Search dblp for Publications

export results for "toc:db/journals/bell/bell17.bht:"

 download as .bib file

@article{DBLP:journals/bell/BarshefskyMT13,
  author       = {Alvin Barshefsky and
                  Mohamad M. Mehio and
                  Hemi Trickey},
  title        = {Mobile User Experience for Network Operations},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {5--20},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21571},
  doi          = {10.1002/BLTJ.21571},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BarshefskyMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BurnsK13,
  author       = {Michael J. Burns and
                  Xerxes P. Kotval},
  title        = {Questions About Questions: Investigating How Knowledge Workers Ask
                  and Answer Questions},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {43--61},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21574},
  doi          = {10.1002/BLTJ.21574},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BurnsK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/GasteG13,
  author       = {Yann Gaste and
                  Annie Gentes},
  title        = {"Place" and "Non-Place": {A} Model for the Strategic Design of Place-Centered
                  Services},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {21--36},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21572},
  doi          = {10.1002/BLTJ.21572},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/GasteG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/GonguetMRH13,
  author       = {Arnaud Gonguet and
                  Olivier Martinot and
                  Florentin Rodio and
                  Vincent Hiribarren},
  title        = {SlideWorld: {A} Multidisciplinary Research Project to Reinvent the
                  Videoconferencing User Experience},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {133--144},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21579},
  doi          = {10.1002/BLTJ.21579},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/GonguetMRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KotvalB13,
  author       = {Xerxes P. Kotval and
                  Michael J. Burns},
  title        = {Visualization of Entities Within Social Media: Toward Understanding
                  Users' Needs},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {77--101},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21576},
  doi          = {10.1002/BLTJ.21576},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/KotvalB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KumarML13,
  author       = {Neha Kumar and
                  Akhil Mathur and
                  Siddhartha Lal},
  title        = {Banking 101: Mobile-izing Financial Inclusion in an Emerging India},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {37--41},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21573},
  doi          = {10.1002/BLTJ.21573},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/KumarML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Lehoux13,
  author       = {Natalie Lehoux},
  title        = {Interaction That Values Co-Creation in the Design of Services},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {145--156},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21580},
  doi          = {10.1002/BLTJ.21580},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Lehoux13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/MaciasPR13,
  author       = {Jes{\'{u}}s Mac{\'{\i}}as and
                  Pablo P{\'{e}}rez and
                  Jaime J. Ruiz},
  title        = {Optimal Size of an {HDTV} Set During the Transition Period From {SDTV}
                  to {HDTV}},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {119--131},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21578},
  doi          = {10.1002/BLTJ.21578},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/MaciasPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/MarillyGMP13,
  author       = {Emmanuel Marilly and
                  Arnaud Gonguet and
                  Olivier Martinot and
                  Fr{\'{e}}d{\'{e}}rique Pain},
  title        = {Gesture Interactions With Video: From Algorithms to User Evaluation},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {103--118},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21577},
  doi          = {10.1002/BLTJ.21577},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/MarillyGMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/PainL13,
  author       = {Fr{\'{e}}d{\'{e}}rique Pain and
                  Scott Lively},
  title        = {Human Science and User Experience},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {1--4},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21570},
  doi          = {10.1002/BLTJ.21570},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/PainL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/PhadkeUMKD13,
  author       = {Chitra Phadke and
                  H{\"{u}}seyin Uzunalioglu and
                  Veena B. Mendiratta and
                  Dan Kushnir and
                  Derek Doran},
  title        = {Prediction of Subscriber Churn Using Social Network Analysis},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {63--75},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21575},
  doi          = {10.1002/BLTJ.21575},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/PhadkeUMKD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/VidalGF13,
  author       = {Guillermo Martin Vidal and
                  Marjan Geerts and
                  Mohamed Ali Feki},
  title        = {The Role of Affordances and Interaction Bits in the Design of a New
                  Tangible Programming Interface: {A} Preliminary Result},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {4},
  pages        = {157--174},
  year         = {2013},
  url          = {https://doi.org/10.1002/bltj.21581},
  doi          = {10.1002/BLTJ.21581},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/VidalGF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/AkyamacU12,
  author       = {Ahmet A. Akyama{\c{c}} and
                  H{\"{u}}seyin Uzunalioglu},
  title        = {{ROCS:} {A} Tool for Rapid Overload Control Simulation},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {67--87},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21524},
  doi          = {10.1002/BLTJ.21524},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/AkyamacU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/AnPWA12,
  author       = {Xueli An and
                  Fabio Pianese and
                  Indra Widjaja and
                  Utku G{\"{u}}nay Acer},
  title        = {{DMME:} {A} Distributed {LTE} Mobility Management Entity},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {97--120},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21547},
  doi          = {10.1002/BLTJ.21547},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/AnPWA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/AsthanaO12,
  author       = {Abhaya Asthana and
                  Kazu Okumoto},
  title        = {Integrative Software Design for Reliability: Beyond Models and Defect
                  Prediction},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {37--59},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21557},
  doi          = {10.1002/BLTJ.21557},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/AsthanaO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BallesterosEFGMMS12,
  author       = {Francisco J. Ballesteros and
                  Noah Evans and
                  Charles Forsyth and
                  Gorka Guardiola and
                  Jim McKie and
                  Ron Minnich and
                  Enrique Soriano{-}Salvador},
  title        = {{NIX:} {A} Case for a Manycore System for Cloud Computing},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {41--54},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21543},
  doi          = {10.1002/BLTJ.21543},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/BallesterosEFGMMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Bowles12,
  author       = {Matt Bowles},
  title        = {The Business of Hacking and Birth of an Industry},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {5--16},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21555},
  doi          = {10.1002/BLTJ.21555},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Bowles12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BroustisSV12,
  author       = {Ioannis Broustis and
                  Ganapathy S. Sundaram and
                  Harish Viswanathan},
  title        = {Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular
                  Networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {125--140},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21527},
  doi          = {10.1002/BLTJ.21527},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BroustisSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BroustisSV12a,
  author       = {Ioannis Broustis and
                  Ganapathy S. Sundaram and
                  Harish Viswanathan},
  title        = {Group Authentication: {A} New Paradigm for Emerging Applications},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {157--173},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21566},
  doi          = {10.1002/BLTJ.21566},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BroustisSV12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BurnsF12,
  author       = {Michael J. Burns and
                  Brian D. Friedman},
  title        = {A Multidimensional Approach to Characterizing and Visualizing Latent
                  Relationships in Enterprise Social Networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {201--217},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21531},
  doi          = {10.1002/BLTJ.21531},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BurnsF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/CakulevBS12,
  author       = {Violeta Cakulev and
                  Ioannis Broustis and
                  Ganapathy S. Sundaram},
  title        = {Secure Enablement of Real Time Applications: {A} Novel End-to-End
                  Approach},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {175--191},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21567},
  doi          = {10.1002/BLTJ.21567},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/CakulevBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/CarrollHK12,
  author       = {Martin D. Carroll and
                  Ilija Hadzic and
                  William A. Katsak},
  title        = {3D Rendering in the Cloud},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {55--66},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21544},
  doi          = {10.1002/BLTJ.21544},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/CarrollHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/CeballosDF12,
  author       = {Juan Ceballos and
                  Richard DiPasquale and
                  Robert Feldman},
  title        = {Business Continuity and Security in Datacenter Interconnection},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {147--155},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21565},
  doi          = {10.1002/BLTJ.21565},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/CeballosDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ChandrashekharN12,
  author       = {Uma Chandrashekhar and
                  Scott Nelson},
  title        = {Delivering Network Assurance Through Secure and Reliable Solutions},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {1--4},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21554},
  doi          = {10.1002/BLTJ.21554},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ChandrashekharN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ChangFSVWW12,
  author       = {Fangzhe Chang and
                  Peter S. Fales and
                  Moritz Steiner and
                  Ramesh Viswanathan and
                  Thomas J. Williams and
                  Thomas L. Wood},
  title        = {Mitigating High Latency Outliers for Cloud-Based Telecommunication
                  Services},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {121--142},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21548},
  doi          = {10.1002/BLTJ.21548},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ChangFSVWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ChangHKMS12,
  author       = {Yuh{-}Jye Chang and
                  Adiseshu Hari and
                  Pramod V. Koppol and
                  Antony Martin and
                  Thanos Stathopoulos},
  title        = {Scalable and Elastic Telecommunication Services in the Cloud},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {81--96},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21546},
  doi          = {10.1002/BLTJ.21546},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ChangHKMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/CiavagliaGSDSBS12,
  author       = {Laurent Ciavaglia and
                  Samir Ghamri{-}Doudane and
                  Mikhail Smirnov and
                  Panagiotis Demestichas and
                  Vera{-}Alexandra Stavroulaki and
                  Aimilia Bantouna and
                  Berna Sayra{\c{c}}},
  title        = {Unifying Management of Future Networks With Trust},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {193--212},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21568},
  doi          = {10.1002/BLTJ.21568},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/CiavagliaGSDSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/DinuP12,
  author       = {Mihaela Dinu and
                  Micha{\"{e}}l Peeters},
  title        = {Overview},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {1--4},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21520},
  doi          = {10.1002/BLTJ.21520},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/DinuP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Donadio12,
  author       = {Pasquale Donadio},
  title        = {Virtual Intrusion Detection Systems in the Cloud},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {113--128},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21562},
  doi          = {10.1002/BLTJ.21562},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Donadio12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/JosephB12,
  author       = {Jean{-}Philippe Joseph and
                  William J. Barnett Jr.},
  title        = {Leveraging Broadband Access Expansion for {PSTN} Migration: {A} Case
                  Study for Converged Fixed Access},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {141--162},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21528},
  doi          = {10.1002/BLTJ.21528},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/JosephB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KangPK12,
  author       = {Kyungtae Kang and
                  Kyung{-}Joon Park and
                  Hongseok Kim},
  title        = {Functional-Level Energy Characterization of \emph{{\(\mathrm{\mu}\)}}C/OS-II
                  and Cache Locking for Energy Saving},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {219--227},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21532},
  doi          = {10.1002/BLTJ.21532},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/KangPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KanounDPCC12,
  author       = {Wael Kanoun and
                  Samuel Dubus and
                  Serge Papillon and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {61--78},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21558},
  doi          = {10.1002/BLTJ.21558},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/KanounDPCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KolesnikovS12,
  author       = {Vladimir Kolesnikov and
                  Abdullatif Shikfa},
  title        = {On The Limits of Privacy Provided by Order-Preserving Encryption},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {135--146},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21564},
  doi          = {10.1002/BLTJ.21564},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/KolesnikovS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KoppolNSW12,
  author       = {Pramod V. Koppol and
                  Kedar S. Namjoshi and
                  Thanos Stathopoulos and
                  Gordon T. Wilfong},
  title        = {The Inherent Difficulty of Timely Primary-Backup Replication},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {15--24},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21541},
  doi          = {10.1002/BLTJ.21541},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/KoppolNSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KrogfossWS12,
  author       = {Bill Krogfoss and
                  Marcus Weldon and
                  Lev B. Sofman},
  title        = {Internet Architecture Evolution and the Complex Economies of Content
                  Peering},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {163--184},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21529},
  doi          = {10.1002/BLTJ.21529},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/KrogfossWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/LeostARJ12,
  author       = {Yann L{\'{e}}ost and
                  Moussa Abdi and
                  Robert Richter and
                  Michael Jeschke},
  title        = {Interference Rejection Combining in {LTE} Networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {25--49},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21522},
  doi          = {10.1002/BLTJ.21522},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/LeostARJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/LiBC12,
  author       = {Xiang{-}Yang Li and
                  Kim Brouard and
                  Yigang Cai},
  title        = {Dynamic Policy and Charging Control Framework},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {105--123},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21526},
  doi          = {10.1002/BLTJ.21526},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/LiBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/MampaeyV12,
  author       = {Marcel Mampaey and
                  {\'{A}}lvaro Nunez Villegas},
  title        = {A Network-Centric {DRM} For Online Scenarios},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {129--133},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21563},
  doi          = {10.1002/BLTJ.21563},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/MampaeyV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/McBrideM12,
  author       = {Alan J. McBride and
                  Andrew R. McGee},
  title        = {Assessing Smart Grid Security},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {87--103},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21560},
  doi          = {10.1002/BLTJ.21560},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/McBrideM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/McGeeCP12,
  author       = {Andrew R. McGee and
                  Matthieu Couti{\`{e}}re and
                  Maria E. Palamara},
  title        = {Public Safety Network Security Considerations},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {79--86},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21559},
  doi          = {10.1002/BLTJ.21559},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/McGeeCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/MheichAD12,
  author       = {Zeina Mheich and
                  Marie{-}Line Alberi{-}Morel and
                  Pierre Duhamel},
  title        = {Optimization of Unicast Services Transmission for Broadcast Channels
                  in Practical Situations},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {5--23},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21521},
  doi          = {10.1002/BLTJ.21521},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/MheichAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Mullender12,
  author       = {Sape J. Mullender},
  title        = {Predictable Cloud Computing},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {25--39},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21542},
  doi          = {10.1002/BLTJ.21542},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Mullender12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/MullenderW12,
  author       = {Sape J. Mullender and
                  Thomas L. Wood},
  title        = {Cloud Computing: New Opportunities for Telecom Providers},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {1--3},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21550},
  doi          = {10.1002/BLTJ.21550},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/MullenderW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/PerezRVDBDS12,
  author       = {Pablo P{\'{e}}rez and
                  Jaime J. Ruiz and
                  {\'{A}}lvaro Villegas and
                  Karel Van Damme and
                  Christian Van Boven and
                  Joel Dupont and
                  Pedro A. Molina Salmer{\'{o}}n},
  title        = {Multi-Vendor Video Headend Convergence Solution},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {185--200},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21530},
  doi          = {10.1002/BLTJ.21530},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/PerezRVDBDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Radhakrishnan12,
  author       = {Ganesan Radhakrishnan},
  title        = {Adaptive Application Scaling for Improving Fault-Tolerance and Availability
                  in the Cloud},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {5--14},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21540},
  doi          = {10.1002/BLTJ.21540},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Radhakrishnan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/SabnisC12,
  author       = {Suhasini V. Sabnis and
                  Doug Charles},
  title        = {Opportunities and Challenges: Security in eHealth},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {105--111},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21561},
  doi          = {10.1002/BLTJ.21561},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/SabnisC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/SabnisVHM12,
  author       = {Suhasini V. Sabnis and
                  Marc Verbruggen and
                  John Hickey and
                  Alan J. McBride},
  title        = {Intrinsically Secure Next-Generation Networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {17--36},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21556},
  doi          = {10.1002/BLTJ.21556},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/SabnisVHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Sharp12,
  author       = {Ron Sharp},
  title        = {Latency in Cloud-Based Interactive Streaming Content},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {2},
  pages        = {67--80},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21545},
  doi          = {10.1002/BLTJ.21545},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Sharp12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ThiebautHU12,
  author       = {Laurent Thi{\'{e}}baut and
                  Wim Henderickx and
                  Alistair Urie},
  title        = {Using a Trusted {WLAN} Network to Offload Mobile Traffic and Leverage
                  Deployed Broadband Network Gateways},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {89--104},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21525},
  doi          = {10.1002/BLTJ.21525},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ThiebautHU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/VieiraVG12,
  author       = {Elisangela Rodrigues Vieira and
                  Dario Vieira and
                  Jean{-}Pierre Gallois},
  title        = {Challenges of a Validation Process Based on Models: An Industrial
                  Case Study},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {229--246},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21533},
  doi          = {10.1002/BLTJ.21533},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/VieiraVG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Yang12,
  author       = {Hong Yang},
  title        = {Differential Fade Margin and Handoff Gain in Wireless Cellular Networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {1},
  pages        = {51--65},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21523},
  doi          = {10.1002/BLTJ.21523},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Yang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}