Journal: Computer Communications

Volume 17, Issue 9

626 -- 636Christopher Ward, Sujata Mitra, Thomas M. Phillips. Throughput efficiency of an enhanced link management procedure
637 -- 646Fabrice Guillemin, Wei Monin. Analysis of cell clumping caused by ATM network GFC protocols
647 -- 656Samir M. Koriem, Lalit M. Patnaik. Performance of the node/link behaviour of multicomputer networks with input buffer limiting and channel contention
657 -- 662Efstathios D. Sykas, Konstantinos M. Vlakos, Ioannis Ch. Paschalidis, Georgia Mourtzinou. Congestion avoidance for ATM networks
663 -- 673George M. Stamatelos, Jeremiah F. Hayes. Admission-control techniques with application to broadband networks
674 -- 676Ming-Yung Ko, Tzonelih Hwang, Chin-Chen Chang. Attacks on an ID-based signature scheme based on Rabin s public key cryptosystem
677 -- 683G. F. Zhao, K. M. Lye. Synchronization protocol for high quality and single-point playout multimedia applications

Volume 17, Issue 8

563 -- 570K. E. Mourelatou, Anastasios T. Bouloutas, Miltiades E. Anagnostou. An approach to identifying QoS problems
571 -- 580Dong Geun Jeong, Chong-Ho Choi, Wha Sook Jeon. Adaptive bandwidth waste rate: a fair bandwidth sharing scheme for the DQ protocol with multiple priority classes
581 -- 588Lek Heng Ngoh, Aurel A. Lazar. Design and implementation of a manageable B-ISDN host interface
589 -- 599Ahmed E. Kamal, Hossam S. Hassanein. Analysis of collision-avoidance star LANs
600 -- 610Lakshmana N. Kumar, Christos Douligeris, George Develekos. Implementation of a decentralized Pareto optimal algorithm
611 -- 618Richard Cardinali, Daniel Hunt. Growth and implications of network systems: technological and legislative issues

Volume 17, Issue 7

451 -- 452Sead Muftic. Editorial
453 -- 457Dorothy E. Denning. The US key escrow encryption technology
458 -- 465Rainer A. Rueppel, Paul C. van Oorschot. Modern key agreement techniques
466 -- 475Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, Steffen Stempel. TESS: A security system based on discrete exponentiation
476 -- 482Per Kaijser. Security protection for parts of a data structure
483 -- 491John Linn. Generic interface to security services
492 -- 500Sead Muftic, Morris Sloman. Security architecture for distributed systems
501 -- 518Per Kaijser, Tom Parker, Denis Pinkas. SESAME: The solution to security for open distributed systems
519 -- 531Peter T. Kirstein, Peter Williams. Piloting authentication and security services in the PASSWORD project
538 -- 543Stephan Lechner. SAMSON: Management of security in open systems
544 -- 553Ahmed Patel. Security management for OSI networks

Volume 17, Issue 6

387 -- 395A. S. Andreatos, Emmanuel N. Protonotarios. Receiver synchronization of a packet video communication system
396 -- 406Nen-Fu Huang, Chung-Ching Chiou. Reservation scheme for CRMA high-speed networks
407 -- 418Salvatore Casale, Vincenzo Catania, Aurelio La Corte. Service integration issues on an ATM DQDB MAN
419 -- 427A. Chockalingam, Pallapa Venkataram, A. Prabhakar. Throughput-delay characteristics of OCUM protocol for media access in multihop wireless networks with buffers
428 -- 438George D. Stamoulis, Miltiades E. Anagnostou, A. D. Georgantas. Traffic source models for ATM networks: a survey
439 -- 442Jorge Santos, M. L. Gastaminza, Javier Orozco, C. Matrangolo. 802.5 priority mechanism in hard real-time RMS applications

Volume 17, Issue 5

307 -- 316Hasan Pirkul, Ali Amiri. Routing in packet-switched communication networks
317 -- 331J. E. Cooling. Survivable LANs for distributed control systems
332 -- 338Tien-Yu Huang, Jean-Lien C. Wu. Priority promotion DQDB networks to improve fairness
339 -- 347John A. Robinson. Communications services architecture for CSCW
348 -- 362Jeong-Ky Min. Performance of end-to-end flow control in LAN/WAN interconnection
363 -- 368Kin Mun Lye, G. Y. Loo, Kee Chaing Chua, Winston Khoon Guan Seah. Adaptive self-stabilizing connection control scheme for server-based networks
369 -- 374Marion J. Dearlove. The adoption of electronic trading in Western Europe

Volume 17, Issue 4

242 -- 250J. K. Roussos, E. G. Economou, Panagiotis Georgiadis. Congestion avoidance in high speed interconnected voice data traffic LANs
251 -- 256Koon-Seng Lim, Robert H. Deng, Kisenchand Ranai. Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems
257 -- 270Son T. Vuong, H. Janssen, Y. Lu, C. Mathieson, B. Do. TESTGEN: An environment for protocol test suite generation and selection
271 -- 276Jean-Lien C. Wu, Tien-Yu Huang. Delay analysis of a dual-bus LAN with reservation
277 -- 287Adelino Santos, Bernhard Tritsch. Cooperative multimedia editing tool for enhanced group communication
288 -- 296W. S. Chung, C. K. Un, B. C. Shin. Analysis of delay bounds of a tree protocol with collision detection
299 -- 300Gilbert M. Lundy. 1st International Conference on Network Protocols

Volume 17, Issue 3

146 -- 147Gee-Swee Poo. Editorial
148 -- 155Wai Lung Loh, Gee-Swee Poo. Object-oriented modelling and specification of the X.400 mail system
156 -- 171Michael Sample, Gerald W. Neufeld. High-performance ASN.1 compiler
172 -- 188Richard Lai, Ajin Jirachiefpattana. Verification of ISO ACSE protocol specified in Estelle
189 -- 204Sujata Banerjee, Victor O. K. Li, Chihping Wang. Performance analysis of the send-on-demand: A distributed database concurrency control protocol for high-speed networks
205 -- 217Raj Yavatkar, Leelanivas Manoj. End-to-end approach to large-scale multimedia dissemination
218 -- 229Y. Ni, Andrzej M. Goscinski. Trader cooperation to enable object sharing among users of homogeneous distributed systems
230 -- 238Thomas Hardjono, Tadashi Ohta. Secure end-to-end delegations in distributed systems

Volume 17, Issue 2

83 -- 93Koon-Seng Lim, Robert Huijie Deng, Kisenchand Ranai. Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems
94 -- 102Sridhar Narasimhan. Locating concentrators in a computer network with multiple coverage for terminals
103 -- 118Ahmed Patel, Paul Gardiner. A Database Handler (DBH) for broadband network administration
119 -- 132Neil Williams, Gordon S. Blair. Distributed multimedia applications: A review
133 -- 138K. C. Chua, S. Guo. Simulation of a TDM-like protocol for Gbit/s MANs
141 -- 142B. W. Marsden. Authoritative and up to date book
141 -- 0Ray Hunt. Useful tutorial on OSI applications

Volume 17, Issue 12

826 -- 835Saewoong Bahk, Magda El Zarki. Congestion control based dynamic routing in ATM networks
836 -- 842R. Clark Robertson, Tri T. Ha. Effect of capture on throughput of variable length packet Aloha systems
843 -- 851Sameer M. Bataineh, Mohammad Al-Ibrahim. Effect of fault tolerance and communication delay on response time in a multiprocessor system with a bus topology
852 -- 862G. J. Lu, H. K. Pung, T. S. Chua, S. F. Chan. Temporal synchronization support for distributed multimedia information systems
863 -- 870Kassem Saleh, Hasan Ural, Anjali Agarwal. Modified distributed snapshots algorithm for protocol stabilization
871 -- 875Debashis Saha, Amitava Mukherjee, Sourav K. Dutta. Capacity assignment in computer communication networks with unreliable links
876 -- 885Damjan Zazula. EDIpro - an integrated environment for electronic data interchange

Volume 17, Issue 11

762 -- 770Theodoros Mastichiadis, Eleftheris Economou, Anthony Davies. Design principles and performance for flooding routing mesh topology spread spectrum LANs
771 -- 776Kin Mun Lye, L. Chan, Kee Chaing Chua. Performance of a network protocol processor
777 -- 787Achim Karduck. TeamBuilder: a CSCW tool for identifying expertise and team formation
788 -- 798Jiunn-Jian Li, Cheng-Ming Weng. Self-routing multistage switch with repeated contention resolution algorithm for B-ISDN
799 -- 804Deepak Cherian, Ravi Mittal. Analysis of 1-ROR networks
805 -- 808Chu-Hsing Lin, Chin-Chen Chang. Method for constructing a group-oriented cipher system
809 -- 812Harold Lorin. The economics of astonishing counter-example

Volume 17, Issue 10

690 -- 0Ahmed N. Tantawy. Editorial
691 -- 698Stephen S. Yau, Doo-Hwan Bae. Object-oriented and functional software design for distributed real-time systems
699 -- 707K. H. (Kane) Kim. Fair distribution of concerns in design and evaluation of fault-tolerant distributed computer systems
708 -- 716Amr El-Kadi. Tap processes
717 -- 728Volker Tschammer, Thomas Magedanz, Michael Tschichholz, Adam Wolisz. Cooperative management in open distributed systems
729 -- 738Dominique Gaïti. Introducing intelligence in distributed systems management
739 -- 749Clemens A. Szyperski, Giorgio Ventre. Guaranteed quality of service for efficient multiparty communication
750 -- 757Seung-Woo Seo, Tse-Yun Feng. Modified composite Banyan network with an enhanced terminal reliability

Volume 17, Issue 1

7 -- 16Goopeel Chung, Kevin Jeffay, Hussein M. Abdel-Wahab. Dynamic participation in a computer-based conferencing system
17 -- 24Jeremiah F. Hayes, F. Ayadi. Performance calculation for an optical MAN
25 -- 34J. K. Roussos, E. G. Economou, George Philokyprou. Congestion control protocols for interconnected LANs supporting voice and data traffic
35 -- 45R. M. Watson, S. Ward. Prioritization in FDDI networks
46 -- 52Alfred C. Weaver. The Xpress Transfer Protocol
53 -- 66Yusheng Liu, Doan B. Hoang. OSI RPC model and protocol
67 -- 71Randy L. Borchardt, Tri T. Ha. Capture Aloha with two random power levels