Journal: IEEE Network

Volume 1, Issue 4

3 -- 0Celia Desmond. Guest editorial
4 -- 10A. J. Huffman. E-mail - The "glue" to office automation
11 -- 15John V. Solman. Design of a public electronic mail system
16 -- 20Gary Hutchison, Celia L. Desmond. Electronic data interchange
21 -- 29Thomas V. Russotto. The integration of voice and data communication
30 -- 34Jan Duffy, Marlene Andreychuk. The effects of office automation
35 -- 38John N. Daigle. The IEEE network forum
39 -- 41Eric E. Sumner. Technology perspective
42 -- 43Vinton G. Cerf. Information infrastructure
44 -- 45Hal Folts. Open systems standards
46 -- 47J. Finnegan. Transportation for scientists
47 -- 0Danny Cohen. Communication for scientists

Volume 1, Issue 3

3 -- 5Jeffrey A. Wong, John Digaletos. Guest editorial
6 -- 12Dick C. A. Bulterman, Eva Manolis. Application-level performance prediction tools for network-based svstems
13 -- 20Michael Soha. A distributed approach to lan monitoring using intelligent high performance monitors
21 -- 31Robert Aronoff, Kevin Mills, Marnie Wheatley. Transport layer performance tools and measurement
32 -- 39Donna Ritter, Marilyn Seale. A multipurpose, distributed lan traffic monitoring tool
40 -- 48D. Jacobson, S. Gaitonde, J. Kim, J. Lee, Diane T. Rover, M. Sarwar, M. Shafiq. A master/slave monitor measurement technique for an operating ethernet network
49 -- 50John N. Daigle. The IEEE network forum
51 -- 0Eric E. Sumner. Technology perspective
52 -- 53Vinton G. Cerf. Information infrastructure
54 -- 55Hal Folts. Open systems standards

Volume 1, Issue 2

5 -- 0David B. Newman Jr., Raymond L. Pickholtz. Guest editorial
6 -- 10Martin E. Hellman. Commercial encryption
11 -- 16David B. Newman Jr., Jim K. Omura, Raymond L. Pickholtz. Public key management for network security
17 -- 23Robert R. Jueneman. Electronic document authentication
24 -- 33Marshall D. Abrams, Albert B. Jeng. Network security: Protocol reference model and the trusted computer system evaluation criteria
34 -- 39Dennis K. Branstad. Considerations for security in the OSI architecture
41 -- 0Eric E. Sumner. Technology perspective: Network security: Making the problem the solution
42 -- 43John N. Daigle. The IEEE network forum
44 -- 0Vinton G. Cerf. Information infrastructure
45 -- 0Hal Folts. Open systems standards

Volume 1, Issue 1

5 -- 0Frederick T. Andrews. President's message
6 -- 7Harvey A. Freeman, John N. Daigle. Editorial
7 -- 0Paul Green. Editorial
8 -- 10Michael Willett. Token-ring local area networks-an introduction
11 -- 18Roy C. Dixon. Lore of the token ring
19 -- 22Daniel Pitt. Standards for the token ring
23 -- 30Norman C. Strole. The IBM token-ring network - A functional overview
31 -- 39Floyd E. Ross. Rings are 'round for good!
40 -- 0Hal Folts. Open systems standards
41 -- 0Eric Sumner. Technology perspective
42 -- 0Vinton G. Cerf. Information infrastructure
43 -- 0John N. Daigle. The IEEE network forum