Journal: Computer Communications

Volume 22, Issue 9

771 -- 777Ming-Huang Guo, Ruay Shiung Chang. Design issues for multicast ATM switches
778 -- 791Giovanni Fruscio, A. Ishaq, Valentina Petrone. A signalling server prototype for the support of multipoint to multipoint multimedia services
792 -- 802HungKei Keith Chow, Alberto Leon-Garcia. Integrated services internet with RSVP over ATM short cuts: Implementation and performance evaluation
803 -- 810T.-H. Cheng, Y.-K. Sze, Chee Wah Tan. A heuristic algorithm for allocating virtual path bandwidth in an ATM network
811 -- 824Georgios I. Papadimitriou, Amalia N. Miliou, Andreas S. Pomportsis. OCON: an optically controlled optical network
825 -- 839Ahmed E. Kamal, Hossam S. Hassanein. Capacity enhancement of local area bus networks using wavelength division multiplexing
840 -- 848D. Das, S. S. Saini, D. Datta. Performance analysis of computer networks employing linked-cluster topology with single-wavelength and WDM optical backbones
849 -- 857Liren Zhang, Chih-Hong Eyoh, Chee Hock Ng. An ATM cross-connecting node using optical CDMA
858 -- 870Hairong Sun, Xinyu Zang, Kishor S. Trivedi. A stochastic reward net model for performance analysis of prioritized DQDB MAN
871 -- 874Chien-Yuan Chen, T.-C. Liu. A fast modular multiplication method based on the Lempel-Ziv binary tree
875 -- 0Y.-C. Chen. M. Sexton, A. Reid: Broadband networking: ATM, SDH and SONET
876 -- 0D. Saha. Mobile systems. I. Groves (Ed.)
877 -- 878D. Saha. Broadband communications: the future of telecommunications by P. Kuhn & R. Ulrich (Eds.)

Volume 22, Issue 8

697 -- 709Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
710 -- 716Jianying Zhou, Kwok-Yan Lam. Securing digital signatures for non-repudiation
717 -- 722Hung-Min Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers
723 -- 726Wei-Hua He, Tzong-Chen Wu. Cryptanalysis of Lee and Chang s ID-based information security functions
727 -- 729Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang. New generalized group-oriented cryptosystem based on Diffie-Hellman scheme
730 -- 734Narn-Yih Lee, Tzonelih Hwang. Group-oriented undeniable signature schemes with a trusted center
735 -- 738Kaijun Tan, HongWen Zhu. A conference key distribution scheme based on the theory of quadratic residues
739 -- 741B. Zhan, Z. Li, Y. Yang, Z. Hu. On the security of HY-key authentication scheme
742 -- 744Min-Shiang Hwang. Cryptanalysis of a remote login authentication scheme
745 -- 748Hung-Min Sun. On-line multiple secret sharing based on a one-way function
749 -- 754Yuh-Min Tseng, Jinn-ke Jan. Anonymous conference key distribution systems based on the discrete logarithm problem
755 -- 757Kaijun Tan, HongWen Zhu. General secret sharing scheme
758 -- 761Valdemar Cardoso da Rocha Jr., D. L. de Macêdo. A secret-key cipher based on a non-linear structured code
762 -- 765Kaijun Tan, HongWen Zhu, S.-J. Gu. Cheater identification in (::::t, n::::) threshold scheme

Volume 22, Issue 7

597 -- 0Senad Busovaca. Editorial
598 -- 607Yuanyuan Yang 0001. An analytical model for the performance of buffered multicast banyan networks
608 -- 620Dimiter R. Avresky, Vladimir Shurbanov, Robert W. Horst. Optimizing router arbitration in point-to-point networks
621 -- 628S. A. M. Makki. Eulerian tour construction in a distributed environment
629 -- 636Farid G. Hatefi, Forouzan Golshani. A new framework for secure network management
637 -- 643Kia Makki, Niki Pissinou. Efficient detection and resolution of deadlocks in distributed databases
644 -- 650Mohammad S. Obaidat, Jun Teng. A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks
651 -- 666Niki Pissinou, Kia Makki, William J. Campbell. On the design of a location and query management strategy for mobile and wireless environments
667 -- 674Jaihyung Cho, James Breen. Analysis of the performance of dynamic multicast routing algorithms
675 -- 680Jerrold F. Stach, Eun Kyo Park, Kia Makki. Performance of an enhanced GSM protocol supporting non-repudiation of service
681 -- 690Dimiter R. Avresky. Formal verification and testing of protocols

Volume 22, Issue 6

499 -- 515Z. Fan. New trends in ATM networks: a research view
516 -- 522Mahmoud Saleh, Mohammed Atiquzzaman. An accurate performance model of shared buffer ATM switches under hot spot traffic
523 -- 542Gee-Swee Poo, Q. Zeng. Design, implementation and performance study of reliable transactions in X.500 directory service
543 -- 555W. K. Lai, J.-Y. Tsai. A flow control scheme on ATM networks with max-min fairness
556 -- 567Woei Lin, Wen-Shyen E. Chen. Efficient nonblocking multicast communications on baseline networks
568 -- 588K. C. Chua, Y. Z. Li, C. C. Foo. On a Linux implementation of mobile IP and its effects on TCP performance
589 -- 590Rita Puzmanova. Virtual LANs: construction, implementation, and management. New York: John Wiley and Sons, 1997, ISBN 0-471-17732-6, US 39.33, 321 pages: High-speed networking with LAN switches
590 -- 0Tom Pfeifer. Speech technology for telecommunications--BT telecommunication series; Vol. 11; F.A. Westall, R.D. Johnston, A.V. Lewis (Eds.)
591 -- 0Robert H. Deng. Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum

Volume 22, Issue 5

399 -- 410Reuven Cohen. An efficient scheme for accommodating synchronous traffic in a cable-modem network while avoiding segmentation of asynchronous packets
411 -- 418Gung-Chou Lai, Ruay Shiung Chang. Support QoS in IP over ATM
419 -- 431Li-Shen Juhn, Li-Ming Tseng. Achieve high accuracy of network time with proper parameters
432 -- 438Chi-Chun Lo, Shing Hong Chen. A scheduling-based event correlation scheme for fault identification in communications network
439 -- 450Diane Gan, Sati McKenzie. Traffic policing in ATM networks with multimedia traffic: the super leaky bucket
451 -- 462Y. J. Cho. Discrete-time analysis of throughput and response time for LAP derivative protocols under Markovian block-error pattern
463 -- 469R. Radhakrishna Pillai, Su Kwe Long, Jit Biswas, Chen-Khong Tham. Call performance studies on the ATM forum UNI signalling implementations
483 -- 490Chin-Ling Chen, Ruay Shiung Chang. Dynamic priority transmission mechanism for DQDB
491 -- 492Rolf Oppliger. D. B. Parker: Fighting computer crimes: a new framework for protecting information
492 -- 493Jerzy Wechta. B. Haverkort: Performance of computer communication systems
492 -- 0Z. Fan. G. N. Higginbottom: Performance evaluation of communication networks
493 -- 494Tee Hiang Cheng, A. Campbell, Klara Nahrstedt. Building QoS into distributed systems

Volume 22, Issue 4

297 -- 316Neeraj K. Sharma. Review of recent shared memory based ATM switches
317 -- 339Ibrahim W. Habib, Tarek N. Saadawi. Dynamic bandwidth control in ATM networks
340 -- 352Elias Drakopoulos. Enterprise network planning and design: methodology and application
353 -- 360Anirban Roy, Pallapa Venkataram. A multiple access scheme for VBR traffic in broadband wireless local communication
361 -- 375Evangelia Tzifa, Panagiotis Demestichas, Malamati D. Louta, E. S. Tsouka, Michael E. Theologou, Miltiades E. Anagnostou. Adaptive radio spectrum allocation through mid-term reconfigurations for cellular communications systems
376 -- 389Robert Leslie, Sati McKenzie. Evaluation of loadsharing algorithms for heterogeneous distributed systems
390 -- 393Kaijun Tan, HongWen Zhu. Remote password authentication scheme based on cross-product

Volume 22, Issue 3

199 -- 210Giuseppe Ficili, Daniela Panno. A fuzzy algorithm for combined control of traffic parameters: assessment and key issues
211 -- 223Stefan Fischer. Towards the automatic generation of quality-of-service-preserving implementations from formal specifications
224 -- 231W. K. Lai, R. F. Chang. Virtual path layout in ATM networks based on the P-median problem
232 -- 243Gurusamy Mohan, C. Siva Ram Murthy. Efficient algorithms for wavelength rerouting in WDM multi-fiber unidirectional ring networks
244 -- 257K. R. Venugopal, E. Ezhil Rajan, P. Sreenivasa Kumar. Impact of wavelength converters in wavelength routed all-optical networks
258 -- 265Vincenzo Catania, Giuseppe Ficili, Daniela Panno. On the impact of traffic control algorithms on resource management in ATM networks
266 -- 278D. Venkatesulu, Timothy A. Gonsalves. Efficient fault-tolerant reliable broadcast in a multi-switch extended LAN
279 -- 286Wei-Chi Ku, Sheng-De Wang. A secure and practical electronic voting scheme
287 -- 290Narn-Yih Lee, Tzonelih Hwang. On the security of fair blind signature scheme using oblivious transfer
291 -- 292Rita Puzmanova. Daniel Minoli and Andrew Schmidt: Network Layer Switched Services

Volume 22, Issue 2

101 -- 109Jung-Shian Li, Adam Wolisz, Radu Popescu-Zeletin. Measurement and Performance Evaluation of NFS Traffic in ATM Network
110 -- 119Hasan Cam. A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network
120 -- 127Robert M. Hierons. Minimizing the Cost of Fault Location when Testing from a Finite State Machine
128 -- 136Samphel Norden, S. Balaji, G. Manimaran, C. Siva Ram Murthy. Deterministic Protocols for Real-Time Communication in Multiple Access Networks
137 -- 143Yong Lee 0002, JooSeok Song. An Overload Control of SCP in Advanced Intelligent Network with Fairness and Priority
144 -- 155Jhyda Lin, Ruay Shiung Chang. A Comparison of the Internet Multicast Routing Protocols
156 -- 172Debanjan Saha, M. D. Purkayastha, Amitava Mukherjee. An Approach to Wide Area WDM Optical Network Design Using Genetic Algorithm
173 -- 180Sooyong Kang, Heon Young Yeom. Transmission of Video Streams with Constant Bandwidth Allocation
181 -- 192Chor Ping Low. Loop-Free Multicast Routing with End-to-End Delay Constraint
193 -- 194Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun. A Note on Breaking and Repairing a Secure Broadcasting in Large Networks

Volume 22, Issue 18

1628 -- 1632William Donnelly. Managing multiprovider networks
1633 -- 1637Vincent P. Wade. Service management and the telecommunications information networking architecture
1638 -- 1640H. Stewart. Future access network architectures
1641 -- 1643H. Stewart. Delivering broadband to the customer
1644 -- 1651Borka Jerman-Blazic, Lidia Yamamoto, Pascal Drabik, Andrew Hallan. Distributed group collaborative work through the Symmetric TV model

Volume 22, Issue 17

1531 -- 1539Allen Roginsky, Kenneth J. Christensen, V. Srinivasan. New methods for shortest path selection for multimedia traffic with two delay constraints
1540 -- 1548Chi-Chun Lo, Chen-Yu Chiu. A fault-tolerant architecture for ATM networks
1549 -- 1561P. Giannakakis, N. Lepidas, I. Pikrammenos, Iakovos S. Venieris. The broadband bearer connection control protocol: performance driven design and implementation
1562 -- 1573Bruno Gaujal, Nicolas Navet. Traffic shaping in real-time distributed systems: a low-complexity approach
1574 -- 1584Shuo-Yen Robert Li, Hui Li, Gar Man Koo. Fast knockout algorithm for self-route concentration
1585 -- 1591Fang-Jang Kuo, Jung-Shyr Wu, D. L. Keng. Usage parameter control schemes for improving MPEG video quality over ATM networks
1592 -- 1606Min Young Chung, Sang Hyuk Kang, Dan Keun Sung. Performance analysis of two schemes for managing information related to incall registration in wireline UPT networks
1607 -- 1618Takayuki Kushida. An empirical study of the characteristics of Internet traffic
1619 -- 1620Robert M. Hierons. Testing of Communicating Systems, Vol. 10 by Myungchul Kim, Sugwon Kang, Keesoo Hong (Eds.)
1620 -- 0D. Mukhopadhyay. Dictionary of Multimedia and Internet Applications; F. Botto
1621 -- 0Mohammed Atiquzzaman. Introduction to Queuing Networks; E. Gelenbe, G. Pujolle

Volume 22, Issue 15-16

1367 -- 1381Wenge Ren, Kai-Yeung Siu, Hiroshi Suzuki. Excess buffer requirement for EPD schemes in ATM networks
1382 -- 1391Heejune Ahn, Andrea Baiocchi, Jae-kyoon Kim. On the time scales in video traffic characterization for queueing behavior
1392 -- 1399Fei Xiang, Junzhou Luo, Jieyi Wu, Guanqun Gu. QoS routing based on genetic algorithm
1400 -- 1414K. K. Varghese Panicker, C. Siva Ram Murthy, Ravi Mittal. An improved scheme for self-healing in ATM networks
1415 -- 1422T. Kijkanjanarat, H. Jonathan Chao. Fast IP routing lookups for high performance routers
1423 -- 1439Hossam S. Hassanein, Hosam M. F. AboElFotoh, Shatha K. Habra. Dynamic resource-allocation for congestion-control in high-speed LAN Interconnection
1440 -- 1446Seoklae Lee, JooSeok Song. An integrated admission control based on measurements in ATM networks
1447 -- 1456DaeHun Nyang, S. Y. Lim, JooSeok Song. A complete test sequence using cyclic sequence for conformance testing
1457 -- 1467Wai-Chung Poon, Kwok-Tung Lo. The study on statistical multiplexing of homogeneous VBR-MPEG video streams
1468 -- 1480Ioannis E. Pountourakis. A multiwavelength control architecture for electronic processing bottleneck reduction in WDMA lightwave networks
1481 -- 1492K. K. Varghese Panicker, C. Siva Ram Murthy, Ravi Mittal. A new algorithm for virtual path network design in ATM networks
1493 -- 1501Jin-Ru Chen, Yaw-Chung Chen. Pseudo-rate TCP: a congestion avoidance scheme with nearly optimized fairness and throughput
1502 -- 1511Wen-Shenq Juang, Chin-Laung Lei, C. Y. Chang. Anonymous channel and authentication in wireless communications
1512 -- 1525Vijay Varadharajan, Rajan Shankaran, Michael Hitchens. On the design of secure ATM networks
1526 -- 1527Jung-Shian Li. Mobile Agents and Security; G. Vigna (Ed.)
1526 -- 0Jung-Shian Li. LAN testing and troubleshooting; G. Held

Volume 22, Issue 14

1281 -- 1282Mohammed Atiquzzaman. Special Issue: Enterprise Networks
1283 -- 1295Ming Hou, Hussein T. Mouftah. Investigation of premium service using differentiated services IP
1296 -- 1306Mahbub Hassan, Harsha Sirisena, Mohammed Atiquzzaman. A congestion control mechanism for enterprise network traffic over asynchronous transfer mode networks
1307 -- 1320Sonia Fahmy, Raj Jain, Sameh Rabie, Rohit Goyal, Bobby Vandalore. Quality of service for Internet traffic over ATM service categories
1321 -- 1332S. Chatterjee. TCP behavior over HFC cable modem access networks
1333 -- 1342James Won-Ki Hong, Soon-Sun Kwon, Jae-Young Kim. WebTrafMon: Web-based Internet/Intranet network traffic monitoring and analysis system
1343 -- 1350Hairong Sun, Xinyu Zang, Kishor S. Trivedi. The effect of Web caching on network planning
1351 -- 1363Algirdas Pakstas. Towards electronic commerce via science park multi-Extranets

Volume 22, Issue 13

1183 -- 1187Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic. Decentralized group key management for secure multicast communications
1188 -- 1197Ji-Horng Liaw, Cheng-Ming Weng. Two-dimensional shared memory multicast ATM switching architecture
1198 -- 1205J.-K. Chen, Jean-Lien C. Wu. Heuristic batching policies for video-on-demand services
1206 -- 1216Eduardo Tovar, Francisco Vasques. Cycle time properties of the PROFIBUS timed-token protocol
1217 -- 1226Andrea Borella. Linear multicasting in dynamic networks
1227 -- 1233Wei Kuang Lai, Duan Ruei Shiu, Mei Chian Liou, Jiunn-yih Tsai. Fair and reliable hop-by-hop flow control
1234 -- 1246Yaw-Chung Chen, Shuo-Cheng Hu, Chia-Tai Chan, Chun-Liang Lee. Frame-based priority scheduling in hybrid IP/ATM networks
1247 -- 1259Y. H. Long, T. K. Ho, A. B. Rad, Stephen P. S. Lam. A study of the generalised max-min fair rate allocation for ABR control in ATM
1260 -- 1265Sheng-Cheng Yeh, Jung-Shyr Wu, Y. C. Liang. Dynamic accommodation of the permission probability over the joint voice/data frame reservation multiple access
1266 -- 1273C.-H. Ng, Lihua Yuan, W. Fu, L. Zhang. Methodology for traffic modeling using two-state Markov-modulated Bernoulli process
1274 -- 0Tom Pfeifer. Optical Fiber Communication Systems, L.G. Kazovsky, S. Benedetto, A.E. Willner (Eds.)
1274 -- 1275Jianying Zhou. Computer Security; D. Gollmann
1275 -- 0R.-S. Chang. Future codes: essays in advanced computer technology and the law; C.E.A. Karnow

Volume 22, Issue 12

1085 -- 1103Sonia Fahmy, Raj Jain, Rohit Goyal, Bobby Vandalore, Shivkumar Kalyanaraman. Design and evaluation of feedback consolidation for ABR point-to-multipoint connections in ATM networks
1104 -- 1110Tomaz Klobucar, Borka Jerman-Blazic. A formalisation and evaluation of certificate policies
1111 -- 1122Liren Zhang, Kee Way Ng, Chee Hock Ng, K. R. Subramanian. Incorporating priority scheme in IPv6 over ATM networks
1123 -- 1126G. Mueller, P. Sanders, J. Allen. Traffic profiles and application signatures
1127 -- 1135N. Swaminathan, Jagannathan Srinivasan, S. V. Raghavan. Bandwidth-demand prediction in virtual path in ATM networks using genetic algorithms
1136 -- 1149L. Yihong, T. K. Ho, A. B. Rad, Stephen P. S. Lam. A Sigma GI::i::/D/1/:::infinity::: queue with heterogeneous input/output slot times
1150 -- 1159Ki-Ho Cho, Hyunsoo Yoon. Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees
1160 -- 1164Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee. Conference key distribution schemes for portable communication systems
1165 -- 1170Rolf Oppliger. Security issues related to mobile code and agent-based systems
1171 -- 1172Xiang Fu. Signaling in ATM networks; by R. Onvural, R. Cherukuri (Eds.)
1171 -- 0Xiang Fu. Broadband Access Network; by L.A. Ims
1173 -- 0Chi-Chun Lo. Building and managing virtual private network; by D. Kosiur
1173 -- 0L. Zhang. Intelligent Broadband Networks; by I. Venieris, H. Hussmann

Volume 22, Issue 11

987 -- 988Gee-Swee Poo, Andrzej M. Goscinski. Introduction to special issue on network-based parallel and distributed computing
989 -- 997Amnon Barak, Ilia Gilderman, Igor Metrik. Performance of the communication layers of TCP/IP with the Myrinet gigabit LAN
998 -- 1016Andrzej M. Goscinski. Finding, expressing and managing parallelism in programs executed on clusters of workstations
1017 -- 1033Shiping Chen, Jingling Xue. Partitioning and scheduling loops on NOWs
1034 -- 1044Micah Beck, Henri Casanova, Jack Dongarra, Terry Moore, James S. Plank, Francine Berman, Richard Wolski. Logistical quality of service in NetSolve
1045 -- 1055Peter J. Keleher. Update protocols and cluster-based shared memory
1056 -- 1067Wanlei Zhou. Detecting and tolerating failures in a loosely integrated heterogeneous database system
1068 -- 1079Wanlei Zhu, Tyng-Yeu Liang, Ce-Kuen Shieh. A Hopfield neural network based task mapping method

Volume 22, Issue 10

885 -- 897B. Harris, R. Hunt. TCP/IP security threats and attack methods
898 -- 906Cheng-Shong Wu, Shi-Wei Lee. Backup VP planning for multicast connections in ATM networks
907 -- 918Q. Wu, Thierry Divoux, Francis Lepage. Integrating multimedia communications into an MMS environment
919 -- 929Israel Cidon, Raphael Rom, Yuval Shavitt. Bandwidth reservation for bursty traffic in the presence of resource availability uncertainty
930 -- 941Joseph Kee-Yin Ng, Victor C. S. Lee. Transmitting real-time VBR traffic with QoS control in a timed token medium access control network
942 -- 954G. K. Mamais, George A. Politis, Iakovos S. Venieris. Design and implementation of a broadband intelligent peripheral
955 -- 965Jerzy Wechta, Armin Eberlein, Fred Halsall. The impact of topology and choice of TCP window size on the performance of switched LANs
966 -- 979Tong Shan, Oliver W. W. Yang. An efficient admission control scheme for the real-time VBR traffic in the ATM network: deterministic bandwidth allocation
980 -- 0Hairong Sun. Performance Modelling with Deterministic and Stochastic Petri Nets; C. Lindemann (Ed.)
980 -- 0Georgios I. Papadimitriou, Andreas S. Pomportsis. Optical network design and modelling, by H.R. van As, A. Jukan (Eds.)
981 -- 0Yonghuan Cao, Hairong Sun. Quality of service: delivering QoS on the internet and in corporate networks; P. Ferguson, G. Huston

Volume 22, Issue 1

1 -- 10Sheng-Tzong Cheng. Backtrack Routing and Priority-Based Wavelength Assignment in WDM Networks
11 -- 19Georgios I. Papadimitriou. Centralized Packet Filtering Protocols: A New Family of MAC Protocols for WDM Star Networks
20 -- 29Periklis Tsingotjidis, Jeremiah F. Hayes. Proactive Congestion Controls for the Support of Variable Bit Rate Services on Broadband satellite Networks - A Feasibility Study
30 -- 39Nada Golmie, Mark D. Corner, Jörg Liebeherr, David H. Su. ATM Traffic Control in Hybrid Fiber-Coax Networks - Problems and Solutions
40 -- 45Xinyu Wang, James S. Meditch. Adaptive Wavelet Predictor to Improve Bandwidth Allocation Efficiency of VBR Video Traffic
46 -- 55Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu. Optimal Assignment of Mobile Agents for Software Authorization and Protection
56 -- 72Jau-Hsiung Huang, Chun-Chuan Yang, Nai-Cheng Fang. A Novel Congestion Control Mechanism for Multicast Real-Time Connections
73 -- 86W.-S. Juang, C.-L. Lei. Partially Blind Threshold signatures Based on Discrete Logarithm
87 -- 89Narn-Yih Lee, Tzonelih Hwang. Comments on Dynamic Key Management Schemes for Access control in a Hierarchy