default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn6.bht:"
@article{DBLP:journals/cn/BachmanR82, author = {Charles W. Bachman and Ronald G. Ross}, title = {Toward a More Complete Reference Model of Computer-Based Information Systems}, journal = {Comput. Networks}, volume = {6}, number = {5}, pages = {331--343}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90103-9}, doi = {10.1016/0376-5075(82)90103-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BachmanR82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bennett82, author = {Chris J. Bennett}, title = {The Overheads of Transnetwork Fragmentation}, journal = {Comput. Networks}, volume = {6}, number = {1}, pages = {21--36}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90120-9}, doi = {10.1016/0376-5075(82)90120-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Bennett82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Blair82, author = {Gordon S. Blair}, title = {A Performance Study of the Cambridge Ring}, journal = {Comput. Networks}, volume = {6}, number = {1}, pages = {13--20}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90119-2}, doi = {10.1016/0376-5075(82)90119-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Blair82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BlairS82, author = {Gordon S. Blair and Doug Shepherd}, title = {A Performance Comparsion of Ethernet and the Cambridge Digital Communication Ring}, journal = {Comput. Networks}, volume = {6}, number = {2}, pages = {105--113}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90032-0}, doi = {10.1016/0376-5075(82)90032-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BlairS82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BlumerT82, author = {Thomas P. Blumer and Richard L. Tenney}, title = {A Formal Specification Technique and Implementation Method for Protocols}, journal = {Comput. Networks}, volume = {6}, number = {3}, pages = {201--217}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90098-8}, doi = {10.1016/0376-5075(82)90098-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BlumerT82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BuxKT82, author = {Werner Bux and Karl K{\"{u}}mmerle and Hong Linh Truong}, title = {Data Link-Control Performance: Results Comparing {HDLC} Operational Modes}, journal = {Comput. Networks}, volume = {6}, number = {1}, pages = {37--51}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90121-0}, doi = {10.1016/0376-5075(82)90121-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BuxKT82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CeriPM82, author = {Stefano Ceri and Giancarlo Martella and Giuseppe Pelagatti}, title = {Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem}, journal = {Comput. Networks}, volume = {6}, number = {5}, pages = {345--357}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90104-0}, doi = {10.1016/0376-5075(82)90104-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CeriPM82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Coleman82, author = {Vernon Coleman}, title = {Siliconizing the Local Area Network}, journal = {Comput. Networks}, volume = {6}, number = {4}, pages = {245--254}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90124-6}, doi = {10.1016/0376-5075(82)90124-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Coleman82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Diaz82, author = {Michel Diaz}, title = {Modeling and Analysis of Communication and Cooperation Protocols Using Petri Net Based Models}, journal = {Comput. Networks}, volume = {6}, number = {6}, pages = {419--441}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90112-X}, doi = {10.1016/0376-5075(82)90112-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Diaz82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DidicW82, author = {Milena Didic and Bernd E. Wolfinger}, title = {Simulation of a Local Computer Network Architecture Applying a Unified Modeling System}, journal = {Comput. Networks}, volume = {6}, number = {2}, pages = {75--91}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90030-7}, doi = {10.1016/0376-5075(82)90030-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DidicW82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GrantH82, author = {Alastair Grant and David Hutchison}, title = {{X25} Protocols and Local Area Networks}, journal = {Comput. Networks}, volume = {6}, number = {4}, pages = {255--262}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90125-8}, doi = {10.1016/0376-5075(82)90125-8}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/GrantH82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HamacherS82, author = {V. Carl Hamacher and Gerald S. Shedler}, title = {Access Response on a Collision-Free Local Bus}, journal = {Comput. Networks}, volume = {6}, number = {2}, pages = {93--103}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90031-9}, doi = {10.1016/0376-5075(82)90031-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HamacherS82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/IyengarL82, author = {S. Sitharama Iyengar and Wendy Chih{-}Chun Liu}, title = {Performance Statistics of a Time-Sharing Computer Network}, journal = {Comput. Networks}, volume = {6}, number = {5}, pages = {303--317}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90101-5}, doi = {10.1016/0376-5075(82)90101-5}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/IyengarL82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Lai82, author = {Wai Sum Lai}, title = {An Analysis of Piggybacking in Packet Networks}, journal = {Comput. Networks}, volume = {6}, number = {4}, pages = {279--290}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90127-1}, doi = {10.1016/0376-5075(82)90127-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Lai82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiHG82, author = {Liang Li and Herman D. Hughes and Lewis H. Greenberg}, title = {Performance Analysis of a Shortest-Delay Protocol}, journal = {Comput. Networks}, volume = {6}, number = {3}, pages = {189--200}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90097-6}, doi = {10.1016/0376-5075(82)90097-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiHG82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Melici82, author = {J. A. Melici}, title = {The {BX.25} Certfication Facility}, journal = {Comput. Networks}, volume = {6}, number = {5}, pages = {319--329}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90102-7}, doi = {10.1016/0376-5075(82)90102-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Melici82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PiatkowskiIH82, author = {Thomas F. Piatkowski and Lap{-}Kin Ip and Dayun He}, title = {State Architecture Notation and Simulation: {A} Formal Technique for the Specification and Testing of Protocol Systems}, journal = {Comput. Networks}, volume = {6}, number = {6}, pages = {397--418}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90111-8}, doi = {10.1016/0376-5075(82)90111-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PiatkowskiIH82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Rayner82, author = {David Rayner}, title = {A System for Testing Protocol Implementations}, journal = {Comput. Networks}, volume = {6}, number = {6}, pages = {383--395}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90110-6}, doi = {10.1016/0376-5075(82)90110-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Rayner82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RubinW82, author = {J. Rubin and Colin H. West}, title = {An Improved Protocol Validation Technique}, journal = {Comput. Networks}, volume = {6}, number = {2}, pages = {65--73}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90029-0}, doi = {10.1016/0376-5075(82)90029-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RubinW82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SchneiderZ82, author = {G. Michael Schneider and Mary N. Zastrow}, title = {An Algorithm for the Design of Multilevel Concentrator Networks}, journal = {Comput. Networks}, volume = {6}, number = {1}, pages = {1--11}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90118-0}, doi = {10.1016/0376-5075(82)90118-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SchneiderZ82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SolomonLN82, author = {Marvin H. Solomon and Lawrence H. Landweber and Donald Neuhengen}, title = {The {CSNET} Name Server}, journal = {Comput. Networks}, volume = {6}, number = {3}, pages = {161--172}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90095-2}, doi = {10.1016/0376-5075(82)90095-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SolomonLN82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Sunshine82, author = {Carl A. Sunshine}, title = {Protocol Specification, Testing and Verification - Guest Editorial}, journal = {Comput. Networks}, volume = {6}, number = {6}, pages = {375--376}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90108-8}, doi = {10.1016/0376-5075(82)90108-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Sunshine82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/UngerB82, author = {Brian W. Unger and Don S. Bidulock}, title = {The Design and Simulation of a Multi-Computer Network Message Processor}, journal = {Comput. Networks}, volume = {6}, number = {4}, pages = {263--277}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90126-X}, doi = {10.1016/0376-5075(82)90126-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/UngerB82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Walter82, author = {Bernd Walter}, title = {A Robust and Efficient Protocol for Checking the Availability of Remote Sites}, journal = {Comput. Networks}, volume = {6}, number = {3}, pages = {173--188}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90096-4}, doi = {10.1016/0376-5075(82)90096-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Walter82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YeminiK82, author = {Yechiam Yemini and James F. Kurose}, title = {Can Current Protocol Verification Techniques Guarantee Correctness?}, journal = {Comput. Networks}, volume = {6}, number = {6}, pages = {377--381}, year = {1982}, url = {https://doi.org/10.1016/0376-5075(82)90109-X}, doi = {10.1016/0376-5075(82)90109-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YeminiK82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.