default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm3.bht:"
@article{DBLP:journals/ijnm/Abderrahman93, author = {A. Rahman Abderrahman}, title = {What's needed for distributed systems management}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {64--77}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030203}, doi = {10.1002/NEM.4560030203}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Abderrahman93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryAS93, author = {Saad Haj Bakry and Ibrahim Al{-}Abbas and Mohammad K. Samarkandy}, title = {Analysis of the economic life and the replacement time of telecommunications equipment}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {78--90}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030204}, doi = {10.1002/NEM.4560030204}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryAS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Barrett93, author = {Katherine Epes Barrett}, title = {{LAN} standards and policies: {A} How-to guide}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {4}, pages = {181--190}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030404}, doi = {10.1002/NEM.4560030404}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Barrett93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Bauer93, author = {Matthew B. Bauer}, title = {Global telecommunications tariffs: Using worldnet to design international networks}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {3}, pages = {132--144}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030304}, doi = {10.1002/NEM.4560030304}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Bauer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Brown93, author = {Michael Brown}, title = {Network management and the AT{\&}T {VSAT} network}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {55--63}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030202}, doi = {10.1002/NEM.4560030202}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Brown93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ChakrabortyY93, author = {Rabindra Chakraborty and Ece Yaprak}, title = {Improved Reconfiguration Algorithm for the Dual Ring Network by Token Reversal}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {4}, pages = {201--206}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030406}, doi = {10.1002/NEM.4560030406}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ChakrabortyY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DeSousa93, author = {Karen E. DeSousa}, title = {A Detailed Look into Net Expert}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {3}, pages = {111--124}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030302}, doi = {10.1002/NEM.4560030302}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DeSousa93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Gejji93, author = {Raghvendra R. Gejji}, title = {{CSMA/CD} Network Problem Threshold}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {4}, pages = {167--180}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030403}, doi = {10.1002/NEM.4560030403}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Gejji93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held93, author = {Gilbert Held}, title = {Help us help you}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {1--5}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030102}, doi = {10.1002/NEM.4560030102}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held93a, author = {Gilbert Held}, title = {Keeping personal communications personal}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {26--30}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030105}, doi = {10.1002/NEM.4560030105}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held93b, author = {Gilbert Held}, title = {Frye Computer Systems' Netware Management}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {3}, pages = {159--164}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030306}, doi = {10.1002/NEM.4560030306}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held93b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held93c, author = {Gilbert Held}, title = {Don't leave home without it!}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {53--54}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030201}, doi = {10.1002/NEM.4560030201}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held93c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held93d, author = {Gilbert Held}, title = {{TXD} Network diagnostic software}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {103--107}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030207}, doi = {10.1002/NEM.4560030207}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held93d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jones93, author = {Katherine Jones}, title = {Managing fddi networks: The state of the standards}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {45--48}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030108}, doi = {10.1002/NEM.4560030108}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jones93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Kelly93, author = {Bob Kelly}, title = {The wrong fallback switch can be costing you money}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {21--25}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030104}, doi = {10.1002/NEM.4560030104}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Kelly93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Koren93, author = {Debby Koren}, title = {What you should look for in an snmp-based management system}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {49--52}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030109}, doi = {10.1002/NEM.4560030109}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Koren93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Muller93, author = {Nathan J. Muller}, title = {Managing Image Files over the Network}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {3}, pages = {145--158}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030305}, doi = {10.1002/NEM.4560030305}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Muller93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Muller93a, author = {Nathan J. Muller}, title = {Bandwidth Management with Inverse Multiplexers}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {4}, pages = {191--200}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030405}, doi = {10.1002/NEM.4560030405}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Muller93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Muller93b, author = {Nathan J. Muller}, title = {Application note: {LAN} internet helps prudential securities compete}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {95--102}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030206}, doi = {10.1002/NEM.4560030206}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Muller93b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen93, author = {Jesper Nilausen}, title = {Token Ring Network Management}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {3}, pages = {125--131}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030303}, doi = {10.1002/NEM.4560030303}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen93a, author = {Jesper Nilausen}, title = {Token ring network management: Problem management}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {4}, pages = {207--212}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030407}, doi = {10.1002/NEM.4560030407}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Penna93, author = {Manoel Camillo Penna}, title = {The design of the idea network management platform}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {6--20}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030103}, doi = {10.1002/NEM.4560030103}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Penna93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Sarch93, author = {Ray Sarch}, title = {The need for speed: Reality or myth?}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {91--94}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030205}, doi = {10.1002/NEM.4560030205}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Sarch93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Upp93, author = {Michael Upp}, title = {Physical network management: An essential tool for managing growing networks}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {38--44}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030107}, doi = {10.1002/NEM.4560030107}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Upp93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Walden93, author = {Timothy M. Walden}, title = {{MONA:} {A} return to network management basics}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {1}, pages = {31--37}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030106}, doi = {10.1002/NEM.4560030106}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Walden93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/X93, title = {Signalling protocols and services for broadband {ATM} networks}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {108}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030208}, doi = {10.1002/NEM.4560030208}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/X93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.