default search action
Computer Communications, Volume 17
Volume 17, Number 1, January 1994
- Jeremy B. Thompson:
Editorial. 3 - Goopeel Chung, Kevin Jeffay, Hussein M. Abdel-Wahab:
Dynamic participation in a computer-based conferencing system. 7-16 - Jeremiah F. Hayes, F. Ayadi:
Performance calculation for an optical MAN. 17-24 - J. K. Roussos, E. G. Economou, George Philokyprou:
Congestion control protocols for interconnected LANs supporting voice and data traffic. 25-34 - R. M. Watson, S. Ward:
Prioritization in FDDI networks. 35-45 - Alfred C. Weaver:
The Xpress Transfer Protocol. 46-52 - Yusheng Liu, Doan B. Hoang:
OSI RPC model and protocol. 53-66 - Randy L. Borchardt, Tri T. Ha:
Capture Aloha with two random power levels. 67-71
Volume 17, Number 2, February 1994
- Koon-Seng Lim, Robert Huijie Deng, Kisenchand Ranai:
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems. 83-93 - Sridhar Narasimhan:
Locating concentrators in a computer network with multiple coverage for terminals. 94-102 - Ahmed Patel, Paul Gardiner:
A Database Handler (DBH) for broadband network administration. 103-118
- Neil Williams, Gordon S. Blair:
Distributed multimedia applications: A review. 119-132
- K. C. Chua, S. Guo:
Simulation of a TDM-like protocol for Gbit/s MANs. 133-138
- Ray Hunt:
Useful tutorial on OSI applications. 141 - Brian W. Marsden:
Authoritative and up to date book. 141-142
Volume 17, Number 3, March 1994
- Gee-Swee Poo:
Editorial. 146-147 - Wai Lung Loh, Gee-Swee Poo:
Object-oriented modelling and specification of the X.400 mail system. 148-155 - Michael Sample, Gerald W. Neufeld:
High-performance ASN.1 compiler. 156-171 - Richard Lai, Ajin Jirachiefpattana:
Verification of ISO ACSE protocol specified in Estelle. 172-188 - Sujata Banerjee, Victor O. K. Li, Chihping Wang:
Performance analysis of the send-on-demand: A distributed database concurrency control protocol for high-speed networks. 189-204 - Raj Yavatkar, Leelanivas Manoj:
End-to-end approach to large-scale multimedia dissemination. 205-217 - Y. Ni, Andrzej M. Goscinski:
Trader cooperation to enable object sharing among users of homogeneous distributed systems. 218-229 - Thomas Hardjono, Tadashi Ohta:
Secure end-to-end delegations in distributed systems. 230-238
Volume 17, Number 4, April 1994
- J. K. Roussos, E. G. Economou, Panagiotis Georgiadis:
Congestion avoidance in high speed interconnected voice data traffic LANs. 242-250 - Koon-Seng Lim, Robert H. Deng, Kisenchand Ranai:
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. 251-256 - Son T. Vuong, H. Janssen, Y. Lu, C. Mathieson, B. Do:
TESTGEN: An environment for protocol test suite generation and selection. 257-270 - Jean-Lien C. Wu, Tien-Yu Huang:
Delay analysis of a dual-bus LAN with reservation. 271-276 - Adelino Santos, Bernhard Tritsch:
Cooperative multimedia editing tool for enhanced group communication. 277-287 - W. S. Chung, C. K. Un, Byung-Choel Shin:
Analysis of delay bounds of a tree protocol with collision detection. 288-296 - Gilbert M. Lundy:
1st International Conference on Network Protocols. 299-300
Volume 17, Number 5, May 1994
- Hasan Pirkul, Ali Amiri:
Routing in packet-switched communication networks. 307-316 - Jim E. Cooling:
Survivable LANs for distributed control systems. 317-331 - Tien-Yu Huang, Jean-Lien C. Wu:
Priority promotion DQDB networks to improve fairness. 332-338 - John A. Robinson:
Communications services architecture for CSCW. 339-347 - Jeong-Ky Min:
Performance of end-to-end flow control in LAN/WAN interconnection. 348-362 - Kin Mun Lye, G. Y. Loo, Kee Chaing Chua, Winston Khoon Guan Seah:
Adaptive self-stabilizing connection control scheme for server-based networks. 363-368 - Marion J. Dearlove:
The adoption of electronic trading in Western Europe. 369-374
Volume 17, Number 6, June 1994
- A. S. Andreatos, Emmanuel N. Protonotarios:
Receiver synchronization of a packet video communication system. 387-395 - Nen-Fu Huang, Chung-Ching Chiou:
Reservation scheme for CRMA high-speed networks. 396-406 - Salvatore Casale, Vincenzo Catania, Aurelio La Corte:
Service integration issues on an ATM DQDB MAN. 407-418 - Ananthanarayanan Chockalingam, Pallapa Venkataram, A. Prabhakar:
Throughput-delay characteristics of OCUM protocol for media access in multihop wireless networks with buffers. 419-427 - George D. Stamoulis, Miltiades E. Anagnostou, A. D. Georgantas:
Traffic source models for ATM networks: a survey. 428-438 - Jorge Santos, M. L. Gastaminza, Javier Orozco, C. Matrangolo:
802.5 priority mechanism in hard real-time RMS applications. 439-442
Volume 17, Number 7, July 1994
- Sead Muftic:
Editorial. 451-452 - Dorothy E. Denning:
The US key escrow encryption technology. 453-457 - Rainer A. Rueppel, Paul C. van Oorschot:
Modern key agreement techniques. 458-465 - Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, Steffen Stempel:
TESS: A security system based on discrete exponentiation. 466-475 - Per Kaijser:
Security protection for parts of a data structure. 476-482 - John Linn:
Generic interface to security services. 483-491 - Sead Muftic, Morris Sloman:
Security architecture for distributed systems. 492-500 - Per Kaijser, Tom Parker, Denis Pinkas:
SESAME: The solution to security for open distributed systems. 501-518 - Peter T. Kirstein, Peter Williams:
Piloting authentication and security services in the 'PASSWORD' project. 519-531 - Terry Dosdale:
Security in EDIFACT systems. 532-537 - Stephan Lechner:
SAMSON: Management of security in open systems. 538-543 - Ahmed Patel:
Security management for OSI networks. 544-553
Volume 17, Number 8, August 1994
- K. E. Mourelatou, Anastasios T. Bouloutas, Miltiades E. Anagnostou:
An approach to identifying QoS problems. 563-570 - Dong Geun Jeong, Chong-Ho Choi, Wha Sook Jeon:
Adaptive bandwidth waste rate: a fair bandwidth sharing scheme for the DQ protocol with multiple priority classes. 571-580 - Lek Heng Ngoh, Aurel A. Lazar:
Design and implementation of a manageable B-ISDN host interface. 581-588 - Ahmed E. Kamal, Hossam S. Hassanein:
Analysis of collision-avoidance star LANs. 589-599 - Lakshmana N. Kumar, Christos Douligeris, George Develekos:
Implementation of a decentralized Pareto optimal algorithm. 600-610 - Richard Cardinali, Daniel Hunt:
Growth and implications of network systems: technological and legislative issues. 611-618
Volume 17, Number 9, September 1994
- Christopher Ward, Sujata Mitra, Thomas M. Phillips:
Throughput efficiency of an enhanced link management procedure. 626-636 - Fabrice Guillemin, Wei Monin:
Analysis of cell clumping caused by ATM network GFC protocols. 637-646 - Samir M. Koriem, Lalit M. Patnaik:
Performance of the node/link behaviour of multicomputer networks with input buffer limiting and channel contention. 647-656 - Efstathios D. Sykas, Konstantinos M. Vlakos, Ioannis Ch. Paschalidis, Georgia Mourtzinou:
Congestion avoidance for ATM networks. 657-662 - George M. Stamatelos, Jeremiah F. Hayes:
Admission-control techniques with application to broadband networks. 663-673 - Ming-Yung Ko, Tzonelih Hwang, Chin-Chen Chang:
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. 674-676 - G. F. Zhao, Kin Mun Lye:
Synchronization protocol for high quality and single-point playout multimedia applications. 677-683
Volume 17, Number 10, October 1994
- Ahmed N. Tantawy:
Editorial. 690 - Stephen S. Yau, Doo-Hwan Bae:
Object-oriented and functional software design for distributed real-time systems. 691-698 - K. H. (Kane) Kim:
Fair distribution of concerns in design and evaluation of fault-tolerant distributed computer systems. 699-707 - Amr El-Kadi:
Tap processes. 708-716 - Volker Tschammer, Thomas Magedanz, Michael Tschichholz, Adam Wolisz:
Cooperative management in open distributed systems. 717-728 - Dominique Gaïti:
Introducing intelligence in distributed systems management. 729-738 - Clemens A. Szyperski, Giorgio Ventre:
Guaranteed quality of service for efficient multiparty communication. 739-749 - Seung-Woo Seo, Tse-Yun Feng:
Modified composite Banyan network with an enhanced terminal reliability. 750-757
Volume 17, Number 11, November 1994
- Theodoros Mastichiadis, Eleftheris Economou, Anthony Davies:
Design principles and performance for flooding routing mesh topology spread spectrum LANs. 762-770 - Kin Mun Lye, L. Chan, Kee Chaing Chua:
Performance of a network protocol processor. 771-776 - Achim Karduck:
TeamBuilder: a CSCW tool for identifying expertise and team formation. 777-787 - Jiunn-Jian Li, Cheng-Ming Weng:
Self-routing multistage switch with repeated contention resolution algorithm for B-ISDN. 788-798 - Deepak Cherian, Ravi Mittal:
Analysis of 1-ROR networks. 799-804 - Chu-Hsing Lin, Chin-Chen Chang:
Method for constructing a group-oriented cipher system. 805-808 - Harold Lorin:
The economics of astonishing counter-example. 809-812
Volume 17, Number 12, December 1994
- Saewoong Bahk, Magda El Zarki:
Congestion control based dynamic routing in ATM networks. 826-835 - R. Clark Robertson, Tri T. Ha:
Effect of capture on throughput of variable length packet Aloha systems. 836-842 - Sameer M. Bataineh, Mohammad Al-Ibrahim:
Effect of fault tolerance and communication delay on response time in a multiprocessor system with a bus topology. 843-851 - G. J. Lu, H. K. Pung, T. S. Chua, S. F. Chan:
Temporal synchronization support for distributed multimedia information systems. 852-862 - Kassem Saleh, Hasan Ural, Anjali Agarwal:
Modified distributed snapshots algorithm for protocol stabilization. 863-870 - Debashis Saha, Amitava Mukherjee, Sourav K. Dutta:
Capacity assignment in computer communication networks with unreliable links. 871-875 - Damjan Zazula:
EDIpro - an integrated environment for electronic data interchange. 876-885
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.