Journal: Computer Networks

Volume 34, Issue 6

821 -- 822Claudio Allocchio. Guest editorial
823 -- 830Claudia Raibulet, Claudio Demartini. Mobile agent technology for the management of distributed systems - a case study
831 -- 841Torsten Bissel, Manfred Bogen, Christian Bonkowski, Volker Hadamschek. Service level management with agent technology
843 -- 850Peter Ørbæk. An experimental system for distributed classroom education
851 -- 860Pierluigi Bonetti, Stefano Ravaioli, Simone Piergallini. The Italian academic community s electronic voting system
861 -- 872Gregory Karvounarakis, Sarantos Kapidakis. Submission and repository management of digital libraries, using WWW
873 -- 880Luca Deri, Stefano Suin. Practical network security: experiences with ntop
881 -- 894Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi. Security issues in control, management and routing protocols
895 -- 904Ferdinand Hommes, Eva Pless, Lothar Zier. Did MPOA achieve its objective?
905 -- 914Tiziana Ferrari. End-to-end performance analysis with traffic aggregation
915 -- 929Volker Sander, Ian T. Foster, Alain J. Roy, Linda Winkler. A differentiated services implementation for high-performance TCP flows
931 -- 944Thomas Boudier, David M. Shotton. VIDOS, a system for video editing and format conversion over the Internet
945 -- 958Pantelis Balaouras, Ioannis Stavrakakis, Lazaros F. Merakos. Potential and limitations of a teleteaching environment based on H.323 audio-visual communication systems
959 -- 964Gertraud Hoffmann. G-WiN - the Gbit/s infrastructure for the German scientific community
965 -- 980Stanislav Milanovic, Alessandro Maglianella. ATM over ADSL probe in Telecom Italia environment

Volume 34, Issue 5

701 -- 703Luigi Logrippo, John Visser. Future wireless networks
705 -- 715Harald Schmidts, John Visser. Framework for IMT-2000 networks
717 -- 743Jean-Claude Samou, Drissa Houatra, Philippe Godlewski, Elie Najm. IMT-2000 wireless terminal mobility over object-oriented distributed platforms
745 -- 762Alfio Lombardo, Ferdinando Lucidi, Marina Samarotto, Sebastiano Trigila. Personal mobility aspects in service architectures: extensions to TINA
763 -- 779Brahim Ghribi, Luigi Logrippo. Understanding GPRS: the GSM packet radio service
781 -- 797Fawzi Daoud. Hybrid satellite/terrestrial networks integration
799 -- 819Giulio Maggiore, Giulio Brusasco, Marco Vecchiato. Network integration testing: concepts, test specifications and tools for automatic telecommunication services verification

Volume 34, Issue 4

541 -- 545Deborah A. Frincke, Ming-Yuh Huang. Recent advances in intrusion detection systems
547 -- 570Eugene H. Spafford, Diego Zamboni. Intrusion detection using autonomous agents
571 -- 577Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz. A data mining analysis of RTID alarms
579 -- 595Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das. The 1999 DARPA off-line intrusion detection evaluation
597 -- 603Richard Lippmann, Robert K. Cunningham. Improving intrusion detection performance using keyword selection and neural networks
605 -- 621Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu. Intrusion detection inter-component adaptive negotiation
623 -- 640Emilie Lundin, Erland Jonsson. Anomaly-based intrusion detection: privacy concerns and other problems
641 -- 658Peter Mell, Donald G. Marks, Mark McLarnon. A denial-of-service resistant intrusion detection architecture
659 -- 670Glenn Mansfield, Kohei Ohta, Y. Takei, Nei Kato, Yasunoni Nemoto. Towards trapping wily intruders in the large
671 -- 697Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery. Intrusion-detection for incident-response, using a military battlefield-intelligence process

Volume 34, Issue 3

341 -- 353Antonios F. Atlasis, Nikolaos H. Loukas, Athanasios V. Vasilakos. The use of learning algorithms in ATM networks call admission control problem: a methodology
355 -- 361M. A. Al-Fawzan, Fahad Hoymany. Placement of network servers in a wide-area network
363 -- 378Shatha K. Habra, Ahmed E. Kamal. An MCR-weighted protocol for multipoint-to-point communication over ABR service
379 -- 397Michael Montgomery, Gustavo de Veciana. Hierarchical source routing using implied costs
399 -- 418Robert Haas, Patrick Droz, Daniel Bauer. PNNI Augmented Routing (PAR) and Proxy-PAR
419 -- 437Wei Kuang Lai, Mu-Rung Shiu. Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes
455 -- 466Larry Hughes, Omid Banyasad, Evan J. Hughes. Cartesian routing
467 -- 480Yue-Shan Chang, Shyan-Ming Yuan, Winston Lo. A new multi-search engine for querying data through an Internet search service on CORBA
481 -- 501Yiwei Thomas Hou, Bo Li, Shivendra S. Panwar, Henry H.-Y. Tzeng. On network bandwidth allocation policies and feedback control algorithms for packet networks
503 -- 537Eerke Boiten, Howard Bowman, John Derrick, Peter F. Linington, Maarten Steen. Viewpoint consistency in ODP

Volume 34, Issue 2

229 -- 240S. M. Poon, Song Jie, B. S. Lee, C. K. Yeo. Performance of buffer-based request-reply scheme for VoD streams over IP networks
241 -- 261Ren-Hung Hwang, James F. Kurose, Donald F. Towsley. MDP routing for multi-rate loss networks
263 -- 278Fabrice Guillemin, Olivier Dugeon, Jacqueline Boyer, Christophe Mangin. Lightweight signaling in ATM networks for high quality transfer of Internet traffic
279 -- 295Shaowen Song. A credit-based flow control algorithm for broadband access networks
297 -- 315Mahmoud Saleh, Mohammed Atiquzzaman. Analysis of shared buffer switches under non-uniform traffic pattern and global flow control
317 -- 337Peter Herrmann, Heiko Krumm. A framework for modeling transfer protocols

Volume 34, Issue 1

1 -- 2Demetres D. Kouvatsos. Performance Modelling and Evaluation of ATM Networks
3 -- 22A. Evangelatos, Th. Rapsomanikis, Nikolas Mitrou, George I. Stassinopoulos. A burst-level traffic analysis tool
23 -- 35Abdulmohsen A. Alheraish, D. G. Smith. Cell rate moderation of VBR video under an FEC environment in ATM networks
37 -- 47Christos Stathis, Basil S. Maglaris. Modelling the self-similar behaviour of network traffic
49 -- 63Francesco Balestrieri, Pantelis L. Panteli, Vasillios Dionissopoulos, Trevor G. Clarkson. ATM connection admission control using pRAM based artificial neural networks
65 -- 83John Soldatos, Evangelos Vayias, Nikolas Mitrou. CAC and traffic shaping for performance control in ATM: the two-class paradigm
85 -- 95Monique Becker, André-Luc Beylot. Performance comparison criteria for ATM switch models
97 -- 113Demetres D. Kouvatsos, Irfan-Ullah Awan, Rod J. Fretwell, George Dimakopoulos. A cost-effective approximation for SRD traffic in arbitrary multi-buffered networks
115 -- 128Madhu D. K. Bhabuta, Peter G. Harrison. Optimising bandwidth of ABR sources
129 -- 138Ilhem Lengliz, Farouk Kamoun. A rate-based flow control method for ABR service in ATM networks
139 -- 155Milan Vojnovic, Nikola Rozic. An evaluation of the ABR explicit-rate allocation interfering with the guaranteed services traffic
157 -- 167Jan Naudts. Towards real-time measurement of traffic control parameters
169 -- 180Claudio Casetti, Renato Lo Cigno, Marco Mellia. Load-balancing solutions for static routing schemes in ATM networks
181 -- 197Ádám Magi, Áron Szentesi, Balázs Szviatovszki. Analysis of link cost functions for PNNI routing
199 -- 210Tien Van Do, Thong T. Nguyen, Hung T. Tran, Gábor Kalvach, Balázs Varga. Topology optimization of an overlay ATM network in an SDH infrastructure
211 -- 225D. Denteneer, Verus Pronk, J. M. Griffiths, Laurie G. Cuthbert. Impact of the resource needed for renegotiating ATM rates