Journal: Computer Communications

Volume 18, Issue 9

591 -- 599T. Burrage, S. Ward. Adaptive priority timer control of the SAE LTPB for fair prioritization in military avionics networks
600 -- 608Jean Lambert, Béatrice Stéphan. Modelling network profiles
609 -- 619Wen-Huei Chen, Chuan Yi Tang, Son T. Vuong. Improving the UIOv-method for protocol conformance testing
620 -- 630Craig E. Wills, David Finkel. Scalable approaches to load sharing in the presence of multicasting
631 -- 644Raed Y. Awdeh, Hussein T. Mouftah. MS4 - a high performance output buffering ATM switch
645 -- 653Philippe A. Janson, Gene Tsudik. Secure and minimal protocols for authenticated key distribution
654 -- 656Tzong-Chen Wu, Tzong-Sun Wu. Group commitment protocol based on zero knowledge proofs
657 -- 662Constantine Katsinis, Amelie Constant. Bandwidth allocation in wide-band communication networks under two types of priorities
663 -- 668Ruey-yih Lin, Chyan Yang. Link enhancement using constrained range and reduced candidate set searches: a revision
669 -- 681Toong Shoon Chan, Ian Gorton. HTPNET: a high performance transport protocol
682 -- 683Aloknath De, N. Prithviraj. Comments on Analysis of 1-ROR networks
687 -- 688Rita Puzmanova. LAN times encyclopedia of networking: By T Sheldon, McGraw-Hill, New York, 1994, 39.95, 1006 pp, ISBN 0-07-881965-2
687 -- 0Krishna M. Sivalingam. Asynchronous transfer mode networks: Performance issues: By R Onvural, Artech House, London, 1994, 254 pp

Volume 18, Issue 8

527 -- 536Mete Kabatepe, Kenneth S. Vastola. Bandwidth allocation in fair distributed queue (FDQ) networks
537 -- 544Raffaele Bolla, Franco Davoli. Call admission control and bandwidth allocation in a multiservice DQDB network
545 -- 551Shuoh-Ren Tsai, Tein-Hsiang Lin, Chunming Qiao. Bandwidth allocation for isochronous connections in DQDB using the PA scheme
552 -- 562Oran Sharon, Adrian Segall. The parallel D-Net
563 -- 571W. Melody Moh, Min-Jia Chen, Nui-Ming Chu, Cherng-Der Liao. Traffic prediction and dynamic bandwidth allocation over ATM: a neural network approach
572 -- 581Bo Li. Bandwidth management for high speed LANs using wavelength division multiplexing

Volume 18, Issue 7

463 -- 474Shao-kong Kao, Biswanath Mukherjee. Image transmission on the DQDB network
475 -- 485H. K. Wang, Jean-Lien C. Wu. Object model for hypermedia applications
486 -- 492Jung-Shyr Wu, Fang-Jang Kuo, Jin-Fu Chang. Traffic control at terminal equipment in ATM networks using cryptographic techniques
493 -- 506Piyu Tripathy, Behçet Sarikaya. Analysis and representation of test cases generated from LOTOS
507 -- 511Debashis Saha, Amitava Mukherjee. Computational analysis of an optimal routing strategy in a hierarchical computer communication network
512 -- 518Alexander Schill, Markus U. Mock. Client/server approach versus distributed object-oriented computing on top of OSF DCE

Volume 18, Issue 6

407 -- 0Laurie G. Cuthbert. Electronic Document Delivery
408 -- 417H. Kilov, Laurie G. Cuthbert. A Model for Document Management
418 -- 422J. Knight, Cliff McKnight. Project ELVYN: Implementing an Electronic Journal
423 -- 428C. Green. From Paper to CD-ROM Documentation
429 -- 434Aviel D. Rubin. Secure Distribution of Electronic Documents in a Hostile Environment
435 -- 446K. L. Wandryk. The Benefits of Using Electronic Document Software
447 -- 457Craig M. Parker, Paula M. C. Swatman. The TREAT Laboratory: Comparing an Electronic Commerce Experiment at Curtin and Monash Universities

Volume 18, Issue 5

315 -- 328K. P. Kontovassilis, J. T. Tsiligaridis, George I. Stassinopoulos. Buffer Dimensioning for Delay- and Loss-Sensitive Traffic
329 -- 337T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman. On Testing and Diagnosis of Communication Protocols Based on the FSM Model
338 -- 344Andrzej R. Pach, Sergio Palazzo, Daniela Panno. Delay Analysis of DQDB Networks with Slot Preuse and Reuse
345 -- 356R. C. Betini, Hisao Kameda, Kentaro Shimizu. Flow Control and Routing Algorithms in WAPSN
357 -- 366Nen-Fu Huang, Gin-Kou Ma, Yi-Jang Wu. Hot-Spot Spanning Tree Algorithm for a Bridged LAN/MAN
367 -- 377C.-Y. Lee. Application of a Cross Decomposition Algorithm to a Location and Allocation Problem in Distributed Systems
378 -- 383Debanjan Saha, Amitava Mukherjee. Design of Hierarchical Communication Networks Under Node/Link Failure Constraints
384 -- 391Debanjan Saha. Verifying the Progress Properties of a Heterogeneous Protocol System in an Internetworking Environment
392 -- 396C. Hirsch, L. Rojas. Internal Communications in a Multiprocessor ISDN PBX

Volume 18, Issue 4

227 -- 246K. Poon. Inside a Trader in Global Trading
252 -- 261S. S. Alwakeel, Mohammad Ilyas. Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network
262 -- 275Andreas Cramer, Richard Hofmann, Norbert Luttenberger. Performance Measurements on the Heidelberg Audio/Video Distribution System: Methodology and Results
276 -- 287Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal. Recovery Approach to the Design of Stabilizing Communication Protocols
288 -- 299Christos Douligeris, Lakshmana N. Kumar. Fairness Issues in the Networking Environment
300 -- 309Dieter Baum, Luciano Lenzini. Performance Analysis of SDN-Specific Error Recovery Procedures: Comparison of Step-by-Step and End-to-End Schemes

Volume 18, Issue 3

131 -- 132Thomas D. C. Little. Multimedia Storage Servers - Introduction
133 -- 144Ralf Steinmetz. Multimedia File Systems Survey: Approaches for Continuous Media Disk Scheduling
145 -- 159Jonathan C. L. Liu, David Hung-Chang Du, James A. Schnepf. Supporting Random Access on Real-Time Retrieval of Digital Continuous Media
160 -- 169Tom Pfeifer, A. Blobelt. Local Storage Systems for Continuous Data with Heterogeneous Timing Requirements
170 -- 184Shahram Ghandeharizadeh, Ali E. Dashti, Cyrus Shahabi. Pipelining Mechanism to Minimize the Latency Time in Hierarchical Multimedia Storage Managers
185 -- 191M. Seo, Chee-Ha Kim. Allocation Strategies of Multimedia Data on Disk Arrays
192 -- 203Harrick M. Vin, Alok Goyal, Pawan Goyal. Algorithms for Designing Multimedia Servers
204 -- 216Christos H. Papadimitriou, Srinivas Ramanathan, P. Venkat Rangan, Srihari Sampath Kumar. Multimedia Information Caching for Personalized Video-on-Demand
220 -- 0R. Clark Robertson, Tri T. Ha, D. V. Banh. Effect of Capture on Throughput of Variable Length Packet Aloha Systems

Volume 18, Issue 2

69 -- 78Magdalena Feldhoffer. Model for Flexible Configuration of Application-Oriented Communication Services
79 -- 88Luis Orozco-Barbosa, Na el Hirzalla. Share-Based Congestion Control Scheme for Systems of Interconnected Networks
89 -- 102Eckhard Moeller, Sanjay Manandhar, Luc Neumann, Johannes Rückert, Gerd Schürmann, Susan Thomas, Frieder Wolf. The BERKOM Multimedia-Mail Teleservice
103 -- 112C. K. Chirchir, Ahmed E. Kamal. The Leaky Window: A Flow and Congestion Control Technique for HS-WANs
113 -- 122T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman. Fault Detection and Diagnosis Capabilities of Test Sequence Selection Methods Based on the FSM Model

Volume 18, Issue 12

871 -- 879Giuseppe Anastasi, Marco Conti, Enrico Gregori, Luciano Lenzini. Real-time applications in a CRMA network: a performance analysis
880 -- 888Jae-Hwoon Lee, Chong Kwan Un. Asynchronous reservation protocol for variable-sized messages in a WDM-based local network
889 -- 895Reinhard Baier, Eckhard Moeller, Angela Scheller. ODA implementation for multimedia teleservices
896 -- 910Lakshmana N. Kumar, Andreas D. Bovopoulos. Access protection solution for heavy load unfairness in DQDB
911 -- 920Ali Rezaki, Hasan Ural. Construction of checking sequences based on characterization sets
921 -- 928Denis Trcek, Borka Jerman-Blazic. Formal language for security services base modelling and analysis
929 -- 935Ji-Horng Liaw, Cheng-Ming Weng. Modular multicast ATM switching architecture
936 -- 942Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen. Remote scheme for password authentication based on theory of quadratic residues
943 -- 948Özgür Ulusoy. Network access protocol for hard real-time communication systems
949 -- 958Ioannis E. Pountourakis, Efstathios D. Sykas, Emmanuel N. Protonotarios. Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol
959 -- 963Tzong-Chen Wu. Remote login authentication scheme based on a geometric approach
964 -- 977Howard Bowman, Gordon S. Blair, Lynne Blair, Amanda G. Chetwynd. Formal description of distributed multimedia systems: an assessment of potential techniques
978 -- 981Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko. On the security of Wu and Yeh s conference key distribution system
982 -- 987Kee Chaing Chua, W. M. Tan, Kin Mun Lye. Performance of PRMA in a mobile radio channel
988 -- 992Kwok-Yan Lam. Replay tolerance of authentication protocols
993 -- 996Yung-Hsiang Chen, Tzonelih Hwang. ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer

Volume 18, Issue 11

791 -- 792Peter Schoo. Beyond intelligent networks
802 -- 806Armin Fricke. Market requirements and the functionality of intelligent networks
807 -- 815Kai Jakobs. Future (data) communication networks - the challenge to (public) service providers
816 -- 824Raúl Gutiérrez, Jørgen Nørgaard, Kjell Randsted. IN and beyond: two approaches to the evolution of INs
825 -- 837Martin D. Chapman, Hendrik Berndt, Nicola Gatti 0002. Software architecture for the future information market
838 -- 848Sebastiano Trigila, Alvin P. Mullery, Mário Campolargo, June Hunt. Service architectures and service creation for integrated broadband communications
849 -- 862Jean-Bernard Stefani. Open distributed processing: an architectural basis for information networks

Volume 18, Issue 10

695 -- 708Bala Rajagopalan. Membership protocols for distributed conference control
709 -- 717Wu-chi Feng, Stuart Sechrest. Critical bandwidth allocation for the delivery of compressed video
718 -- 724Jau-Hsiung Huang, Piau-Chuo Tsao. Continuous framing mechanism for congestion control in broadband networks
725 -- 741James C. Yee, Pravin Varaiya. Models and performance of real-time disk access policies
742 -- 754Srinivas Ramanathan, P. Venkat Rangan, Harrick M. Vin, Srihari Sampath Kumar. Enforcing application-level QoS by frame-induced packet discarding in video communications
755 -- 768Sanjeev Rampal, Douglas S. Reeves. Routing and admission control algorithms for multimedia traffic
769 -- 781Hui Zhang. Providing end-to-end performance guarantees using non-work-conserving disciplines

Volume 18, Issue 1

4 -- 14Thomas Meuser. Performance Comparison of Media Access Protocols for Gbit/s Networks in the Local Area
15 -- 23Marco Conti, Enrico Gregori, Luciano Lenzini. Estimating the Quality of Service of Token Passing MAC Protocols
24 -- 31Paola Crocetti, Shivi Fotedar, Luigi Fratta, Giorgio Gallassi, Mario Gerla. ATM Virtual Private Network Design Alternatives
32 -- 36Ruixi Yuan. Traffic Pattern Based Mobile Routing Scheme
37 -- 44Milan Kovacevic, Mario Gerla, Joseph A. Bannister. Performance of Shared-Channel Multihop Lightwave Networks
45 -- 47Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih. Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues
48 -- 49Tien-Yu Huang, Jean-Lien C. Wu, I. Bosley, T. Kuchlein, Krzysztof Pawlikowski, A. Stewart. On Priority Promotion DQDB Networks to Improve Fairness
50 -- 51Christopher Ward, Thomas M. Phillips. Throughput Efficiency of an Enhanced Link Management Procedure