Journal: Bell Labs Technical Journal

Volume 12, Issue 4

1 -- 4Michael J. Burns. Deploying, hardening, and benefiting from next-generation networks
5 -- 20Qingwang Michael Hao. Toward a unified service delivery process for next-generation services
21 -- 31Anne Lee, Carlos Urrutia-Valdés. An analysis of capital expenses and performance trade-offs among IMS CSCF deployment options
33 -- 48Jean-Philippe Joseph. IMS network signaling peering: Challenges and proposal
49 -- 65Ramana Isukapalli, Steven A. Benno, Candace Park, Peretz Feder. Advanced IMS client supporting secure signaling
67 -- 82Doru Calin, Andrew Mackay, Thomas B. Morawski, Hardy Zhang. An approach for just-in-time radio access network capacity planning in CDMA networks
83 -- 101Bing Leng, Dave P. Weeks, Manoj K. Mahapatra. Automating network configuration tasks using multi-level modeling
103 -- 108Steven H. Richman, Himanshu Pant. Reliability concerns for next-generation networks
109 -- 125Himanshu Pant, Chi-Hung Kelvin Chu, Steven H. Richman, Ahmad M. Jrad, Gerard P. O'Reilly. Reliability of next-generation networks with a focus on IMS architecture
127 -- 141Gerard P. O'Reilly, Chi-Hung Kelvin Chu. Optimal deployment of power reserves across telecom critical infrastructures
143 -- 157Vassilka Kirova, Neil Kirby, Darshak Kothari, Glenda Childress. Effective requirements traceability: Models, tools, and practices
159 -- 172Ramesh Viswanathan, Thomas L. Wood. Portable Call Agent: A model for rapid development and emulation of network services
173 -- 178Hans Peng Liu. Generic service provisioning and invocation in IMS
179 -- 193Jasper Aartse Tuijn, Dennis Bijwaard. Spanning a multimedia session across multiple devices
195 -- 212Bilgehan Erman, Elissa P. Matthews. Analysis and realization of IPTV service quality

Volume 12, Issue 3

7 -- 19Vijay K. Gurbani, Andrew R. McGee. An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain
21 -- 38Ashok K. Gupta, Uma Chandrashekhar, Suhasini V. Sabnis, Frank A. Bastry. Building secure products and solutions
39 -- 54Andrew R. McGee, Frank A. Bastry, Uma Chandrashekhar, S. Rao Vasireddy, Lori A. Flynn. Using the Bell Labs security framework to enhance the ISO 17799/27001 information security management system
55 -- 64David Ramírez. Case study: ITU-T recommendation X.805 applied to an enterprise environment - banking
65 -- 78Robert S. Hanmer, Donald T. McBride, Veena B. Mendiratta. Comparing reliability and security: Concepts, requirements, and techniques
79 -- 93Daping Wang. An XML-based testing strategy for probing security vulnerabilities in the diameter protocol
95 -- 99Seyong Park, Alexandro Salvarani. IP-based radio access network implementation cost vs. network security trade-off
101 -- 119Dimitrios Stiliadis, Andrea Francini, Sanjay Kamat, Mansoor Alicherry, Adiseshu Hari, Pramod V. Koppol, Ashok K. Gupta, Dor Skuler. Evros: A service-delivery platform for extending security coverage and IT reach
121 -- 130Jorge Hernandez-Herrero, Jon A. Solworth. The need for a multi-perspective approach to solve the DDos problem
131 -- 138Bjoern M. Luettmann, Adam C. Bender. Man-in-the-middle attacks on auto-updating software
139 -- 147Gerald R. Thompson, Lori A. Flynn. Polymorphic malware detection and identification via context-free grammar homomorphism
149 -- 166Lloyd G. Greenwald, Tavaris J. Thomas. Understanding and preventing network device fingerprinting
167 -- 185Ruth S. Gayde, Stinson S. Mathai, Kevin Wang. Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access
187 -- 203Andrew C. Clark, Karen E. Plonty. Common security management for CDMA2000 1x and 1x EV-DO networks

Volume 12, Issue 2

1 -- 2Lawrence C. Cowsar. A global research presence
3 -- 18Georg Fischer. Next-generation base station radio frequency architecture
19 -- 35Angeliki Alexiou. WINNER: Designing a new radio interface for next-generation systems
37 -- 61Markus Bauer, Armin Dekorsy, Peter Schefczik, Michael Söllner. IP-driven access-independent resource management in converged access networks
63 -- 77Shipra Agrawal, C. N. Kanthi, K. V. M. Naidu, Jeyashankher Ramamirtham, Rajeev Rastogi, Scott Satkin, Anand Srinivasan. Monitoring infrastructure for converged networks and services
79 -- 86Erik Meeuwissen, Paul Reinold, Cynthia Liem. Inferring and predicting context of mobile users
87 -- 96Supratim Deb, Ankur Jain, Anirban Majumder, K. V. M. Naidu, Jeyashankher Ramamirtham, Rajeev Rastogi, Anand Srinivasan. Augmenting handset capacity through virtual storage
97 -- 118Alexei E. Ashikhmin, Adriaan J. de Lind van Wijngaarden, Zhao Haibo, Bertrand M. Hochwald, Thomas L. Marzetta, Vinay Purohit, Chen Qinghong, Paul A. Wilford, Sheng-Rong Zhou, Michael A. Zuniga, Edward S. Zuranski. Design and development of a terrestrial digital video broadcast demodulation core: An international collaborative effort
119 -- 131Partha Dutta, Sharad Jaiswal, Rajeev Rastogi. VillageNet: A low-cost, IEEE 802.11-based mesh network for connecting rural areas
133 -- 141Terry S. Cheng, Kenneth W. Del Signore, Frances Lin. Cost effective treatment of short message service on the paging channel for the CDMA system
147 -- 159Michael R. Brenner, Musa R. Unmehopa. Service-oriented architecture and Web services penetration in next-generation networks

Volume 12, Issue 1

1 -- 4Kristin F. Kocan. Achieving the transformation to next-generation networks
5 -- 21Thomas W. Anderson, Peter Busschbach, Igor Faynberg, Hui-Lan Lu, Dong Sun. The emerging resource and admission control function standards and their application to the new triple-play services
23 -- 39Andre Beck, Robert E. Daugherty, J. Robert Ensor, Jairo O. Esteban, F. Theodore Freuler, Sugato Ganguly, Kristin F. Kocan, William D. Roome. Blending telephony and IPTV: Building the TV-link service package using the Alcatel-Lucent Service Broker:::TM:::
41 -- 55Ganesan Radhakrishnan. Provisioning in complex networks
57 -- 76Christian Hermsmeyer, Enrique J. Hernandez-Valencia, Dieter Stoll, Oliver Tamm. Ethernet aggregation and core network models for effcient and reliable IPTV services
77 -- 93Subramanian Prakash, Abdol Saleh, Salman Shaikh, David Tsay. Economic analysis of class 5 migration to IMS
95 -- 114Ying Hu, Amit Mukhopadhyay, Zulfiquar Sayeed, Carlos Urrutia-Valdés, Mohamed El-Sayed. IMS service enhancement layer: A quantitative value proposition
115 -- 121Wenhua Jiao, Jianfeng Chen, Fang Liu. Provisioning end-to-end QoS under IMS over a WiMAX architecture
123 -- 129Dalton Li, Andrew Guo, Brian Huang. Generic policy decision function framework
131 -- 144Thierry Bessis. Improving the DNS mechanism in a data center intranet
145 -- 160Sheng Chen, Xiangyang Li, Yigang Cai. IP multimedia subsystem converged call control services
161 -- 173Eric S. Fisher, Steven Fortune, Martin K. Gladstein, Suresh Goyal, William B. Lyons, James H. Mosher Jr., Gordon T. Wilfong. Economic modeling of global test strategy I: Mathematical models
175 -- 186Eric S. Fisher, Steven Fortune, Martin K. Gladstein, Suresh Goyal, William B. Lyons, James H. Mosher Jr., Gordon T. Wilfong. Economic modeling of global test strategy II: Software system and examples
187 -- 206Jim Borger, Alina M. Ionescu-Graff, Samrat Kulkarni, Narayan Raman. Economics of ethernet over SONET/SDH
207 -- 220Dieter Stoll, Wolfgang Thomas, Martin Belzner. The role of pseudo-wires for layer 2 services in intelligent transport networks
221 -- 236Doh-Suk Kim, Ahmed Tarraf. ANIQUE+: A new American national standard for non-intrusive estimation of narrowband speech quality