researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IEEE Network
Home
Index
Info
Volume
Volume
1
, Issue
4
3
--
0
Celia Desmond
.
Guest editorial
4
--
10
A. J. Huffman
.
E-mail - The "glue" to office automation
11
--
15
John V. Solman
.
Design of a public electronic mail system
16
--
20
Gary Hutchison
,
Celia L. Desmond
.
Electronic data interchange
21
--
29
Thomas V. Russotto
.
The integration of voice and data communication
30
--
34
Jan Duffy
,
Marlene Andreychuk
.
The effects of office automation
35
--
38
John N. Daigle
.
The IEEE network forum
39
--
41
Eric E. Sumner
.
Technology perspective
42
--
43
Vinton G. Cerf
.
Information infrastructure
44
--
45
Hal Folts
.
Open systems standards
46
--
47
J. Finnegan
.
Transportation for scientists
47
--
0
Danny Cohen
.
Communication for scientists
Volume
1
, Issue
3
3
--
5
Jeffrey A. Wong
,
John Digaletos
.
Guest editorial
6
--
12
Dick C. A. Bulterman
,
Eva Manolis
.
Application-level performance prediction tools for network-based svstems
13
--
20
Michael Soha
.
A distributed approach to lan monitoring using intelligent high performance monitors
21
--
31
Robert Aronoff
,
Kevin Mills
,
Marnie Wheatley
.
Transport layer performance tools and measurement
32
--
39
Donna Ritter
,
Marilyn Seale
.
A multipurpose, distributed lan traffic monitoring tool
40
--
48
D. Jacobson
,
S. Gaitonde
,
J. Kim
,
J. Lee
,
Diane T. Rover
,
M. Sarwar
,
M. Shafiq
.
A master/slave monitor measurement technique for an operating ethernet network
49
--
50
John N. Daigle
.
The IEEE network forum
51
--
0
Eric E. Sumner
.
Technology perspective
52
--
53
Vinton G. Cerf
.
Information infrastructure
54
--
55
Hal Folts
.
Open systems standards
Volume
1
, Issue
2
5
--
0
David B. Newman Jr.
,
Raymond L. Pickholtz
.
Guest editorial
6
--
10
Martin E. Hellman
.
Commercial encryption
11
--
16
David B. Newman Jr.
,
Jim K. Omura
,
Raymond L. Pickholtz
.
Public key management for network security
17
--
23
Robert R. Jueneman
.
Electronic document authentication
24
--
33
Marshall D. Abrams
,
Albert B. Jeng
.
Network security: Protocol reference model and the trusted computer system evaluation criteria
34
--
39
Dennis K. Branstad
.
Considerations for security in the OSI architecture
41
--
0
Eric E. Sumner
.
Technology perspective: Network security: Making the problem the solution
42
--
43
John N. Daigle
.
The IEEE network forum
44
--
0
Vinton G. Cerf
.
Information infrastructure
45
--
0
Hal Folts
.
Open systems standards
Volume
1
, Issue
1
5
--
0
Frederick T. Andrews
.
President's message
6
--
7
Harvey A. Freeman
,
John N. Daigle
.
Editorial
7
--
0
Paul Green
.
Editorial
8
--
10
Michael Willett
.
Token-ring local area networks-an introduction
11
--
18
Roy C. Dixon
.
Lore of the token ring
19
--
22
Daniel Pitt
.
Standards for the token ring
23
--
30
Norman C. Strole
.
The IBM token-ring network - A functional overview
31
--
39
Floyd E. Ross
.
Rings are 'round for good!
40
--
0
Hal Folts
.
Open systems standards
41
--
0
Eric Sumner
.
Technology perspective
42
--
0
Vinton G. Cerf
.
Information infrastructure
43
--
0
John N. Daigle
.
The IEEE network forum