default search action
Search dblp for Publications
export results for "toc:db/journals/bell/bell17.bht:"
@article{DBLP:journals/bell/BarshefskyMT13, author = {Alvin Barshefsky and Mohamad M. Mehio and Hemi Trickey}, title = {Mobile User Experience for Network Operations}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {5--20}, year = {2013}, url = {https://doi.org/10.1002/bltj.21571}, doi = {10.1002/BLTJ.21571}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BarshefskyMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BurnsK13, author = {Michael J. Burns and Xerxes P. Kotval}, title = {Questions About Questions: Investigating How Knowledge Workers Ask and Answer Questions}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {43--61}, year = {2013}, url = {https://doi.org/10.1002/bltj.21574}, doi = {10.1002/BLTJ.21574}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BurnsK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/GasteG13, author = {Yann Gaste and Annie Gentes}, title = {"Place" and "Non-Place": {A} Model for the Strategic Design of Place-Centered Services}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {21--36}, year = {2013}, url = {https://doi.org/10.1002/bltj.21572}, doi = {10.1002/BLTJ.21572}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/GasteG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/GonguetMRH13, author = {Arnaud Gonguet and Olivier Martinot and Florentin Rodio and Vincent Hiribarren}, title = {SlideWorld: {A} Multidisciplinary Research Project to Reinvent the Videoconferencing User Experience}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {133--144}, year = {2013}, url = {https://doi.org/10.1002/bltj.21579}, doi = {10.1002/BLTJ.21579}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/GonguetMRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KotvalB13, author = {Xerxes P. Kotval and Michael J. Burns}, title = {Visualization of Entities Within Social Media: Toward Understanding Users' Needs}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {77--101}, year = {2013}, url = {https://doi.org/10.1002/bltj.21576}, doi = {10.1002/BLTJ.21576}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KotvalB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KumarML13, author = {Neha Kumar and Akhil Mathur and Siddhartha Lal}, title = {Banking 101: Mobile-izing Financial Inclusion in an Emerging India}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {37--41}, year = {2013}, url = {https://doi.org/10.1002/bltj.21573}, doi = {10.1002/BLTJ.21573}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/KumarML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Lehoux13, author = {Natalie Lehoux}, title = {Interaction That Values Co-Creation in the Design of Services}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {145--156}, year = {2013}, url = {https://doi.org/10.1002/bltj.21580}, doi = {10.1002/BLTJ.21580}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Lehoux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/MaciasPR13, author = {Jes{\'{u}}s Mac{\'{\i}}as and Pablo P{\'{e}}rez and Jaime J. Ruiz}, title = {Optimal Size of an {HDTV} Set During the Transition Period From {SDTV} to {HDTV}}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {119--131}, year = {2013}, url = {https://doi.org/10.1002/bltj.21578}, doi = {10.1002/BLTJ.21578}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/MaciasPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/MarillyGMP13, author = {Emmanuel Marilly and Arnaud Gonguet and Olivier Martinot and Fr{\'{e}}d{\'{e}}rique Pain}, title = {Gesture Interactions With Video: From Algorithms to User Evaluation}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {103--118}, year = {2013}, url = {https://doi.org/10.1002/bltj.21577}, doi = {10.1002/BLTJ.21577}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/MarillyGMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/PainL13, author = {Fr{\'{e}}d{\'{e}}rique Pain and Scott Lively}, title = {Human Science and User Experience}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {1--4}, year = {2013}, url = {https://doi.org/10.1002/bltj.21570}, doi = {10.1002/BLTJ.21570}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/PainL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/PhadkeUMKD13, author = {Chitra Phadke and H{\"{u}}seyin Uzunalioglu and Veena B. Mendiratta and Dan Kushnir and Derek Doran}, title = {Prediction of Subscriber Churn Using Social Network Analysis}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {63--75}, year = {2013}, url = {https://doi.org/10.1002/bltj.21575}, doi = {10.1002/BLTJ.21575}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/PhadkeUMKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/VidalGF13, author = {Guillermo Martin Vidal and Marjan Geerts and Mohamed Ali Feki}, title = {The Role of Affordances and Interaction Bits in the Design of a New Tangible Programming Interface: {A} Preliminary Result}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {4}, pages = {157--174}, year = {2013}, url = {https://doi.org/10.1002/bltj.21581}, doi = {10.1002/BLTJ.21581}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/VidalGF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/AkyamacU12, author = {Ahmet A. Akyama{\c{c}} and H{\"{u}}seyin Uzunalioglu}, title = {{ROCS:} {A} Tool for Rapid Overload Control Simulation}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {67--87}, year = {2012}, url = {https://doi.org/10.1002/bltj.21524}, doi = {10.1002/BLTJ.21524}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/AkyamacU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/AnPWA12, author = {Xueli An and Fabio Pianese and Indra Widjaja and Utku G{\"{u}}nay Acer}, title = {{DMME:} {A} Distributed {LTE} Mobility Management Entity}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {97--120}, year = {2012}, url = {https://doi.org/10.1002/bltj.21547}, doi = {10.1002/BLTJ.21547}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/AnPWA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/AsthanaO12, author = {Abhaya Asthana and Kazu Okumoto}, title = {Integrative Software Design for Reliability: Beyond Models and Defect Prediction}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {37--59}, year = {2012}, url = {https://doi.org/10.1002/bltj.21557}, doi = {10.1002/BLTJ.21557}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/AsthanaO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BallesterosEFGMMS12, author = {Francisco J. Ballesteros and Noah Evans and Charles Forsyth and Gorka Guardiola and Jim McKie and Ron Minnich and Enrique Soriano{-}Salvador}, title = {{NIX:} {A} Case for a Manycore System for Cloud Computing}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {41--54}, year = {2012}, url = {https://doi.org/10.1002/bltj.21543}, doi = {10.1002/BLTJ.21543}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/BallesterosEFGMMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Bowles12, author = {Matt Bowles}, title = {The Business of Hacking and Birth of an Industry}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {5--16}, year = {2012}, url = {https://doi.org/10.1002/bltj.21555}, doi = {10.1002/BLTJ.21555}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Bowles12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BroustisSV12, author = {Ioannis Broustis and Ganapathy S. Sundaram and Harish Viswanathan}, title = {Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {125--140}, year = {2012}, url = {https://doi.org/10.1002/bltj.21527}, doi = {10.1002/BLTJ.21527}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BroustisSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BroustisSV12a, author = {Ioannis Broustis and Ganapathy S. Sundaram and Harish Viswanathan}, title = {Group Authentication: {A} New Paradigm for Emerging Applications}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {157--173}, year = {2012}, url = {https://doi.org/10.1002/bltj.21566}, doi = {10.1002/BLTJ.21566}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BroustisSV12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BurnsF12, author = {Michael J. Burns and Brian D. Friedman}, title = {A Multidimensional Approach to Characterizing and Visualizing Latent Relationships in Enterprise Social Networks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {201--217}, year = {2012}, url = {https://doi.org/10.1002/bltj.21531}, doi = {10.1002/BLTJ.21531}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BurnsF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/CakulevBS12, author = {Violeta Cakulev and Ioannis Broustis and Ganapathy S. Sundaram}, title = {Secure Enablement of Real Time Applications: {A} Novel End-to-End Approach}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {175--191}, year = {2012}, url = {https://doi.org/10.1002/bltj.21567}, doi = {10.1002/BLTJ.21567}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/CakulevBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/CarrollHK12, author = {Martin D. Carroll and Ilija Hadzic and William A. Katsak}, title = {3D Rendering in the Cloud}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {55--66}, year = {2012}, url = {https://doi.org/10.1002/bltj.21544}, doi = {10.1002/BLTJ.21544}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/CarrollHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/CeballosDF12, author = {Juan Ceballos and Richard DiPasquale and Robert Feldman}, title = {Business Continuity and Security in Datacenter Interconnection}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {147--155}, year = {2012}, url = {https://doi.org/10.1002/bltj.21565}, doi = {10.1002/BLTJ.21565}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/CeballosDF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ChandrashekharN12, author = {Uma Chandrashekhar and Scott Nelson}, title = {Delivering Network Assurance Through Secure and Reliable Solutions}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {1--4}, year = {2012}, url = {https://doi.org/10.1002/bltj.21554}, doi = {10.1002/BLTJ.21554}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ChandrashekharN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ChangFSVWW12, author = {Fangzhe Chang and Peter S. Fales and Moritz Steiner and Ramesh Viswanathan and Thomas J. Williams and Thomas L. Wood}, title = {Mitigating High Latency Outliers for Cloud-Based Telecommunication Services}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {121--142}, year = {2012}, url = {https://doi.org/10.1002/bltj.21548}, doi = {10.1002/BLTJ.21548}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ChangFSVWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ChangHKMS12, author = {Yuh{-}Jye Chang and Adiseshu Hari and Pramod V. Koppol and Antony Martin and Thanos Stathopoulos}, title = {Scalable and Elastic Telecommunication Services in the Cloud}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {81--96}, year = {2012}, url = {https://doi.org/10.1002/bltj.21546}, doi = {10.1002/BLTJ.21546}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ChangHKMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/CiavagliaGSDSBS12, author = {Laurent Ciavaglia and Samir Ghamri{-}Doudane and Mikhail Smirnov and Panagiotis Demestichas and Vera{-}Alexandra Stavroulaki and Aimilia Bantouna and Berna Sayra{\c{c}}}, title = {Unifying Management of Future Networks With Trust}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {193--212}, year = {2012}, url = {https://doi.org/10.1002/bltj.21568}, doi = {10.1002/BLTJ.21568}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/CiavagliaGSDSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/DinuP12, author = {Mihaela Dinu and Micha{\"{e}}l Peeters}, title = {Overview}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {1--4}, year = {2012}, url = {https://doi.org/10.1002/bltj.21520}, doi = {10.1002/BLTJ.21520}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/DinuP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Donadio12, author = {Pasquale Donadio}, title = {Virtual Intrusion Detection Systems in the Cloud}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {113--128}, year = {2012}, url = {https://doi.org/10.1002/bltj.21562}, doi = {10.1002/BLTJ.21562}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Donadio12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/JosephB12, author = {Jean{-}Philippe Joseph and William J. Barnett Jr.}, title = {Leveraging Broadband Access Expansion for {PSTN} Migration: {A} Case Study for Converged Fixed Access}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {141--162}, year = {2012}, url = {https://doi.org/10.1002/bltj.21528}, doi = {10.1002/BLTJ.21528}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/JosephB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KangPK12, author = {Kyungtae Kang and Kyung{-}Joon Park and Hongseok Kim}, title = {Functional-Level Energy Characterization of \emph{{\(\mathrm{\mu}\)}}C/OS-II and Cache Locking for Energy Saving}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {219--227}, year = {2012}, url = {https://doi.org/10.1002/bltj.21532}, doi = {10.1002/BLTJ.21532}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/KangPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KanounDPCC12, author = {Wael Kanoun and Samuel Dubus and Serge Papillon and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {61--78}, year = {2012}, url = {https://doi.org/10.1002/bltj.21558}, doi = {10.1002/BLTJ.21558}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KanounDPCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KolesnikovS12, author = {Vladimir Kolesnikov and Abdullatif Shikfa}, title = {On The Limits of Privacy Provided by Order-Preserving Encryption}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {135--146}, year = {2012}, url = {https://doi.org/10.1002/bltj.21564}, doi = {10.1002/BLTJ.21564}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KolesnikovS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KoppolNSW12, author = {Pramod V. Koppol and Kedar S. Namjoshi and Thanos Stathopoulos and Gordon T. Wilfong}, title = {The Inherent Difficulty of Timely Primary-Backup Replication}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {15--24}, year = {2012}, url = {https://doi.org/10.1002/bltj.21541}, doi = {10.1002/BLTJ.21541}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KoppolNSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KrogfossWS12, author = {Bill Krogfoss and Marcus Weldon and Lev B. Sofman}, title = {Internet Architecture Evolution and the Complex Economies of Content Peering}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {163--184}, year = {2012}, url = {https://doi.org/10.1002/bltj.21529}, doi = {10.1002/BLTJ.21529}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KrogfossWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/LeostARJ12, author = {Yann L{\'{e}}ost and Moussa Abdi and Robert Richter and Michael Jeschke}, title = {Interference Rejection Combining in {LTE} Networks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {25--49}, year = {2012}, url = {https://doi.org/10.1002/bltj.21522}, doi = {10.1002/BLTJ.21522}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/LeostARJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/LiBC12, author = {Xiang{-}Yang Li and Kim Brouard and Yigang Cai}, title = {Dynamic Policy and Charging Control Framework}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {105--123}, year = {2012}, url = {https://doi.org/10.1002/bltj.21526}, doi = {10.1002/BLTJ.21526}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/LiBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/MampaeyV12, author = {Marcel Mampaey and {\'{A}}lvaro Nunez Villegas}, title = {A Network-Centric {DRM} For Online Scenarios}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {129--133}, year = {2012}, url = {https://doi.org/10.1002/bltj.21563}, doi = {10.1002/BLTJ.21563}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/MampaeyV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/McBrideM12, author = {Alan J. McBride and Andrew R. McGee}, title = {Assessing Smart Grid Security}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {87--103}, year = {2012}, url = {https://doi.org/10.1002/bltj.21560}, doi = {10.1002/BLTJ.21560}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/McBrideM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/McGeeCP12, author = {Andrew R. McGee and Matthieu Couti{\`{e}}re and Maria E. Palamara}, title = {Public Safety Network Security Considerations}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {79--86}, year = {2012}, url = {https://doi.org/10.1002/bltj.21559}, doi = {10.1002/BLTJ.21559}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/McGeeCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/MheichAD12, author = {Zeina Mheich and Marie{-}Line Alberi{-}Morel and Pierre Duhamel}, title = {Optimization of Unicast Services Transmission for Broadcast Channels in Practical Situations}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {5--23}, year = {2012}, url = {https://doi.org/10.1002/bltj.21521}, doi = {10.1002/BLTJ.21521}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/MheichAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Mullender12, author = {Sape J. Mullender}, title = {Predictable Cloud Computing}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {25--39}, year = {2012}, url = {https://doi.org/10.1002/bltj.21542}, doi = {10.1002/BLTJ.21542}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Mullender12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/MullenderW12, author = {Sape J. Mullender and Thomas L. Wood}, title = {Cloud Computing: New Opportunities for Telecom Providers}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {1--3}, year = {2012}, url = {https://doi.org/10.1002/bltj.21550}, doi = {10.1002/BLTJ.21550}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/MullenderW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/PerezRVDBDS12, author = {Pablo P{\'{e}}rez and Jaime J. Ruiz and {\'{A}}lvaro Villegas and Karel Van Damme and Christian Van Boven and Joel Dupont and Pedro A. Molina Salmer{\'{o}}n}, title = {Multi-Vendor Video Headend Convergence Solution}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {185--200}, year = {2012}, url = {https://doi.org/10.1002/bltj.21530}, doi = {10.1002/BLTJ.21530}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/PerezRVDBDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Radhakrishnan12, author = {Ganesan Radhakrishnan}, title = {Adaptive Application Scaling for Improving Fault-Tolerance and Availability in the Cloud}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {5--14}, year = {2012}, url = {https://doi.org/10.1002/bltj.21540}, doi = {10.1002/BLTJ.21540}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Radhakrishnan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/SabnisC12, author = {Suhasini V. Sabnis and Doug Charles}, title = {Opportunities and Challenges: Security in eHealth}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {105--111}, year = {2012}, url = {https://doi.org/10.1002/bltj.21561}, doi = {10.1002/BLTJ.21561}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/SabnisC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/SabnisVHM12, author = {Suhasini V. Sabnis and Marc Verbruggen and John Hickey and Alan J. McBride}, title = {Intrinsically Secure Next-Generation Networks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {17--36}, year = {2012}, url = {https://doi.org/10.1002/bltj.21556}, doi = {10.1002/BLTJ.21556}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/SabnisVHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Sharp12, author = {Ron Sharp}, title = {Latency in Cloud-Based Interactive Streaming Content}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {2}, pages = {67--80}, year = {2012}, url = {https://doi.org/10.1002/bltj.21545}, doi = {10.1002/BLTJ.21545}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Sharp12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ThiebautHU12, author = {Laurent Thi{\'{e}}baut and Wim Henderickx and Alistair Urie}, title = {Using a Trusted {WLAN} Network to Offload Mobile Traffic and Leverage Deployed Broadband Network Gateways}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {89--104}, year = {2012}, url = {https://doi.org/10.1002/bltj.21525}, doi = {10.1002/BLTJ.21525}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ThiebautHU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/VieiraVG12, author = {Elisangela Rodrigues Vieira and Dario Vieira and Jean{-}Pierre Gallois}, title = {Challenges of a Validation Process Based on Models: An Industrial Case Study}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {229--246}, year = {2012}, url = {https://doi.org/10.1002/bltj.21533}, doi = {10.1002/BLTJ.21533}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/VieiraVG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Yang12, author = {Hong Yang}, title = {Differential Fade Margin and Handoff Gain in Wireless Cellular Networks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {1}, pages = {51--65}, year = {2012}, url = {https://doi.org/10.1002/bltj.21523}, doi = {10.1002/BLTJ.21523}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Yang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.