![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Network Management, Volume 8
Volume 8, Number 1, January/February 1998
- Gilbert Held:
Ignore the Gigabit Ethernet vs. ATM war. Int. J. Netw. Manag. 8(1): 1 (1998) - Geoffrey Engerman, Lee Kearney:
Effective use of wireless data communications. 2-11 - Timothy Chiu:
Getting proactive network management from reactive network management tools. 12-17 - Anna Hac, Lining Gao:
Analysis of congestion control mechanisms in an intelligent network. 18-41 - Katherine Jones:
An introduction to data warehousing: what are the implications for the network? 42-56 - Anna Hac:
Network time slot allocation in an intelligent network. 57-63 - Gilbert Held:
ViaCrypt PGP/Business Edition. 64-68
Volume 8, Number 2, March/April 1998
- Gilbert Held:
Spam the spammer. 69 - Eugene H. Wolf:
Local loop ISDN dial backup for frame relay. 70-74 - Mohsen Guizani:
An effective congestion control scheme for ATM networks. 75-86 - Anna Hac, Xiaoyang Chu:
A new cell loss recovery method using forward error correction in ATM networks. 87-103 - Ching-Wun Tsai, Ruay Shiung Chang:
SNMP through WWW. 104-119 - Kenneth J. Christensen, Franklin "Bo" Gulledge:
Enabling power management for network-attached computers. 120-130 - Gilbert Held:
SysDraw - the network illustrator. 131-136
Volume 8, Number 3, May/June 1998
- Gilbert Held:
Voice over data networks: an evolving technology with a warning flag. 137-138 - Bharat Bhushan, Ahmed Patel:
Requirements and the concept of cooperative system management. 139-158 - Surat Tanterdtid, Worawit Steanputtanagul, Watit Benjapolakul:
An optimum virtual paths network-based atm network using the geneticalgorithm. 159-169 - Bharat Bhushan, Ahmed Patel:
A functional model of cooperative system management. 170-181 - D. Bandyopadhyay, H. Chen, S. Nedialkov, D. Tam:
A video conference network management system. 182-190 - Katherine Jones:
Secure internet access to SAP's R/3: keeping dragons out. 191-199 - Gilbert Held:
Norman virus control for Windows NT. 200-204
Volume 8, Number 4, July/August 1998
- Gilbert Held:
Why pay for phantom service? 205 - Nav Gulati:
Technology as a catalyst for acquisitions? Year 2000 preparedness for the astute executive. 206-210 - Jairo A. Gutiérrez
:
A connectionless approach to integrated network management. 219-226 - Larry J. Greenstein:
Transporting voice traffic over packet networks. 227-234 - James Wetterau:
CTI in the corporate enterprise. 235-243 - Elias Procópio Duarte Jr., Glenn Mansfield, Takashi Nanya, Shoichi Noguchi:
Improving the dependability of network management systems. 244-253 - Gilbert Held:
Cinco Networks WebXRay. 254-261
Volume 8, Number 5, September/October 1998
- Gilbert Held:
Intels Web proposal = stupidity inside! 263 - G. Prem Kumar, Pallapa Venkataram:
Network restoration using recurrent neural networks. 264-273 - N. J. Muller:
Java for network management applications. 274-291 - Anna Hac, Yingjun Ma:
A rate-based congestion control scheme for ABR service in ATM networks. 292-317 - Gilbert Held:
EtherPeek - Ethernet network analysis software. 318-322
Volume 8, Number 6, November/December 1998
- Gilbert Held:
Contract renewal-think short term. 323-324 - Anna Hac, Johnny On:
Multimedia virtual circuit model for MPEG on ATM networks. 325-342 - Isil Sebüktekin:
An empirical study of TCP/IP performance over FR/ATM service interworking. 343-355 - Nathan J. Muller:
Improving and managing multimedia performance over TCP/IP nets. 356-367 - Gilbert Held:
Password recovery windows toolkit. 368-370
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.