| 10 | -- | 17 | Tim Bass, Alfredo Freyre, David Gruber, Glenn Watt. E-mail bombs and countermeasures: cyber attacks on availability and brand integrity |
| 18 | -- | 31 | Pablo Rodriguez, Ernst Biersack. Continuous multicast push of Web documents over the Internet |
| 32 | -- | 37 | Thomas M. Chen, Steven S. Liu, M. J. Procanik, D. C. Wang, D. D. Casey. INQIRE: a software approach to monitoring QoS in ATM networks |
| 38 | -- | 47 | Jeffrey M. Capone, Ioannis Stavrakakis. Determining the call admission region for real-time heterogeneous applications in wireless TDMA networks |
| 48 | -- | 52 | Yu-Min Chuang, Tzung-Yuan Lee, Yi-Bing Lin. Trading CDPD availability and voice blocking probability in cellular networks |
| 56 | -- | 64 | Dimitrios Serpanos, José R. Brunheroto, Julio Nogima, Odysseas G. Koufopavlou. Data link control emulation: rapid prototyping for high-speed networks |