researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computer Communications
Home
Index
Info
Volume
Volume
17
, Issue
9
626
--
636
Christopher Ward
,
Sujata Mitra
,
Thomas M. Phillips
.
Throughput efficiency of an enhanced link management procedure
637
--
646
Fabrice Guillemin
,
Wei Monin
.
Analysis of cell clumping caused by ATM network GFC protocols
647
--
656
Samir M. Koriem
,
Lalit M. Patnaik
.
Performance of the node/link behaviour of multicomputer networks with input buffer limiting and channel contention
657
--
662
Efstathios D. Sykas
,
Konstantinos M. Vlakos
,
Ioannis Ch. Paschalidis
,
Georgia Mourtzinou
.
Congestion avoidance for ATM networks
663
--
673
George M. Stamatelos
,
Jeremiah F. Hayes
.
Admission-control techniques with application to broadband networks
674
--
676
Ming-Yung Ko
,
Tzonelih Hwang
,
Chin-Chen Chang
.
Attacks on an ID-based signature scheme based on Rabin s public key cryptosystem
677
--
683
G. F. Zhao
,
K. M. Lye
.
Synchronization protocol for high quality and single-point playout multimedia applications
Volume
17
, Issue
8
563
--
570
K. E. Mourelatou
,
Anastasios T. Bouloutas
,
Miltiades E. Anagnostou
.
An approach to identifying QoS problems
571
--
580
Dong Geun Jeong
,
Chong-Ho Choi
,
Wha Sook Jeon
.
Adaptive bandwidth waste rate: a fair bandwidth sharing scheme for the DQ protocol with multiple priority classes
581
--
588
Lek Heng Ngoh
,
Aurel A. Lazar
.
Design and implementation of a manageable B-ISDN host interface
589
--
599
Ahmed E. Kamal
,
Hossam S. Hassanein
.
Analysis of collision-avoidance star LANs
600
--
610
Lakshmana N. Kumar
,
Christos Douligeris
,
George Develekos
.
Implementation of a decentralized Pareto optimal algorithm
611
--
618
Richard Cardinali
,
Daniel Hunt
.
Growth and implications of network systems: technological and legislative issues
Volume
17
, Issue
7
451
--
452
Sead Muftic
.
Editorial
453
--
457
Dorothy E. Denning
.
The US key escrow encryption technology
458
--
465
Rainer A. Rueppel
,
Paul C. van Oorschot
.
Modern key agreement techniques
466
--
475
Thomas Beth
,
Fritz Bauspieß
,
Hans-Joachim Knobloch
,
Steffen Stempel
.
TESS: A security system based on discrete exponentiation
476
--
482
Per Kaijser
.
Security protection for parts of a data structure
483
--
491
John Linn
.
Generic interface to security services
492
--
500
Sead Muftic
,
Morris Sloman
.
Security architecture for distributed systems
501
--
518
Per Kaijser
,
Tom Parker
,
Denis Pinkas
.
SESAME: The solution to security for open distributed systems
519
--
531
Peter T. Kirstein
,
Peter Williams
.
Piloting authentication and security services in the PASSWORD project
538
--
543
Stephan Lechner
.
SAMSON: Management of security in open systems
544
--
553
Ahmed Patel
.
Security management for OSI networks
Volume
17
, Issue
6
387
--
395
A. S. Andreatos
,
Emmanuel N. Protonotarios
.
Receiver synchronization of a packet video communication system
396
--
406
Nen-Fu Huang
,
Chung-Ching Chiou
.
Reservation scheme for CRMA high-speed networks
407
--
418
Salvatore Casale
,
Vincenzo Catania
,
Aurelio La Corte
.
Service integration issues on an ATM DQDB MAN
419
--
427
A. Chockalingam
,
Pallapa Venkataram
,
A. Prabhakar
.
Throughput-delay characteristics of OCUM protocol for media access in multihop wireless networks with buffers
428
--
438
George D. Stamoulis
,
Miltiades E. Anagnostou
,
A. D. Georgantas
.
Traffic source models for ATM networks: a survey
439
--
442
Jorge Santos
,
M. L. Gastaminza
,
Javier Orozco
,
C. Matrangolo
.
802.5 priority mechanism in hard real-time RMS applications
Volume
17
, Issue
5
307
--
316
Hasan Pirkul
,
Ali Amiri
.
Routing in packet-switched communication networks
317
--
331
J. E. Cooling
.
Survivable LANs for distributed control systems
332
--
338
Tien-Yu Huang
,
Jean-Lien C. Wu
.
Priority promotion DQDB networks to improve fairness
339
--
347
John A. Robinson
.
Communications services architecture for CSCW
348
--
362
Jeong-Ky Min
.
Performance of end-to-end flow control in LAN/WAN interconnection
363
--
368
Kin Mun Lye
,
G. Y. Loo
,
Kee Chaing Chua
,
Winston Khoon Guan Seah
.
Adaptive self-stabilizing connection control scheme for server-based networks
369
--
374
Marion J. Dearlove
.
The adoption of electronic trading in Western Europe
Volume
17
, Issue
4
242
--
250
J. K. Roussos
,
E. G. Economou
,
Panagiotis Georgiadis
.
Congestion avoidance in high speed interconnected voice data traffic LANs
251
--
256
Koon-Seng Lim
,
Robert H. Deng
,
Kisenchand Ranai
.
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems
257
--
270
Son T. Vuong
,
H. Janssen
,
Y. Lu
,
C. Mathieson
,
B. Do
.
TESTGEN: An environment for protocol test suite generation and selection
271
--
276
Jean-Lien C. Wu
,
Tien-Yu Huang
.
Delay analysis of a dual-bus LAN with reservation
277
--
287
Adelino Santos
,
Bernhard Tritsch
.
Cooperative multimedia editing tool for enhanced group communication
288
--
296
W. S. Chung
,
C. K. Un
,
B. C. Shin
.
Analysis of delay bounds of a tree protocol with collision detection
299
--
300
Gilbert M. Lundy
.
1st International Conference on Network Protocols
Volume
17
, Issue
3
146
--
147
Gee-Swee Poo
.
Editorial
148
--
155
Wai Lung Loh
,
Gee-Swee Poo
.
Object-oriented modelling and specification of the X.400 mail system
156
--
171
Michael Sample
,
Gerald W. Neufeld
.
High-performance ASN.1 compiler
172
--
188
Richard Lai
,
Ajin Jirachiefpattana
.
Verification of ISO ACSE protocol specified in Estelle
189
--
204
Sujata Banerjee
,
Victor O. K. Li
,
Chihping Wang
.
Performance analysis of the send-on-demand: A distributed database concurrency control protocol for high-speed networks
205
--
217
Raj Yavatkar
,
Leelanivas Manoj
.
End-to-end approach to large-scale multimedia dissemination
218
--
229
Y. Ni
,
Andrzej M. Goscinski
.
Trader cooperation to enable object sharing among users of homogeneous distributed systems
230
--
238
Thomas Hardjono
,
Tadashi Ohta
.
Secure end-to-end delegations in distributed systems
Volume
17
, Issue
2
83
--
93
Koon-Seng Lim
,
Robert Huijie Deng
,
Kisenchand Ranai
.
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems
94
--
102
Sridhar Narasimhan
.
Locating concentrators in a computer network with multiple coverage for terminals
103
--
118
Ahmed Patel
,
Paul Gardiner
.
A Database Handler (DBH) for broadband network administration
119
--
132
Neil Williams
,
Gordon S. Blair
.
Distributed multimedia applications: A review
133
--
138
K. C. Chua
,
S. Guo
.
Simulation of a TDM-like protocol for Gbit/s MANs
141
--
142
B. W. Marsden
.
Authoritative and up to date book
141
--
0
Ray Hunt
.
Useful tutorial on OSI applications
Volume
17
, Issue
12
826
--
835
Saewoong Bahk
,
Magda El Zarki
.
Congestion control based dynamic routing in ATM networks
836
--
842
R. Clark Robertson
,
Tri T. Ha
.
Effect of capture on throughput of variable length packet Aloha systems
843
--
851
Sameer M. Bataineh
,
Mohammad Al-Ibrahim
.
Effect of fault tolerance and communication delay on response time in a multiprocessor system with a bus topology
852
--
862
G. J. Lu
,
H. K. Pung
,
T. S. Chua
,
S. F. Chan
.
Temporal synchronization support for distributed multimedia information systems
863
--
870
Kassem Saleh
,
Hasan Ural
,
Anjali Agarwal
.
Modified distributed snapshots algorithm for protocol stabilization
871
--
875
Debashis Saha
,
Amitava Mukherjee
,
Sourav K. Dutta
.
Capacity assignment in computer communication networks with unreliable links
876
--
885
Damjan Zazula
.
EDIpro - an integrated environment for electronic data interchange
Volume
17
, Issue
11
762
--
770
Theodoros Mastichiadis
,
Eleftheris Economou
,
Anthony Davies
.
Design principles and performance for flooding routing mesh topology spread spectrum LANs
771
--
776
Kin Mun Lye
,
L. Chan
,
Kee Chaing Chua
.
Performance of a network protocol processor
777
--
787
Achim Karduck
.
TeamBuilder: a CSCW tool for identifying expertise and team formation
788
--
798
Jiunn-Jian Li
,
Cheng-Ming Weng
.
Self-routing multistage switch with repeated contention resolution algorithm for B-ISDN
799
--
804
Deepak Cherian
,
Ravi Mittal
.
Analysis of 1-ROR networks
805
--
808
Chu-Hsing Lin
,
Chin-Chen Chang
.
Method for constructing a group-oriented cipher system
809
--
812
Harold Lorin
.
The economics of astonishing counter-example
Volume
17
, Issue
10
690
--
0
Ahmed N. Tantawy
.
Editorial
691
--
698
Stephen S. Yau
,
Doo-Hwan Bae
.
Object-oriented and functional software design for distributed real-time systems
699
--
707
K. H. (Kane) Kim
.
Fair distribution of concerns in design and evaluation of fault-tolerant distributed computer systems
708
--
716
Amr El-Kadi
.
Tap processes
717
--
728
Volker Tschammer
,
Thomas Magedanz
,
Michael Tschichholz
,
Adam Wolisz
.
Cooperative management in open distributed systems
729
--
738
Dominique Gaïti
.
Introducing intelligence in distributed systems management
739
--
749
Clemens A. Szyperski
,
Giorgio Ventre
.
Guaranteed quality of service for efficient multiparty communication
750
--
757
Seung-Woo Seo
,
Tse-Yun Feng
.
Modified composite Banyan network with an enhanced terminal reliability
Volume
17
, Issue
1
7
--
16
Goopeel Chung
,
Kevin Jeffay
,
Hussein M. Abdel-Wahab
.
Dynamic participation in a computer-based conferencing system
17
--
24
Jeremiah F. Hayes
,
F. Ayadi
.
Performance calculation for an optical MAN
25
--
34
J. K. Roussos
,
E. G. Economou
,
George Philokyprou
.
Congestion control protocols for interconnected LANs supporting voice and data traffic
35
--
45
R. M. Watson
,
S. Ward
.
Prioritization in FDDI networks
46
--
52
Alfred C. Weaver
.
The Xpress Transfer Protocol
53
--
66
Yusheng Liu
,
Doan B. Hoang
.
OSI RPC model and protocol
67
--
71
Randy L. Borchardt
,
Tri T. Ha
.
Capture Aloha with two random power levels