Journal: IEEE Network

Volume 8, Issue 6

12 -- 17Jane Smith Patterson, William L. Smith. The North Carolina information highway
18 -- 22Larry W. Grovenstein, Charlie Pittman, Joe H. Simpson, Dan R. Spears. NCIH services, architecture, and implementation
24 -- 31William A. Bruwer, John D. Loop, James A. Symon, B. G. Thompson. VISTAnet and MICA: medical applications leading to the NCIH
32 -- 38Daniel Stevenson, Henry Morow, Alan Blatecky, Peggy Montgomery Davis, Patrick Richardson, Naomi L. T. Courter. The NC-REN meets the North Carolina Information Highway
40 -- 46Megan Babson, David Buster, Gary DeVal, Joseph S. Xavier. ATM switching and CPE adaptation in the North Carolina Information Highway
48 -- 54Ravi Damodaram, Kenneth T. Stephens, William S. Bishop, Peter O. Brackett, Stephen C. Farkouh, Amelendu Chatterjee. Network management for the NCIH
56 -- 63Girish Pathak, Renu Chipalkatti, Hao-Jen Fu, Willis Stinson, Shaygan Kheradpir. Integrated network and service management for the NCIH
64 -- 70Robert L. Capell, David A. Kettler, Randall L. Corn, Robert Morris. Evolution of the North Carolina Information Highway

Volume 8, Issue 5

12 -- 21Chris Schmandt. Multimedia nomadic services on today's hardware
22 -- 32Bill N. Schilit, Marvin M. Theimer. Disseminating active map information to mobile hosts
33 -- 39George P. Eleftheriadis, Michael Theologou. User profile identification in future mobile telecommunications systems
40 -- 49Edward H. Lipper, Michael P. Rumsewicz. Teletraffic considerations for widespread deployment of PCS
50 -- 63Kwang-Cheng Chen. Medium access control of wireless LANs for mobile computing

Volume 8, Issue 4

8 -- 17Vern Paxson. Growth trends in wide-area TCP connections
18 -- 26Joan García-Haro, Andrzej Jajszczyk. ATM shared-memory switching architectures
27 -- 40Thomas M. Chen, Steven S. Liu. Management and control functions in ATM switching systems
41 -- 48Jane M. Simmons. A strategy for designing error detection schemes for general data networks

Volume 8, Issue 3

12 -- 17Donald O'Mahony. Security considerations in a network management environment
18 -- 25David R. Irvin. The role of customer-premises bandwidth management
26 -- 41Biswanath Mukherjee, Todd L. Heberlein, Karl N. Levitt. Network intrusion detection
42 -- 53James P. Hughes, William R. Franta. Geographic extension of HIPPI channels via high speed SONET

Volume 8, Issue 2

5 -- 0Martha Steenstrup. Mobile communications
6 -- 16Gregory Lauer. IN architectures for implementing universal personal telecommunications
18 -- 25Gregory P. Pollini, Zygmunt J. Haas. E-BAMA vs. RAMA [multiple access protocols]
26 -- 34Refik Molva, Didier Samfat, Gene Tsudik. Authentication of mobile users
36 -- 42Antonio Valdovinos, Fernando Casadevall. Equalization and space diversity techniques in mobile environments
43 -- 53David Bantz, Frédéric J. Bauchot. Wireless LAN design alternatives

Volume 8, Issue 1

5 -- 0Salah Aidarous, Stephen B. Weinstein. Distributed systems for telecommunications
8 -- 17Harvey Rubin, Narayanan Natarajan. A distributed software architecture for telecommunication networks
18 -- 23Andrew Herbert. An ANSA overview
24 -- 32Leonard J. N. Franken, Boudewijn R. Haverkort. The performability manager
34 -- 44Geert Heijenk, Xinli Hou, Ignas G. Niemegeers. Communication systems supporting multimedia multi-user applications
45 -- 51Fernando Cuervo, Dia Helmy. Applying the IN-service life cycle process to UPT
52 -- 61Miae Woo, Naveed U. Qazi, Akif Ghafoor. A synchronization framework for communication of pre-orchestrated multimedia information
62 -- 70Andy Harter, Andy Hopper. A distributed location system for the active office