405 | -- | 421 | Guevara Noubir, K. Vijayananda, Henri J. Nussbaumer. Signature-based method for run-time fault detection in communication protocols:::1::: |
422 | -- | 430 | Sang Yong Moon, Jung Woo Park, Wook Hyun Kwon. Performance analysis of the IEEE 802.4 token-passing system with finite buffers and asymmetric loads |
431 | -- | 444 | Abdelhakim Hafid. A scalable video-on-demand system using future reservation of resources and multicast communications |
445 | -- | 459 | Y.-C. Chen, C. T. Chan, S.-C. Hu. Design and analysis of delay control for CBR services in ATM networks |
460 | -- | 469 | Shiuh-Pyng Shieh, Jun-Nan Chen. Specification, validation, and verification of time-critical systems |
470 | -- | 484 | Yingfei Dong, Xing Du, Xiaodong Zhang. Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations |
485 | -- | 497 | Yuh-Shihng Chang, Tzong-Chen Wu. Group-oriented authentication mechanism with key exchange |
499 | -- | 500 | Ali Rezaki, Hasan Ural. Erratum to Construction of checking sequences based on characterization sets : [Computer Communications 18 (1995) 911-920] |