Richard Wolski:
Logistical quality of service in NetSolve. 1034-1044 - Peter J. Keleher:

Update protocols and cluster-based shared memory. 1045-1055 - Wanlei Zhou

:
Detecting and tolerating failures in a loosely integrated heterogeneous database system. 1056-1067 - Wanlei Zhu, Tyng-Yeu Liang, Ce-Kuen Shieh:

A Hopfield neural network based task mapping method. 1068-1079
Volume 22, Number 12, July 1999
- Sonia Fahmy

, Raj Jain
, Rohit Goyal, Bobby Vandalore, Shivkumar Kalyanaraman:
Design and evaluation of feedback consolidation for ABR point-to-multipoint connections in ATM networks. 1085-1103 - Tomaz Klobucar

, Borka Jerman-Blazic:
A formalisation and evaluation of certificate policies. 1104-1110 - Liren Zhang, Kee Way Ng, Chee Hock Ng, K. R. Subramanian:

Incorporating priority scheme in IPv6 over ATM networks. 1111-1122 - G. Mueller, Peter W. Sanders, J. Allen:

Traffic profiles and application signatures. 1123-1126 - N. Swaminathan

, Jagannathan Srinivasan, S. V. Raghavan:
Bandwidth-demand prediction in virtual path in ATM networks using genetic algorithms. 1127-1135 - Yihong Long, T. K. Ho, Ahmad B. Rad, Stephen P. S. Lam:

A Sigma GIi/D/1/infinity queue with heterogeneous input/output slot times. 1136-1149 - Ki-Ho Cho, Hyunsoo Yoon:

Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees. 1150-1159 - Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee:

Conference key distribution schemes for portable communication systems. 1160-1164 - Rolf Oppliger:

Security issues related to mobile code and agent-based systems. 1165-1170
- Xiang Fu:

Broadband Access Network; by L.A. Ims. 1171 - Xiang Fu:

Signaling in ATM networks; by R. Onvural, R. Cherukuri (Eds.). 1171-1172 - Liren Zhang:

Intelligent Broadband Networks; by I. Venieris, H. Hussmann. 1173 - Chi-Chun Lo:

Building and managing virtual private network; by D. Kosiur. 1173
Volume 22, Number 13, August 1999
- Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic:

Decentralized group key management for secure multicast communications. 1183-1187 - Ji-Horng Liaw, Cheng-Ming Weng:

Two-dimensional shared memory multicast ATM switching architecture. 1188-1197 - Jen-Kai Chen, Jean-Lien C. Wu:

Heuristic batching policies for video-on-demand services. 1198-1205 - Eduardo Tovar

, Francisco Vasques
:
Cycle time properties of the PROFIBUS timed-token protocol. 1206-1216 - Andrea Borella:

Linear multicasting in dynamic networks. 1217-1226 - Wei Kuang Lai, Duan Ruei Shiu, Mei Chian Liou, Jiunn-yih Tsai:

Fair and reliable hop-by-hop flow control. 1227-1233 - Yaw-Chung Chen, Shuo-Cheng Hu, Chia-Tai Chan, Chun-Liang Lee:

Frame-based priority scheduling in hybrid IP/ATM networks. 1234-1246 - Yihong Long, T. K. Ho, Ahmad B. Rad, Stephen P. S. Lam:

A study of the generalised max-min fair rate allocation for ABR control in ATM. 1247-1259 - Sheng-Cheng Yeh, Jung-Shyr Wu, Yuan-Cheng Liang:

Dynamic accommodation of the permission probability over the joint voice/data frame reservation multiple access. 1260-1265 - Chee Hock Ng, Lihua Yuan, Huirong Fu, Liren Zhang:

Methodology for traffic modeling using two-state Markov-modulated Bernoulli process. 1266-1273
- Tom Pfeifer:

Optical Fiber Communication Systems, L.G. Kazovsky, S. Benedetto, A.E. Willner (Eds.). 1274 - Jianying Zhou:

Computer Security; D. Gollmann. 1274-1275 - R.-S. Chang:

Future codes: essays in advanced computer technology and the law; C.E.A. Karnow. 1275
Volume 22, Number 14, September 1999
- Mohammed Atiquzzaman:

Special Issue: Enterprise Networks. 1281-1282 - Ming Hou, Hussein T. Mouftah:

Investigation of premium service using differentiated services IP. 1283-1295 - Mahbub Hassan, Harsha R. Sirisena, Mohammed Atiquzzaman

:
A congestion control mechanism for enterprise network traffic over asynchronous transfer mode networks. 1296-1306 - Sonia Fahmy

, Raj Jain
, Sameh Rabie, Rohit Goyal, Bobby Vandalore:
Quality of service for Internet traffic over ATM service categories. 1307-1320 - Samir Chatterjee:

TCP behavior over HFC cable modem access networks. 1321-1332 - James Won-Ki Hong, Soon-Sun Kwon, Jae-Young Kim:

WebTrafMon: Web-based Internet/Intranet network traffic monitoring and analysis system. 1333-1342 - Hairong Sun, Xinyu Zang, Kishor S. Trivedi:

The effect of Web caching on network planning. 1343-1350 - Algirdas Pakstas:

Towards electronic commerce via science park multi-Extranets. 1351-1363
Volume 22, Number 15-16, September 1999
- Wenge Ren, Kai-Yeung Siu, Hiroshi Suzuki:

Excess buffer requirement for EPD schemes in ATM networks. 1367-1381 - Heejune Ahn, Andrea Baiocchi, Jae-kyoon Kim:

On the time scales in video traffic characterization for queueing behavior. 1382-1391 - Fei Xiang, Junzhou Luo, Jieyi Wu, Guanqun Gu:

QoS routing based on genetic algorithm. 1392-1399 - K. K. Varghese Panicker, C. Siva Ram Murthy, Ravi Mittal:

An improved scheme for self-healing in ATM networks. 1400-1414 - T. Kijkanjanarat, H. Jonathan Chao:

Fast IP routing lookups for high performance routers. 1415-1422 - Hossam S. Hassanein

, Hosam M. F. AboElFotoh
, Shatha K. Habra:
Dynamic resource-allocation for congestion-control in high-speed LAN Interconnection. 1423-1439 - Seoklae Lee, JooSeok Song:

An integrated admission control based on measurements in ATM networks. 1440-1446 - DaeHun Nyang, S. Y. Lim, JooSeok Song:

A complete test sequence using cyclic sequence for conformance testing. 1447-1456 - Wai-Chung Poon, Kwok-Tung Lo:

The study on statistical multiplexing of homogeneous VBR-MPEG video streams. 1457-1467 - Ioannis E. Pountourakis:

A multiwavelength control architecture for electronic processing bottleneck reduction in WDMA lightwave networks. 1468-1480 - K. K. Varghese Panicker, C. Siva Ram Murthy, Ravi Mittal:

A new algorithm for virtual path network design in ATM networks. 1481-1492 - Jin-Ru Chen, Yaw-Chung Chen:

Pseudo-rate TCP: a congestion avoidance scheme with nearly optimized fairness and throughput. 1493-1501 - Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang:

Anonymous channel and authentication in wireless communications. 1502-1511 - Vijay Varadharajan, Rajan Shankaran

, Michael Hitchens
:
On the design of secure ATM networks. 1512-1525 - Jung-Shian Li:

LAN testing and troubleshooting; G. Held. 1526 - Jung-Shian Li:

Mobile Agents and Security; G. Vigna (Ed.). 1526-1527
Volume 22, Number 17, October 1999
- Allen Roginsky, Kenneth J. Christensen, V. Srinivasan:

New methods for shortest path selection for multimedia traffic with two delay constraints. 1531-1539 - Chi-Chun Lo, Chen-Yu Chiu:

A fault-tolerant architecture for ATM networks. 1540-1548 - Prokopis E. Giannakakis, N. Lepidas, I. Pikrammenos, Iakovos S. Venieris:

The broadband bearer connection control protocol: performance driven design and implementation. 1549-1561 - Bruno Gaujal, Nicolas Navet:

Traffic shaping in real-time distributed systems: a low-complexity approach. 1562-1573 - Shuo-Yen Robert Li, Hui Li, Gar Man Koo:

Fast knockout algorithm for self-route concentration. 1574-1584 - Fang-Jang Kuo, Jung-Shyr Wu, D. L. Keng:

Usage parameter control schemes for improving MPEG video quality over ATM networks. 1585-1591 - Min Young Chung, Sang Hyuk Kang, Dan Keun Sung:

Performance analysis of two schemes for managing information related to incall registration in wireline UPT networks. 1592-1606 - Takayuki Kushida:

An empirical study of the characteristics of Internet traffic. 1607-1618
- Robert M. Hierons

:
Testing of Communicating Systems, Vol. 10 by Myungchul Kim, Sugwon Kang, Keesoo Hong (Eds.). 1619-1620 - Debajyoti Mukhopadhyay:

Dictionary of Multimedia and Internet Applications; F. Botto. 1620 - Mohammed Atiquzzaman:

Introduction to Queuing Networks; E. Gelenbe, G. Pujolle. 1621
Volume 22, Number 18, December 1999
- J. Walter Thompson:

Advanced communications technologies and services. 1627 - William Donnelly:

Managing multiprovider networks. 1628-1632 - Vincent P. Wade:

Service management and the telecommunications information networking architecture. 1633-1637 - H. Stewart:

Future access network architectures. 1638-1640 - H. Stewart:

Delivering broadband to the customer. 1641-1643 - Borka Jerman-Blazic, Lidia Yamamoto, Pascal Drabik, Andrew Hallan:

Distributed group collaborative work through the "Symmetric TV" model. 1644-1651 - J. L. Caffrey:

ATM services charging. 1652-1656

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














