


default search action
IEEE Network, Volume 11
Volume 11, Number 1, January / February 1997
- Vijay Bhagavath, Bhumip Khasnabish:
Broadband Data Services over Residenial Access Networks. 8-9 - Vijay Bhagavath:
Open technical issues in provisioning high-speed interactive data services over residential access networks. 10-12 - Marlis Humphrey, John Freeman:
How xDSL supports broadband services to the home. 14-23 - Ying-Dar Lin, Chia-Jen Wu, Wei-Ming Yin:
PCUP: pipelined cyclic upstream protocol over hybrid fiber coax. 24-34 - Enrique Hernandez-Valencia:
Architectures for broadband residential IP services over CATV networks. 36-43 - Tetsuya Kanada, Tetsuya Qnoda, lchirou Yamashita, Tomonori Aoyama:
Netwarp: an ultra-high-throughput computer communications service. 44-50 - Leif Aarthun Ims, Dagfinn Myhre, Borgar Tørre Olsen:
Economics of residential broadband access network technologies and strategies. 51-57 - Bhumip Khasnabish:
Broadband to the home (BTTH): architectures, access methods, and the appetite for it. 58-69
Volume 11, Number 2, March / April 1997
- Klaus-Jürgen Schulz, Marco Incollingo, Hans K. Uhrig:
Taking advantage of ATM services and tariffs: the importance of transport layer dynamic rate adaptation. 10-17 - Andrew T. Campbell, Geoff Coulson:
QoS adaptive transports: delivering scalable media to the desktop. 18-27 - Eva Gustafsson, Gunnar Karlsson:
A literature survey on traffic dispersion. 28-36 - Khalid M. Al-Tawil, Mostafa I. H. Abd-El-Barr, Farooq Ashraf:
A survey and comparison of wormhole routing techniques in a mesh networks. 38-45 - Yi-Bing Lin:
OA&M for the GSM network. 46-51 - Yvette C. Hubbel:
A comparison of the IRIDIUM and AMPS systems. 52-59
Volume 11, Number 3, May / June 1997
- Tom Chen:
Network And Internet Security (Guest Editorial). 11 - Roger M. Needham:
The changing environment for security protocols. 12-15 - David W. Chadwick
, Andrew J. Young, Nada Kapidzic Cicovic:
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model. 16-24 - Uri Blumenthal, Nguyen C. Hien, Bert Wijnen:
Key derivation for network management applications. 26-29 - Michael Herfert:
Security-enhanced mailing lists. 30-33 - Mohammad Peyravian, Tom Tarman:
Asynchronous transfer mode security. 34-40 - Muriel Médard, Douglas Marquis, Richard A. Barry, Steven G. Finn:
Security issues in all-optical networks. 42-48
Volume 11, Number 4, July / August 1997
- Kai-Yeung Siu:
A New Data Service In Atm? 4-5 - Mart L. Molle, Mohan Kalkunte, Jayant Kadambi:
Frame bursting: a technique for scaling CSMA/CD to gigabit speeds. 6-15 - Vincent Roca, Torsten Braun, Christophe Diot:
Demultiplexed architectures: a solution for efficient STREAMS-based communication stacks. 16-26 - Robert J. Walsh:
DART: fast application-level networking via data-copy avoidance. 28-38 - Biswaroop Guha, Biswanath Mukherjee:
Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions. 40-48 - Tim Bass
:
Internet exterior routing protocol development: problems, issues, and misconceptions. 50-55 - Yi-Bing Lin:
Paging systems: network architectures and interfaces. 56-61
Volume 11, Number 5, September / October 1997
- Aurel A. Lazar:
Programming telecommunication networks. 8-18 - Yung-Jan Cho, Yi-Bing Lin, Herman Chung-Hwa Rao:
Reducing the network cost of call delivery to GSM roamers. 19-25 - Paul Veitch, David B. Johnson:
ATM network resilience. 26-33 - Guru M. Parulkar, Douglas C. Schmidt, Eileen T. Kraemer, Jonathan S. Turner, Anshul Kantawala:
An architecture for monitoring, visualization, and control of gigabit networks. 34-43 - Craig Partridge, Timothy J. Shepard:
TCP/IP performance over satellite links. 44-49 - Chang-Seop Park:
On certificate-based security protocols for wireless mobile communication systems. 50-55
Volume 11, Number 6, November / December 1997
- Kevin Thompson, Gregory J. Miller, Rick Wilder:
Wide-area Internet traffic patterns and characteristics. 10-23 - Georg Carle, Ernst W. Biersack:
Survey of error recovery techniques for IP-based audio-visual multicast applications. 24-36 - Keith Ross:
Hash routing for collections of shared Web caches. 37-44 - Scow Guthery:
Wireless relay networks. 46-51 - Jaime Sánchez
, Ralph Martinez, Michael W. Marcellin:
A survey of MAC protocols proposed for wireless ATM. 52-62 - Yi-Bing Lin:
Performance modeling for mobile telephone networks. 63-68

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.