default search action
Computer Networks, Volume 6
Volume 6, Number 1, February 1982
- G. Michael Schneider, Mary N. Zastrow:
An Algorithm for the Design of Multilevel Concentrator Networks. 1-11 - Gordon S. Blair:
A Performance Study of the Cambridge Ring. 13-20 - Chris J. Bennett:
The Overheads of Transnetwork Fragmentation. 21-36 - Werner Bux, Karl Kümmerle, Hong Linh Truong:
Data Link-Control Performance: Results Comparing HDLC Operational Modes. 37-51
Volume 6, Number 2, May 1982
- J. Rubin, Colin H. West:
An Improved Protocol Validation Technique. 65-73 - Milena Didic, Bernd E. Wolfinger:
Simulation of a Local Computer Network Architecture Applying a Unified Modeling System. 75-91 - V. Carl Hamacher, Gerald S. Shedler:
Access Response on a Collision-Free Local Bus. 93-103 - Gordon S. Blair, Doug Shepherd:
A Performance Comparsion of Ethernet and the Cambridge Digital Communication Ring. 105-113
Volume 6, Number 3, July 1982
- Marvin H. Solomon, Lawrence H. Landweber, Donald Neuhengen:
The CSNET Name Server. 161-172 - Bernd Walter:
A Robust and Efficient Protocol for Checking the Availability of Remote Sites. 173-188 - Liang Li, Herman D. Hughes, Lewis H. Greenberg:
Performance Analysis of a Shortest-Delay Protocol. 189-200 - Thomas P. Blumer, Richard L. Tenney:
A Formal Specification Technique and Implementation Method for Protocols. 201-217
Volume 6, Number 4, September 1982
- Vernon Coleman:
Siliconizing the Local Area Network. 245-254 - Alastair Grant, David Hutchison:
X25 Protocols and Local Area Networks. 255-262 - Brian W. Unger, Don S. Bidulock:
The Design and Simulation of a Multi-Computer Network Message Processor. 263-277 - Wai Sum Lai:
An Analysis of Piggybacking in Packet Networks. 279-290
Volume 6, Number 5, November 1982
- S. Sitharama Iyengar, Wendy Chih-Chun Liu:
Performance Statistics of a Time-Sharing Computer Network. 303-317 - J. A. Melici:
The BX.25 Certfication Facility. 319-329 - Charles W. Bachman, Ronald G. Ross:
Toward a More Complete Reference Model of Computer-Based Information Systems. 331-343 - Stefano Ceri, Giancarlo Martella, Giuseppe Pelagatti:
Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem. 345-357
Volume 6, Number 6, December 1982
- Carl A. Sunshine:
Protocol Specification, Testing and Verification - Guest Editorial. 375-376 - Yechiam Yemini, James F. Kurose:
Can Current Protocol Verification Techniques Guarantee Correctness? 377-381 - David Rayner:
A System for Testing Protocol Implementations. 383-395 - Thomas F. Piatkowski, Lap-Kin Ip, Dayun He:
State Architecture Notation and Simulation: A Formal Technique for the Specification and Testing of Protocol Systems. 397-418 - Michel Diaz:
Modeling and Analysis of Communication and Cooperation Protocols Using Petri Net Based Models. 419-441
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.