Journal: Computer Communications

Volume 23, Issue 9

783 -- 792Georgios I. Papadimitriou, Andreas S. Pomportsis. On the use of learning automata in medium access control of single-hop lightwave networks
793 -- 801Euihoon Jeong, Ara R. Khil, Myung-Kyun Kim, Seung Ryoul Maeng. Dynamic code reservation multiple access for supporting various-bit-rate integrated traffics in slotted DS-CDMA systems
802 -- 815Doan B. Hoang, Zheng Wang. Performance of TCP applications over ATM networks with ABR and UBR services - a simulation analysis
816 -- 824Loren Schwiebert, Raghunath Chintalapati. Improved fault recovery for core based trees
825 -- 834Shaowen Song. A real-time residential gateway operating system
835 -- 847Nasir Ghani. TCP ACK Pacing in ATM networks
848 -- 862Chor Ping Low, Y.-J. Lee. Distributed multicast routing, with end-to-end delay and delay variation constraints
863 -- 870SuKyoung Lee, JooSeok Song. An adaptive call admission control in ATM networks using optimized measurements windows
871 -- 872Xinjie Chang. Queueing Networks - Customers, Signals and Product Form Solutions, : X. Chao, M. Miyazawa, M. Pinedo
871 -- 0Hartmut Weik. Understanding Modern Telecommunications and the Information Superhighway: J.G. Nellist, E.M. Gilbert

Volume 23, Issue 8

705 -- 707Thomas Magedanz, Ahmed Karmouch. Mobile Software Agents for Telecommunication Applications
708 -- 719Antonio Puliafito, Orazio Tomarchio. Using mobile agents to implement flexible network management strategies
720 -- 730Damianos Gavalas, Dominic P. A. Greenwood, Mohammed Ghanbari, Mike O Mahony. Advanced network monitoring applications based on mobile/intelligent agent technology
731 -- 739Fotis G. Chatzipapadopoulos, Giovanna De Zen, Thomas Magedanz, Iakovos S. Venieris, Fabrizio Zizza. Harmonised Internet and PSTN service provisioning
740 -- 753Jinrong Tang, Tony White, Bernard Pagurek, Roch H. Glitho. Advanced service architecture for H.323 Internet Protocol Telephony
754 -- 760Peyman Farjami, Carmelita Görg, Frank Bell. Advanced service provisioning based on mobile agents
761 -- 768Nobuo Kawaguchi, Katsuhiko Toyama, Yasuyoshi Inagaki. MAGNET: ad hoc network system based on mobile agents
769 -- 778Luís Moura Silva, Guilherme Soares, Paulo Martins, Victor Batista, Luís Santos. Comparing the performance of mobile agent systems: a study of benchmarking

Volume 23, Issue 7

609 -- 627Hasan Ural, Kassem Saleh, Alan W. Williams. Test generation based on control and data dependencies within system specifications in SDL
628 -- 641Clay Shields, Jose Joaquin Garcia-Luna-Aceves. HIP - a protocol for hierarchical multicast routing
642 -- 652Ousmane Koné, Richard Castanet. Test generation for interworking systems
653 -- 666Yih Huang, Philip K. McKinley. Group leader election under link-state routing
667 -- 679Hans De Neve, Piet Van Mieghem. TAMCRA: a tunable accuracy multiple constraints routing algorithm
680 -- 694Wei Kuang Lai, Kuo-Her Lin. Reducing the protocol overheads of LANE in the MPOA protocol
695 -- 0W. Frohberg. Remote Access Networks and Services: Oliver C. Ibe (Ed.)
695 -- 696A. Wong. Intelligent Software Agents: W. Brenner, R. Zarnekow, H. Wittig
696 -- 0A. Wong. Mobile Processing in Distributed and Open Environments: P. Sapaty
696 -- 0Hartmut Weik. Networked Futures: W. S. Whyte
696 -- 697Runtao Qu. Charging Communication Networks: D.J. Songhurst

Volume 23, Issue 5-6

439 -- 440Amitava Mukherjee, Debashis Saha, Sajal K. Das, Somprakash Bandyopadhyay. Recent advances in mobile communication networks
441 -- 451András Gergely Valkó, Andrew T. Campbell. An efficiency limit of cellular mobile systems
452 -- 461Yongbing Zhang, Sajal K. Das. An efficient load-balancing algorithm based on a two-threshold cell selection scheme in mobile cellular networks
462 -- 475John G. Markoulidakis, J. E. Dermitzakis, George L. Lyberopoulos, Michael E. Theologou. Optimal system capacity in handover prioritised schemes in cellular mobile telecommunication systems
476 -- 482Phone Lin, Jason Yi-Bing Lin. Channel assignment for GSM half-rate and full-rate traffic
483 -- 498Kok Yong Lim, Mohan Kumar, Sajal K. Das. Message ring-based channel reallocation for cellular wireless networks
499 -- 510Liren Zhang, Xun Cheng, K. R. Subramanian. The admission control for integrated video-conferencing/voice/data services in broadband CDMA networks
511 -- 524Kuang-Hung Pan, Hsiao-Kuang Wu, Rung-Ji Shang, Feipei Lai. Performance analysis of broadcast in mobile ad hoc networks with synchronized and non-synchronized reception
525 -- 532Steven Lombardi, Weihua Zhuang. Soft handoff in a CDMA wireless ATM environment
533 -- 549Alexandros Kaloxylos, Evangelos Zervas, Lazaros F. Merakos. Location management in wireless ATM customer premises networks
550 -- 560Bong-sue Suh, Jin Seek Choi, Jae-kyoon Kim. Design and performance analysis of hierarchical location management strategies for wireless mobile communication systems
561 -- 574Govind Krishnamurthi, Stefano Chessa, Arun K. Somani. Fast recovery from database/link failures in mobile networks
575 -- 587Colin Boyd, Anish Mathuria. Key establishment protocols for secure mobile communications: a critical survey
588 -- 594Aura Ganz, Se Hyun Park, Zvi Ganz. Security broker for multimedia wireless LANs
595 -- 604R. Radhakrishna Pillai, Maitreya Rangnath, Rahul Agrawal, Weiguo Wang. Distributed control of wireless ATM networks using CORBA

Volume 23, Issue 4

309 -- 316Vittorio Trecordi, Giacomo Verticale. Per-flow delay performance in a FIFO scheduler fed by policed UDP sources
317 -- 327Samuel Pierre, Ronald Beaubrun. Integrating routing and survivability in fault-tolerant computer network design
328 -- 332Vu Duy Loi. Voice and data integration in ATM-based LANs
333 -- 340Yoon-Hwa Choi, Pong-Gyou Lee. A scalable and reconfigurable priority queue architecture for ATM switches
341 -- 361Francesca Cuomo, Marco Listanti. Performance analysis of a prototypal multimedia service in an intelligent broadband network
362 -- 370Gang Feng, Tak-Shing Peter Yum. Bifurcated-M routing for multi-point videoconferencing
371 -- 378Heejune Ahn, Jae-kyoon Kim. Shifting-level process as a LRD video traffic model and related queuing results
379 -- 394Kaan Bür, Cem Ersoy. A virtual path routing algorithm for ATM networks based on the equivalent bandwidth concept
395 -- 402N. Swaminathan, S. V. Raghavan. DIDA: a Distributed, Dynamic and Adaptive VP bandwidth management scheme for ATM networks
403 -- 410Michael S. Borella. Source models of network game traffic
411 -- 417Jesse S. Jin, Ruth Kurniawati. Design and analysis of distributed object collection for web indexing
418 -- 424Francis Chi-Moon Lau, Guihai Chen, Hao Huang, Li Xie. A distance-vector routing protocol for networks with unidirectional links
425 -- 428Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh. Date attachable electronic cash
429 -- 0Rolf Oppliger. Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla
430 -- 0Chi-Hyuck Jun. Teletraffic - Theory and Applications: H. Akimaru, K. Kawashima

Volume 23, Issue 3

199 -- 204J. Robert Ensor, Gianpaolo U. Carraro, John T. Edmark. Accommodating performance limitations in distributed virtual reality systems
205 -- 218Edward Y. Chang. Maximizing QoS for interactive DTV clients
219 -- 232Tone Ingvaldsen, Espen Klovning, Miles Wilkins. Determining the causes of end-to-end delay in CSCW applications
233 -- 241Werner Geyer, Rüdiger Weis. The design and the security concept of a collaborative whiteboard
242 -- 252Th. Markousis, D. Tsirikos, Michalis Vazirgiannis, Yannis Stavrakas. WWW-enabled delivery of interactive multimedia documents
253 -- 266Alberto García-Martínez, Jesús Fernández-Conde, Ángel Viña. Efficient memory management in video on demand servers
267 -- 289Thomas Plagemann, Vera Goebel, Pål Halvorsen, Otto J. Anshus. Operating system support for multimedia systems
290 -- 302Martin Karsten, Jens Schmitt, Burkhard Stiller, Lars C. Wolf. Charging for packet-switched network communication - motivation and overview

Volume 23, Issue 2

101 -- 114Hiroshi Fujinoki, Kenneth J. Christensen. A routing algorithm for dynamic multicast trees with end-to-end path length control
115 -- 122Cheng-Ming Weng, Pei-Wei Huang. Modified group method for mobility management
123 -- 132Tho Le-Ngoc, Sushila N. Subramanian. A Pareto-modulated Poisson process (PMPP) model for long-range dependent traffic
133 -- 148Liren Zhang, Huirong Fu. A novel scheme of transporting pre-stored MPEG video to support video-on-demand (VoD) services
149 -- 161Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goyal, Mukul Goyal. General weighted fairness and its support in explicit rate switch algorithms
162 -- 170Jung-Shian Li. Measurement and in-service monitoring for QoS violations and spare capacity estimations in ATM network
171 -- 176Li Layuan, Li Chunlin. A routing protocol for dynamic and large computer networks with clustering topology
177 -- 192Chung-Ming Huang, Jenq-Muh Hsu. PPP (P3): an Estelle-based probabilistic partial protocol verification system

Volume 23, Issue 18

1729 -- 1739Zuji Mao, Christos Douligeris. A location-based mobility tracking scheme for PCS networks
1740 -- 1746Chor Ping Low, Ning Wang. An efficient algorithm for group multicast routing with bandwidth reservation
1747 -- 1762Allan K. Y. Wong, Tharam S. Dillon. A fault tolerant model to attain reliability and high performance for distributed computing on the Internet
1763 -- 1776Eun Shil Bae, Min Young Chung, Dan Keun Sung. Performance analysis of a fixed local anchor scheme for supporting UPT services
1777 -- 1788Bob Askwith, Madjid Merabti, Qi Shi. MNPA: a mobile network privacy architecture
1789 -- 0Hartmut Weik. An Introduction to Digital Communications: Jack Kurzweil
1790 -- 0Athanasios V. Vasilakos. Intelligent Information Agents: M. Klusch
1791 -- 0Athanasios V. Vasilakos. Software Agents for Future Communication Systems: Alex L.G. Hayzelden and John Bigham

Volume 23, Issue 17

1581 -- 1583Madjid Merabti, Qi Shi, Rolf Oppliger. Advanced security techniques for network protection
1584 -- 1593Along Lin, R. Brown. The application of security policy to role-based access control and the common data security architecture
1594 -- 1605Stephane Doyon, Mourad Debbabi. On object initialization in the Java bytecode
1606 -- 1612Jianying Zhou. Further analysis of the Internet key exchange protocol
1613 -- 1620Paul Ashley, Mark Vandenwauver, Frank Siebenlist. Applying authorization to intranets: architectures, issues and APIs
1621 -- 1626Ross J. Anderson, Jong-Hyeon Lee. Jikzi - a new framework for security policy, trusted publishing and electronic commerce
1627 -- 1637N. Asokan, Philip Ginzboorg. Key agreement in ad hoc networks
1638 -- 1644Seong-Min Hong, SeungWon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon. On the construction of a powerful distributed authentication server without additional key management
1645 -- 1654Maria Felicia Florio, Roberto Gorrieri, Gianluigi Marchetti. Coping with denial of service due to malicious Java applets
1655 -- 1666Pascal Urien. Internet card, a smart card as a true Internet node
1667 -- 1676Wayne A. Jansen. Countermeasures for mobile agent security
1677 -- 1680Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh. Randomization enhanced Chaum s blind signature scheme
1681 -- 1701Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal. Scalable secure one-to-many group communication using dual encryption
1702 -- 1715Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia. Modeling requests among cooperating intrusion detection systems
1716 -- 1723Denis Trcek. Security policy conceptual modeling and formalization for networked information systems

Volume 23, Issue 16

1505 -- 1513Chin-Ling Chen, Ruay Shiung Chang. A new dynamic bandwidth allocation scheme for MPEG videos in ATM networks
1514 -- 1523Ahmed El-Sayed Kamal, Abdulazeez S. Boujarwah, Jehad Al-Dallal. Virtual time scheduling in HFC networks with support for priority implementation
1524 -- 1536Karim Djemame, Mourad Kara, R. S. Banwait. An agent based congestion control and notification scheme for TCP over ABR
1537 -- 1547Jin-Ru Chen, Yaw-Chung Chen, Chun-Liang Lee. An end-to-end flow control approach based on round trip time
1548 -- 1557He Jianhua, K. R. Subramanian, Dong Donghua, W. Wei. Novel methods for the performance analysis of adaptive hybrid selective repeat ARQ
1558 -- 1572A. King, R. Hunt. Protocols and architecture for managing TCP/IP network infrastructures
1573 -- 0T.-H. Lin. High Speed Digital Transmission Networking: G. Held

Volume 23, Issue 14-15

1321 -- 1322G. Lu. Support for multimedia communications over the Internet
1323 -- 1335G. Lu. Issues and technologies for supporting multimedia communications over the Internet
1336 -- 1348Mohammad F. Alam, Mohammed Atiquzzaman, Mohammad A. Karim. Traffic shaping for MPEG video transmission over the next generation internet
1349 -- 1362Na Li, Marissa Borrego, San-qi Li. A rate regulating traffic conditioner for supporting TCP over Diffserv
1363 -- 1376Claudio Casetti, James F. Kurose, Donald F. Towsley. An adaptive algorithm for measurement-based admission control in integrated services packet networks
1377 -- 1388Tao Wu, Edward W. Knightly. Enforceable and efficient service provisioning
1389 -- 1399Pi-Chung Wang, Chia-Tai Chan, Yaw-Chung Chen. An intelligent buffer management approach for GFR services in IP/ATM internetworks
1400 -- 1409Peifang Zhou, Oliver W. W. Yang. Design and analysis of per-flow queueing switches and VC-merge switches based on per-VC queueing architecture
1410 -- 1424Liren Zhang, Huirong Fu. Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks
1425 -- 1436Doan B. Hoang, Xiaomei Yu, David Dagan Feng. Fair intelligent bandwidth allocation for rate-adaptive video traffic
1437 -- 1447Kazumasa Oida, Masatoshi Sekido. ARS: an efficient agent-based routing system for QoS guarantees
1448 -- 1458Yasser Rasheed, Alberto Leon-Garcia. Towards a generic real-time transport and adaptation protocol for IP networks
1459 -- 1469Naoki Wakamiya, Masayuki Murata, Hideo Miyahara. On video coding algorithms with application level QoS guarantees
1470 -- 1483Kevin Q. Brown. The RTCP gateway: scaling real-time control bandwidth for wireless networks
1484 -- 1497Jana Dospisil, Elizabeth A. Kendall. Multimedia authoring framework with ILOG:::TM::: solver

Volume 23, Issue 13

1215 -- 1222H.-K. Tan, R. Radhakrishna Pillai, Chen-Khong Tham, Lawrence W. C. Wong, Jit Biswas. Impact of ATM cell delay on multimedia applications
1223 -- 1234C. Vijayanand, M. Shiva Kumar, K. R. Venugopal, P. Sreenivasa Kumar. Converter placement in all-optical networks using genetic algorithms
1235 -- 1251Yihong Long, T. K. Ho, A. B. Rad. Weighted fairness with MCR guarantee and a general-purpose explicit rate allocation algorithm for ATM ABR service
1252 -- 1262Gianluca Cena, Adriano Valenzano. Delay analysis of priority promotion systems
1263 -- 1280Panagiotis Demestichas, N. Georgantas, Evangelia Tzifa, Vasiliki Demesticha, Maria Striki, M. Kilanioti, Michael E. Theologou. Computationally efficient algorithms for location area planning in future cellular systems
1281 -- 1291Jun-Yao Wang, Wen-Shyang Hwang, Wen-Fong Wang, Ce-Kuen Shieh. Performance evaluation of multiple-channel slotted ring networks with tunable transmitters and fixed receivers
1292 -- 1300Aaron Striegel, Govindarasu Manimaran. Best-effort scheduling of (m, k)-firm real-time streams in multihop networks
1301 -- 1306Ruay Shiung Chang, P.-C. Chiou. Reducing database sizes in implicit deregistration for personal communication networks
1307 -- 1318Ruay Shiung Chang, Kung-Joi Pai, Chin-Ling Chen. Design of a multiple leaky buckets shaper
1319 -- 1320S. Selvakennedy. Enterprise Networks and Telephony: S. Ghernaouti-Helie and A. Dufour
1319 -- 0Youssef Iraqi. Mobile Radio Networks: Networking and Protocols: B. Walke
1320 -- 0G. Shen. Photonic Devices for Telecommunications: G. Guekos

Volume 23, Issue 12

1087 -- 1088Richard Lai. Editorial
1089 -- 1103Guy Leduc, François Germeau. Verification of security protocols using LOTOS-method and application
1104 -- 1123Jean-Pierre Courtiat, C. A. S. Santos, Christophe Lohr, B. Outtaj. Experience with RT-LOTOS, a temporal extension of the LOTOS formal description technique
1124 -- 1134Maria Törö, Jinsong Zhu, Victor C. M. Leung. Design of universal personal computing using SDL
1135 -- 1157Daniel Amyot, Luigi Logrippo. Use Case Maps and ::LOTOS:: for the prototyping and validation of a mobile group call system
1158 -- 1168Stefan Fischer, Jacek Wytrebowicz, Stanislaw Budkowski. Tool support for hardware/software co-design of communication protocols
1169 -- 1178J. Jenny Li, Joseph Robert Horgan. Applying formal description techniques to software architectural design
1179 -- 1195Hartmut König, Peter Langendörfer, Heiko Krumm. Improving the efficiency of automated protocol implementations using a configurable FDT compiler
1196 -- 1213Mariusz A. Fecko, M. Ümit Uyar, Paul D. Amer, Adarshpal S. Sethi, Theodore Dzik, R. Menell, Michael McMahon. A success story of formal description techniques: Estelle specification and test generation for MIL-STD 188-220

Volume 23, Issue 11

1019 -- 1026Paul Müller, Bernd Reuther, M. Schneider. ViAA - a virtual ATM API for arbitrary layer 2 access networks
1027 -- 1033Yong Lee 0002, HyunSook Kim, JooSeok Song. IN service provision using VLR in IMT-2000 network
1034 -- 1046Andrea Baiocchi, Nicola Blefari-Melazzi, Marco Listanti. Throughput-complexity trade-off for ABR traffic in an ATM satellite network under cell loss constraints
1047 -- 1054Xinkai Wang, Robert H. Deng, Feng Bao. Multicast Internet protocol
1055 -- 1063Siew Kei Lam, Thambipillai Srikanthan. Dynamic multicast routing in VLSI
1064 -- 1068Young-Cheol Bang, Sridhar Radhakrishnan, Nageswara S. V. Rao, Stephen Gordon Batsell. On update algorithms for quickest paths
1069 -- 1083D. C. Lee, Sangjo Park, Young Joon Song. Performance analysis of queueing strategies for multiple priority calls in multiservice personal communications services

Volume 23, Issue 10

877 -- 886Zhenyu Tang, Jose Joaquin Garcia-Luna-Aceves. Hop reservation multiple access for multichannel packet radio networks
887 -- 900Brian Willard, Ophir Frieder. Autonomous garbage collection: resolving memory leaks in long-running server applications
901 -- 911Kia Makki, J. Broussard, Niki Pissinou. On optical communications networks and wideband network architecture
912 -- 921Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat. A methodology to optimize the design of telecommunication systems
922 -- 927Sohail Sheikh, Suk-Chung Yoon, Ahmed Saeed, E. K. Park. Multicast routing infrastructure in ATM networks
928 -- 935Michael D. Santos, P. M. Melliar-Smith, Louise E. Moser. Flow control in the high-speed Thunder and Lightning ATM network
936 -- 941Niki Pissinou, Catalin Dunu, Kia Makki. A new framework for handling mobile clients in a client-server database system
942 -- 949Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga. An adaptive approach to manage traffic in CDMA ATM networks
950 -- 961Guohong Cao, Mukesh Singhal. Efficient distributed channel allocation for cellular networks
962 -- 974Gamze Seckin, Forouzan Golshani. Real-time transmission of multilayer video over ATM networks
975 -- 979Sam Makki. Tracking highly mobile users using replicated databases
980 -- 986Baruch Awerbuch, Yi Du, Yuval Shavitt. The effect of network hierarchy structure on performance of ATM PNNI hierarchical routing
987 -- 997Rodrigo Garcés, Jose Joaquin Garcia-Luna-Aceves, Raphael Rom. An access etiquette for very-wide wireless bands
998 -- 1013W. Melody Moh, Dongming Yao, Kia Makki. Analyzing the hidden-terminal effects and multimedia support for wireless LAN

Volume 23, Issue 1

1 -- 12Sherali Zeadally. Impact of ATM switch architectures on CBR video performance
13 -- 21Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa. Delta-Causality and -delivery for wide-area group communications
22 -- 31Gee-Swee Poo, J. Tang. Measuring the performance of OrbixTalk: a reliable multicast messaging system
32 -- 38Rong-Hong Jan, Kuo-Ruey Wu. A cell-numbering plan for seamless handoff in a wireless ATM network
39 -- 44Ali Elkateeb, Mohammed Elbeshti. A study using a RISC core for ATM network interfaces design
45 -- 61Yen-Jen Chen, Suh-Yin Lee. Bounded tag fair queueing for broadband packet switching networks
62 -- 70Girish Chiruvolu, Ravi Sankar, Nagarajan Ranganathan. VBR video traffic management using a predictor-based architecture
71 -- 83Y. H. Long, T. K. Ho, A. B. Rad. Fair flow control of ABR service by per-VC virtual queuing
84 -- 91Chin Ching Chiu, Yi-Shiung Yeh, Ruey-Shun Chen. Reduction of the total execution time to achieve the optimal ::::k::::-node reliability of distributed computing systems using a novel heuristic algorithm
92 -- 0Nimmagadda Chalamaiah. Elements of network protocol design, M.G. Gouda, Wiley
92 -- 93Paul Ashley. Electronic Commerce and Business Communications; Michael Chesher, Rukesh Kaura (Eds.)
92 -- 0Nimmagadda Chalamaiah. Data warehousing and data mining for telecommunication, R. Mattison, Artech