


default search action
Bell Labs Technical Journal, Volume 8
Volume 8, Number 1, 2003
- Kristin F. Kocan:
Capitalizing on the growing presence of IP networks in the telecom space. 1-3 - Lester T. W. Ho, Louis G. Samuel, Jonathan M. Pitts:
Applying emergent self-organizing behavior for the coordination of 4G networks using complexity metrics. 5-25 - Lynell E. Cannell, Michel L. F. Grech, Anne Y. Lee, Musa R. Unmehopa:
Service control for next-generation applications in wireless IP multimedia networks. 27-42 - Guy J. Zenner, Mark Hedley Jones, Amit A. Patel:
Emerging uses of SIP in service provider networks. 43-63 - Jeffrey G. Anderson, Steven L. Makowski, Stanley Tamras:
Optical interface unit - Bridge to the next-generation packet network. 65-81 - Vijay K. Gurbani, Kim Q. Liu:
Session initiation protocol: Service residency and resiliency. 83-94 - Marina Thottan, George K. Swanson, Michael Cantone, Tin Kam Ho, Yansong (Jennifer) Ren, Sanjoy Paul
:
SEQUIN: An SNMP-based MPLS network monitoring system. 95-111 - Andrew R. McGee, Chun K. Chan, David D. Picklesimer, Uma Chandrashekhar, Steven H. Richman, Edwin O. Lambert:
A brink of failure and breach of security detection and recovery system. 113-130 - Kyriakos Vlachos:
A novel network processor for security applications in high-speed data networks. 131-149 - Willem A. Romijn, Geert Jan Hoekstra, Joan Serrat, Eduardo Grampín
:
Enhancing network management by applying policy management principles. 151-156 - Kevin W. McKiou, Frank R. Buckley Jr.:
Data-driven fault management within a distributed object-oriented OAM&P framework. 157-179 - Marcus K. Weldon, Francis Zane:
The economics of fiber to the home revisited. 181-206 - Lily Cheng, John Ellson, Admela Jukan, Patrice N. Lamy, Eve L. Varma:
Network engineering - Control of dynamic link topology in user networks. 207-218 - Mansoor Alicherry, Sadanand Gogate, Rohit Khanna, Harsha S. Nagesh, Chitra Phadke, Vishy Poosala, Sathya Srinivasan:
WaveTunnel - Accurately designing deployable optical networks. 219-232 - Toby Joyce, Edward J. Lisay, Robert L. Nickerson:
An excel VBA application of Hoadley's QMP algorithm. 233-237 - Recent Lucent technologies patents. 239-246
Volume 8, Number 2, 2003
- Thomas V. Kurien, Gary N. Weber:
Overview. 1-2 - Avesh Kumar Agarwal, R. Krishna Kumar:
An evaluation of current QoS solutions for mobile IP networks. 3-13 - Isaac Samuel, Kishore Arora, Bhuvarahamurthy Narasimhan:
Location-based performance-measuring techniques in UMTS. 15-32 - Simon C. Borst, Kenneth L. Clarkson, John M. Graybeal, Harish Viswanathan, Philip A. Whiting:
User-level QoS and traffic engineering for 3G wireless 1xEV-DO systems. 33-47 - Jeffrey H. Dunn, Cynthia E. Martin:
The effect of physical and link layers on IP QoS. 49-63 - Bastien Peelen, Miroslav Zivkovic, Dennis J. A. Bijwaard
, Harold Teunissen:
Supporting QoS in broadband wireless and wired access. 65-81 - Richa Malhotra, Ronald van Haalen, Ronald de Man, Michiel van Everdingen:
Managing service-level agreements in metro ethernet networks using backpressure. 83-95 - David J. Houck, Eunyoung Kim, Hüseyin Uzunalioglu, Larry A. Wehr:
A measurement-based admission control algorithm for VoIP. 97-110 - Harald Graber, Humberto J. La Roche:
Multi-service switches and the Service IntelligentTM optical architecture for SONET/SDH metro networks. 111-127 - Bell Labs innovation briefs. 129-130
- Recent Lucent technologies patents. 131-139
Volume 8, Number 3, 2003
- Wim Sweldens:
Overview. 1-2
- Mansoor Alicherry, Randeep Bhatia, Harsha S. Nagesh, Chitra Phadke, Vishy Poosala:
Testing and verification of network management and design tools. 3-13 - Harold J. Batteram, Willem A. Romijn:
A test framework for CORBAstar component model-based software systems. 15-29 - Alan J. McBride, Mario Lobo Del Olmo, Brian T. Martin, Francis J. Finnegan:
Increased competitiveness through component technology for element management systems. 31-49 - Neil R. Bass:
Component architecture in a network management system. 51-65 - Indira Kuruganti, Dennis Mancl:
Building and applying requirements models. 67-73 - Robert S. Hanmer, John P. Letourneau:
A best practice for performance engineering. 75-89 - F. Michael Dedolph:
The neglected management activity: Software risk management. 91-95 - Bill Pyritz:
Extreme programming in the telecommunications domain. 97-100 - Bill Pyritz:
Craftsmanship versus engineering: Computer programming - An art or a science? 101-104 - Ai G. Nguyen, Richard L. Sohn:
Refactoring administrative services module platform software. 105-110 - Munirul Islam, Eugene P. Bordelon:
CCMS: A geographically distributed concurrent change and configuration management system. 111-133 - Recent Lucent technologies patents. 135-143
Volume 8, Number 4, 2004
- Uma Chandrashekhar, Steven H. Richman, Rati C. Thanawala:
Overview. 1-5
- Andrew R. McGee, S. Rao Vasireddy, Chen Xie, David D. Picklesimer, Uma Chandrashekhar, Steven H. Richman:
A framework for ensuring network security. 7-27 - Hemi Trickey, Alvin Barshefsky:
An access control architecture for managing large-scale network applications. 29-38 - Chun K. Chan, Himanshu Pant:
Reliability and security modeling in upgrading wireless backbone networks. 39-53 - Douglas H. Bellows:
Architectures for secure operation and maintenance of converged voice and data networks. 55-59 - Abdur Rahim Choudhary:
Service intelligence through agile information controls. 61-70 - Cynthia E. Martin, Jeffrey H. Dunn:
Authentication mechanisms for call control message integrity and origin verification. 71-91 - Sampath Rangarajan, Anil Takkallapalli, Sarit Mukherjee, Sanjoy Paul
, Scott C. Miller:
Adaptive VPN: Tradeoff between security levels and value-added services in virtual private networks. 93-113 - Vivek Sharma:
Intrusion detection in infrastructure wireless LANs. 115-119 - Yigang Cai, Jack Kozik, Helmut L. Raether, John B. Reid, Guy H. Starner, Sunil Thadani, Kumar V. Vemuri:
Authorization mechanisms for mobile commerce implementations in enhanced prepaid solutions. 121-131 - Chi-Hung Kelvin Chu, Ming Chu:
An integrated framework for the assessment of network operations, reliability, and security. 133-152 - David J. Houck, Eunyoung Kim, Gerard P. O'Reilly, David D. Picklesimer, Hüseyin Uzunalioglu:
A network survivability model for critical national infrastructures. 153-172 - William L. Fithen, Shawn V. Hernan, Paul F. O'Rourke, David A. Shinberg:
Formal modeling of vulnerability. 173-186 - S. Rao Vasireddy, Steven Wolter, Uma Chandrashekhar, Robert J. Thornberry Jr., Andrew R. McGee:
Security posture for civilian and non-civilian networks. 187-202 - Herbert Bertine, Igor Faynberg, Hui-Lan Lu:
Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF. 203-229 - Recent Lucent technologies patents. 231-241

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.