default search action
Computer Communications, Volume 18
Volume 18, Number 1, January 1995
- Thomas Meuser:
Performance Comparison of Media Access Protocols for Gbit/s Networks in the Local Area. Comput. Commun. 18(1): 4-14 (1995) - Marco Conti, Enrico Gregori, Luciano Lenzini:
Estimating the Quality of Service of Token Passing MAC Protocols. Comput. Commun. 18(1): 15-23 (1995) - Paola Crocetti, Shivi Fotedar, Luigi Fratta, Giorgio Gallassi, Mario Gerla:
ATM Virtual Private Network Design Alternatives. Comput. Commun. 18(1): 24-31 (1995) - Ruixi Yuan:
Traffic Pattern Based Mobile Routing Scheme. Comput. Commun. 18(1): 32-36 (1995) - Milan Kovacevic, Mario Gerla, Joseph A. Bannister:
Performance of Shared-Channel Multihop Lightwave Networks. Comput. Commun. 18(1): 37-44 (1995) - Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Comput. Commun. 18(1): 45-47 (1995) - Tien-Yu Huang, Jean-Lien C. Wu, I. Bosley, T. Kuchlein, Krzysztof Pawlikowski, A. Stewart:
On Priority Promotion DQDB Networks to Improve Fairness. Comput. Commun. 18(1): 48-49 (1995) - Christopher Ward, Thomas M. Phillips:
Throughput Efficiency of an Enhanced Link Management Procedure. Comput. Commun. 18(1): 50-51 (1995)
Volume 18, Number 2, February 1995
- Magdalena Feldhoffer:
Model for Flexible Configuration of Application-Oriented Communication Services. Comput. Commun. 18(2): 69-78 (1995) - Luis Orozco-Barbosa, Naél Hirzalla:
Share-Based Congestion Control Scheme for Systems of Interconnected Networks. Comput. Commun. 18(2): 79-88 (1995) - Eckhard Moeller, Sanjay Manandhar, Luc Neumann, Johannes Rückert, Gerd Schürmann, Susan Thomas, Frieder Wolf:
The BERKOM Multimedia-Mail Teleservice. Comput. Commun. 18(2): 89-102 (1995) - Charles K. Chirchir, Ahmed E. Kamal:
The Leaky Window: A Flow and Congestion Control Technique for HS-WANs. Comput. Commun. 18(2): 103-112 (1995) - T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman:
Fault Detection and Diagnosis Capabilities of Test Sequence Selection Methods Based on the FSM Model. Comput. Commun. 18(2): 113-122 (1995) - W. D. K. Macrosson, R. L. Wickramasinghe:
Progress Within UK Firms Towards Inter-Departmental Data Exchange In the Open System Context. Comput. Commun. 18(2): 123-126 (1995)
Volume 18, Number 3, March 1995
- Thomas D. C. Little:
Multimedia Storage Servers - Introduction. Comput. Commun. 18(3): 131-132 (1995) - Ralf Steinmetz:
Multimedia File Systems Survey: Approaches for Continuous Media Disk Scheduling. Comput. Commun. 18(3): 133-144 (1995) - Jonathan C. L. Liu, David Hung-Chang Du, James A. Schnepf:
Supporting Random Access on Real-Time Retrieval of Digital Continuous Media. Comput. Commun. 18(3): 145-159 (1995) - Tom Pfeifer, A. Blobelt:
Local Storage Systems for Continuous Data with Heterogeneous Timing Requirements. Comput. Commun. 18(3): 160-169 (1995) - Shahram Ghandeharizadeh, Ali E. Dashti, Cyrus Shahabi:
Pipelining Mechanism to Minimize the Latency Time in Hierarchical Multimedia Storage Managers. Comput. Commun. 18(3): 170-184 (1995) - M. Seo, Chee-Ha Kim:
Allocation Strategies of Multimedia Data on Disk Arrays. Comput. Commun. 18(3): 185-191 (1995) - Harrick M. Vin, Alok Goyal, Pawan Goyal:
Algorithms for Designing Multimedia Servers. Comput. Commun. 18(3): 192-203 (1995) - Christos H. Papadimitriou, Srinivas Ramanathan, P. Venkat Rangan, Srihari Sampath Kumar:
Multimedia Information Caching for Personalized Video-on-Demand. Comput. Commun. 18(3): 204-216 (1995) - R. Clark Robertson, Tri T. Ha, D. V. Banh:
Effect of Capture on Throughput of Variable Length Packet Aloha Systems. Comput. Commun. 18(3): 220 (1995)
Volume 18, Number 4, April 1995
- K. Poon:
Inside a Trader in Global Trading. Comput. Commun. 18(4): 227-246 (1995) - A. T. H. van der Voort, A. L. Boonstra, F. H. R. de Thouars:
Routing Names and Addresses in the International MHS. Comput. Commun. 18(4): 247-251 (1995) - Sami S. Alwakeel, Mohammad Ilyas:
Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network. Comput. Commun. 18(4): 252-261 (1995) - Andreas Cramer, Richard Hofmann, Norbert Luttenberger:
Performance Measurements on the Heidelberg Audio/Video Distribution System: Methodology and Results. Comput. Commun. 18(4): 262-275 (1995) - Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:
Recovery Approach to the Design of Stabilizing Communication Protocols. Comput. Commun. 18(4): 276-287 (1995) - Christos Douligeris, Lakshmana N. Kumar:
Fairness Issues in the Networking Environment. Comput. Commun. 18(4): 288-299 (1995) - Dieter Baum, Luciano Lenzini:
Performance Analysis of SDN-Specific Error Recovery Procedures: Comparison of Step-by-Step and End-to-End Schemes. Comput. Commun. 18(4): 300-309 (1995)
Volume 18, Number 5, May 1995
- Kimon P. Kontovassilis, John T. Tsiligaridis, George I. Stassinopoulos:
Buffer Dimensioning for Delay- and Loss-Sensitive Traffic. Comput. Commun. 18(5): 315-328 (1995) - T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman:
On Testing and Diagnosis of Communication Protocols Based on the FSM Model. Comput. Commun. 18(5): 329-337 (1995) - Andrzej R. Pach, Sergio Palazzo, Daniela Panno:
Delay Analysis of DQDB Networks with Slot Preuse and Reuse. Comput. Commun. 18(5): 338-344 (1995) - R. C. Betini, Hisao Kameda, Kentaro Shimizu:
Flow Control and Routing Algorithms in WAPSN. Comput. Commun. 18(5): 345-356 (1995) - Nen-Fu Huang, Gin-Kou Ma, Yi-Jang Wu:
Hot-Spot Spanning Tree Algorithm for a Bridged LAN/MAN. Comput. Commun. 18(5): 357-366 (1995) - C. Y. Lee:
Application of a Cross Decomposition Algorithm to a Location and Allocation Problem in Distributed Systems. Comput. Commun. 18(5): 367-377 (1995) - Debanjan Saha, Amitava Mukherjee:
Design of Hierarchical Communication Networks Under Node/Link Failure Constraints. Comput. Commun. 18(5): 378-383 (1995) - Debanjan Saha:
Verifying the Progress Properties of a Heterogeneous Protocol System in an Internetworking Environment. Comput. Commun. 18(5): 384-391 (1995) - Carlos Hirsch, Luis Rojas:
Internal Communications in a Multiprocessor ISDN PBX. Comput. Commun. 18(5): 392-396 (1995)
Volume 18, Number 6, June 1995
- Lillian Cuthbert:
Electronic Document Delivery. Comput. Commun. 18(6): 407 (1995) - Haim Kilov, Lillian Cuthbert:
A Model for Document Management. Comput. Commun. 18(6): 408-417 (1995) - J. Knight, Cliff McKnight:
Project ELVYN: Implementing an Electronic Journal. Comput. Commun. 18(6): 418-422 (1995) - C. Green:
From Paper to CD-ROM Documentation. Comput. Commun. 18(6): 423-428 (1995) - Aviel D. Rubin:
Secure Distribution of Electronic Documents in a Hostile Environment. Comput. Commun. 18(6): 429-434 (1995) - K. L. Wandryk:
The Benefits of Using Electronic Document Software. Comput. Commun. 18(6): 435-446 (1995) - Craig M. Parker, Paula M. C. Swatman:
The TREAT Laboratory: Comparing an Electronic Commerce Experiment at Curtin and Monash Universities. Comput. Commun. 18(6): 447-457 (1995)
Volume 18, Number 7, July 1995
- Shao-kong Kao, Biswanath Mukherjee:
Image transmission on the DQDB network. 463-474 - H. K. Wang, Jean-Lien C. Wu:
Object model for hypermedia applications. 475-485 - Jung-Shyr Wu, Fang-Jang Kuo, Jin-Fu Chang:
Traffic control at terminal equipment in ATM networks using cryptographic techniques. 486-492 - Piyu Tripathy, Behçet Sarikaya:
Analysis and representation of test cases generated from LOTOS. 493-506 - Debashis Saha, Amitava Mukherjee:
Computational analysis of an optimal routing strategy in a hierarchical computer communication network. 507-511 - Alexander Schill, Markus U. Mock:
Client/server approach versus distributed object-oriented computing on top of OSF DCE. 512-518
Volume 18, Number 8, August 1995
- N.-F. Huang:
Editorial. 526 - Mete Kabatepe, Kenneth S. Vastola:
Bandwidth allocation in fair distributed queue (FDQ) networks. 527-536 - Raffaele Bolla, Franco Davoli:
Call admission control and bandwidth allocation in a multiservice DQDB network. 537-544 - Shuoh-Ren Tsai, Tein-Hsiang Lin, Chunming Qiao:
Bandwidth allocation for isochronous connections in DQDB using the PA scheme. 545-551 - Oran Sharon, Adrian Segall:
The parallel D-Net. 552-562 - W. Melody Moh, Min-Jia Chen, Nui-Ming Chu, Cherng-Der Liao:
Traffic prediction and dynamic bandwidth allocation over ATM: a neural network approach. 563-571 - Bo Li:
Bandwidth management for high speed LANs using wavelength division multiplexing. 572-581
Volume 18, Number 9, September 1995
- T. Burrage, S. Ward:
Adaptive priority timer control of the SAE LTPB for fair prioritization in military avionics networks. 591-599 - Jean Lambert, Béatrice Stéphan:
Modelling network profiles. 600-608 - Wen-Huei Chen, Chuan Yi Tang, Son T. Vuong:
Improving the UIOv-method for protocol conformance testing. 609-619 - Craig E. Wills, David Finkel:
Scalable approaches to load sharing in the presence of multicasting. 620-630 - Raed Y. Awdeh, Hussein T. Mouftah:
MS4 - a high performance output buffering ATM switch. 631-644 - Philippe A. Janson, Gene Tsudik:
Secure and minimal protocols for authenticated key distribution. 645-653 - Tzong-Chen Wu, Tzong-Sun Wu:
Group commitment protocol based on zero knowledge proofs. 654-656 - Constantine Katsinis, Amelie Constant:
Bandwidth allocation in wide-band communication networks under two types of priorities. 657-662 - Ruey-yih Lin, Chyan Yang:
Link enhancement using constrained range and reduced candidate set searches: a revision. 663-668 - Toong Shoon Chan, Ian Gorton:
HTPNET: a high performance transport protocol. 669-681 - Aloknath De, N. Prithviraj:
Comments on 'Analysis of 1-ROR networks'. 682-683 - Krishna M. Sivalingam:
Asynchronous transfer mode networks: Performance issues: By R Onvural, Artech House, London, 1994, 254 pp. 687 - Rita Puzmanova:
LAN times encyclopedia of networking: By T Sheldon, McGraw-Hill, New York, 1994, $39.95, 1006 pp, ISBN 0-07-881965-2. 687-688
Volume 18, Number 10, October 1995
- Bala Rajagopalan:
Membership protocols for distributed conference control. 695-708 - Wu-chi Feng, Stuart Sechrest:
Critical bandwidth allocation for the delivery of compressed video. 709-717 - Jau-Hsiung Huang, Piau-Chuo Tsao:
Continuous framing mechanism for congestion control in broadband networks. 718-724 - James C. Yee, Pravin Varaiya:
Models and performance of real-time disk access policies. 725-741 - Srinivas Ramanathan, P. Venkat Rangan, Harrick M. Vin, Srihari Sampath Kumar:
Enforcing application-level QoS by frame-induced packet discarding in video communications. 742-754 - Sanjeev Rampal, Douglas S. Reeves:
Routing and admission control algorithms for multimedia traffic. 755-768 - Hui Zhang:
Providing end-to-end performance guarantees using non-work-conserving disciplines. 769-781
Volume 18, Number 11, November 1995
- Peter Schoo:
Beyond intelligent networks. 791-792 - Allan Hansson:
Evolution of intelligent network concepts. 793-801 - Armin Fricke:
Market requirements and the functionality of intelligent networks. 802-806 - Kai Jakobs:
Future (data) communication networks - the challenge to (public) service providers. 807-815 - Raúl Gutiérrez, Jørgen Nørgaard, Kjell Randsted:
IN and beyond: two approaches to the evolution of INs. 816-824 - Martin D. Chapman, Hendrik Berndt, Nicola Gatti:
Software architecture for the future information market. 825-837 - Sebastiano Trigila, Alvin P. Mullery, Mário Campolargo, June Hunt:
Service architectures and service creation for integrated broadband communications. 838-848 - Jean-Bernard Stefani:
Open distributed processing: an architectural basis for information networks. 849-862
Volume 18, Number 12, December 1995
- Giuseppe Anastasi, Marco Conti, Enrico Gregori, Luciano Lenzini:
Real-time applications in a CRMA network: a performance analysis. 871-879 - Jae Hwoon Lee, Chong Kwan Un:
Asynchronous reservation protocol for variable-sized messages in a WDM-based local network. 880-888 - Reinhard Baier, Eckhard Moeller, Angela Scheller:
ODA implementation for multimedia teleservices. 889-895 - Lakshmana N. Kumar, Andreas D. Bovopoulos:
Access protection solution for heavy load unfairness in DQDB. 896-910 - Ali Rezaki, Hasan Ural:
Construction of checking sequences based on characterization sets. 911-920 - Denis Trcek, Borka Jerman-Blazic:
Formal language for security services base modelling and analysis. 921-928 - Ji-Horng Liaw, Cheng-Ming Weng:
Modular multicast ATM switching architecture. 929-935 - Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen:
Remote scheme for password authentication based on theory of quadratic residues. 936-942 - Özgür Ulusoy:
Network access protocol for hard real-time communication systems. 943-948 - Ioannis E. Pountourakis, Efstathios D. Sykas, Emmanuel N. Protonotarios:
Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol. 949-958 - Tzong-Chen Wu:
Remote login authentication scheme based on a geometric approach. 959-963 - Howard Bowman, Gordon S. Blair, Lynne Blair, Amanda G. Chetwynd:
Formal description of distributed multimedia systems: an assessment of potential techniques. 964-977 - Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system. 978-981 - Kee Chaing Chua, W. M. Tan, Kin Mun Lye:
Performance of PRMA in a mobile radio channel. 982-987 - Kwok-Yan Lam:
Replay tolerance of authentication protocols. 988-992 - Yung-Hsiang Chen, Tzonelih Hwang:
ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer. 993-996
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.