


default search action
Computer Communications, Volume 18
Volume 18, Number 1, January 1995
- Thomas Meuser:

Performance Comparison of Media Access Protocols for Gbit/s Networks in the Local Area. Comput. Commun. 18(1): 4-14 (1995) - Marco Conti, Enrico Gregori, Luciano Lenzini:

Estimating the Quality of Service of Token Passing MAC Protocols. Comput. Commun. 18(1): 15-23 (1995) - Paola Crocetti, Shivi Fotedar, Luigi Fratta, Giorgio Gallassi, Mario Gerla:

ATM Virtual Private Network Design Alternatives. Comput. Commun. 18(1): 24-31 (1995) - Ruixi Yuan:

Traffic Pattern Based Mobile Routing Scheme. Comput. Commun. 18(1): 32-36 (1995) - Milan Kovacevic, Mario Gerla, Joseph A. Bannister:

Performance of Shared-Channel Multihop Lightwave Networks. Comput. Commun. 18(1): 37-44 (1995) - Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih:

Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Comput. Commun. 18(1): 45-47 (1995) - Tien-Yu Huang, Jean-Lien C. Wu, I. Bosley, T. Kuchlein, Krzysztof Pawlikowski, A. Stewart:

On Priority Promotion DQDB Networks to Improve Fairness. Comput. Commun. 18(1): 48-49 (1995) - Christopher Ward, Thomas M. Phillips:

Throughput Efficiency of an Enhanced Link Management Procedure. Comput. Commun. 18(1): 50-51 (1995)
Volume 18, Number 2, February 1995
- Magdalena Feldhoffer:

Model for Flexible Configuration of Application-Oriented Communication Services. Comput. Commun. 18(2): 69-78 (1995) - Luis Orozco-Barbosa, Naél Hirzalla:

Share-Based Congestion Control Scheme for Systems of Interconnected Networks. Comput. Commun. 18(2): 79-88 (1995) - Eckhard Moeller, Sanjay Manandhar, Luc Neumann, Johannes Rückert, Gerd Schürmann, Susan Thomas, Frieder Wolf:

The BERKOM Multimedia-Mail Teleservice. Comput. Commun. 18(2): 89-102 (1995) - Charles K. Chirchir, Ahmed E. Kamal:

The Leaky Window: A Flow and Congestion Control Technique for HS-WANs. Comput. Commun. 18(2): 103-112 (1995) - T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman:

Fault Detection and Diagnosis Capabilities of Test Sequence Selection Methods Based on the FSM Model. Comput. Commun. 18(2): 113-122 (1995) - W. D. K. Macrosson, R. L. Wickramasinghe:

Progress Within UK Firms Towards Inter-Departmental Data Exchange In the Open System Context. Comput. Commun. 18(2): 123-126 (1995)
Volume 18, Number 3, March 1995
- Thomas D. C. Little:

Multimedia Storage Servers - Introduction. Comput. Commun. 18(3): 131-132 (1995) - Ralf Steinmetz:

Multimedia File Systems Survey: Approaches for Continuous Media Disk Scheduling. Comput. Commun. 18(3): 133-144 (1995) - Jonathan C. L. Liu, David Hung-Chang Du, James A. Schnepf:

Supporting Random Access on Real-Time Retrieval of Digital Continuous Media. Comput. Commun. 18(3): 145-159 (1995) - Tom Pfeifer, A. Blobelt:

Local Storage Systems for Continuous Data with Heterogeneous Timing Requirements. Comput. Commun. 18(3): 160-169 (1995) - Shahram Ghandeharizadeh, Ali E. Dashti, Cyrus Shahabi:

Pipelining Mechanism to Minimize the Latency Time in Hierarchical Multimedia Storage Managers. Comput. Commun. 18(3): 170-184 (1995) - M. Seo, Chee-Ha Kim:

Allocation Strategies of Multimedia Data on Disk Arrays. Comput. Commun. 18(3): 185-191 (1995) - Harrick M. Vin, Alok Goyal, Pawan Goyal:

Algorithms for Designing Multimedia Servers. Comput. Commun. 18(3): 192-203 (1995) - Christos H. Papadimitriou, Srinivas Ramanathan, P. Venkat Rangan, Srihari Sampath Kumar:

Multimedia Information Caching for Personalized Video-on-Demand. Comput. Commun. 18(3): 204-216 (1995) - R. Clark Robertson, Tri T. Ha, D. V. Banh:

Effect of Capture on Throughput of Variable Length Packet Aloha Systems. Comput. Commun. 18(3): 220 (1995)
Volume 18, Number 4, April 1995
- K. Poon:

Inside a Trader in Global Trading. Comput. Commun. 18(4): 227-246 (1995) - A. T. H. van der Voort, A. L. Boonstra, F. H. R. de Thouars:

Routing Names and Addresses in the International MHS. Comput. Commun. 18(4): 247-251 (1995) - Sami S. Alwakeel, Mohammad Ilyas:

Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network. Comput. Commun. 18(4): 252-261 (1995) - Andreas Cramer, Richard Hofmann, Norbert Luttenberger:

Performance Measurements on the Heidelberg Audio/Video Distribution System: Methodology and Results. Comput. Commun. 18(4): 262-275 (1995) - Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:

Recovery Approach to the Design of Stabilizing Communication Protocols. Comput. Commun. 18(4): 276-287 (1995) - Christos Douligeris, Lakshmana N. Kumar:

Fairness Issues in the Networking Environment. Comput. Commun. 18(4): 288-299 (1995) - Dieter Baum, Luciano Lenzini:

Performance Analysis of SDN-Specific Error Recovery Procedures: Comparison of Step-by-Step and End-to-End Schemes. Comput. Commun. 18(4): 300-309 (1995)
Volume 18, Number 5, May 1995
- Kimon P. Kontovassilis, John T. Tsiligaridis, George I. Stassinopoulos:

Buffer Dimensioning for Delay- and Loss-Sensitive Traffic. Comput. Commun. 18(5): 315-328 (1995) - T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman:

On Testing and Diagnosis of Communication Protocols Based on the FSM Model. Comput. Commun. 18(5): 329-337 (1995) - Andrzej R. Pach, Sergio Palazzo, Daniela Panno:

Delay Analysis of DQDB Networks with Slot Preuse and Reuse. Comput. Commun. 18(5): 338-344 (1995) - R. C. Betini, Hisao Kameda, Kentaro Shimizu:

Flow Control and Routing Algorithms in WAPSN. Comput. Commun. 18(5): 345-356 (1995) - Nen-Fu Huang, Gin-Kou Ma, Yi-Jang Wu:

Hot-Spot Spanning Tree Algorithm for a Bridged LAN/MAN. Comput. Commun. 18(5): 357-366 (1995) - C. Y. Lee:

Application of a Cross Decomposition Algorithm to a Location and Allocation Problem in Distributed Systems. Comput. Commun. 18(5): 367-377 (1995) - Debanjan Saha, Amitava Mukherjee:

Design of Hierarchical Communication Networks Under Node/Link Failure Constraints. Comput. Commun. 18(5): 378-383 (1995) - Debanjan Saha:

Verifying the Progress Properties of a Heterogeneous Protocol System in an Internetworking Environment. Comput. Commun. 18(5): 384-391 (1995) - Carlos Hirsch, Luis Rojas:

Internal Communications in a Multiprocessor ISDN PBX. Comput. Commun. 18(5): 392-396 (1995)
Volume 18, Number 6, June 1995
- Lillian Cuthbert:

Electronic Document Delivery. Comput. Commun. 18(6): 407 (1995) - Haim Kilov, Lillian Cuthbert:

A Model for Document Management. Comput. Commun. 18(6): 408-417 (1995) - J. Knight, Cliff McKnight:

Project ELVYN: Implementing an Electronic Journal. Comput. Commun. 18(6): 418-422 (1995) - C. Green:

From Paper to CD-ROM Documentation. Comput. Commun. 18(6): 423-428 (1995) - Aviel D. Rubin:

Secure Distribution of Electronic Documents in a Hostile Environment. Comput. Commun. 18(6): 429-434 (1995) - K. L. Wandryk:

The Benefits of Using Electronic Document Software. Comput. Commun. 18(6): 435-446 (1995) - Craig M. Parker, Paula M. C. Swatman:

The TREAT Laboratory: Comparing an Electronic Commerce Experiment at Curtin and Monash Universities. Comput. Commun. 18(6): 447-457 (1995)
Volume 18, Number 7, July 1995
- Shao-kong Kao, Biswanath Mukherjee:

Image transmission on the DQDB network. 463-474 - H. K. Wang, Jean-Lien C. Wu:

Object model for hypermedia applications. 475-485 - Jung-Shyr Wu, Fang-Jang Kuo, Jin-Fu Chang:

Traffic control at terminal equipment in ATM networks using cryptographic techniques. 486-492 - Piyu Tripathy, Behçet Sarikaya:

Analysis and representation of test cases generated from LOTOS. 493-506 - Debashis Saha

, Amitava Mukherjee
:
Computational analysis of an optimal routing strategy in a hierarchical computer communication network. 507-511 - Alexander Schill, Markus U. Mock

:
Client/server approach versus distributed object-oriented computing on top of OSF DCE. 512-518
Volume 18, Number 8, August 1995
- N.-F. Huang:

Editorial. 526 - Mete Kabatepe, Kenneth S. Vastola:

Bandwidth allocation in fair distributed queue (FDQ) networks. 527-536 - Raffaele Bolla

, Franco Davoli
:
Call admission control and bandwidth allocation in a multiservice DQDB network. 537-544 - Shuoh-Ren Tsai, Tein-Hsiang Lin, Chunming Qiao:

Bandwidth allocation for isochronous connections in DQDB using the PA scheme. 545-551 - Oran Sharon, Adrian Segall:

The parallel D-Net. 552-562 - W. Melody Moh, Min-Jia Chen, Nui-Ming Chu, Cherng-Der Liao:

Traffic prediction and dynamic bandwidth allocation over ATM: a neural network approach. 563-571 - Bo Li:

Bandwidth management for high speed LANs using wavelength division multiplexing. 572-581
Volume 18, Number 9, September 1995
- T. Burrage, S. Ward:

Adaptive priority timer control of the SAE LTPB for fair prioritization in military avionics networks. 591-599 - Jean Lambert, Béatrice Stéphan:

Modelling network profiles. 600-608 - Wen-Huei Chen, Chuan Yi Tang, Son T. Vuong:

Improving the UIOv-method for protocol conformance testing. 609-619 - Craig E. Wills, David Finkel:

Scalable approaches to load sharing in the presence of multicasting. 620-630 - Raed Y. Awdeh

, Hussein T. Mouftah:
MS4 - a high performance output buffering ATM switch. 631-644 - Philippe A. Janson, Gene Tsudik:

Secure and minimal protocols for authenticated key distribution. 645-653 - Tzong-Chen Wu, Tzong-Sun Wu:

Group commitment protocol based on zero knowledge proofs. 654-656 - Constantine Katsinis, Amelie Constant

:
Bandwidth allocation in wide-band communication networks under two types of priorities. 657-662 - Ruey-yih Lin, Chyan Yang:

Link enhancement using constrained range and reduced candidate set searches: a revision. 663-668 - Toong Shoon Chan, Ian Gorton:

HTPNET: a high performance transport protocol. 669-681 - Aloknath De, N. Prithviraj:

Comments on 'Analysis of 1-ROR networks'. 682-683 - Krishna M. Sivalingam:

Asynchronous transfer mode networks: Performance issues: By R Onvural, Artech House, London, 1994, 254 pp. 687 - Rita Puzmanova:

LAN times encyclopedia of networking: By T Sheldon, McGraw-Hill, New York, 1994, $39.95, 1006 pp, ISBN 0-07-881965-2. 687-688
Volume 18, Number 10, October 1995
- Bala Rajagopalan:

Membership protocols for distributed conference control. 695-708 - Wu-chi Feng, Stuart Sechrest:

Critical bandwidth allocation for the delivery of compressed video. 709-717 - Jau-Hsiung Huang, Piau-Chuo Tsao:

Continuous framing mechanism for congestion control in broadband networks. 718-724 - James C. Yee, Pravin Varaiya:

Models and performance of real-time disk access policies. 725-741 - Srinivas Ramanathan, P. Venkat Rangan, Harrick M. Vin, Srihari Sampath Kumar:

Enforcing application-level QoS by frame-induced packet discarding in video communications. 742-754 - Sanjeev Rampal, Douglas S. Reeves:

Routing and admission control algorithms for multimedia traffic. 755-768 - Hui Zhang:

Providing end-to-end performance guarantees using non-work-conserving disciplines. 769-781
Volume 18, Number 11, November 1995
- Peter Schoo:

Beyond intelligent networks. 791-792 - Allan Hansson:

Evolution of intelligent network concepts. 793-801 - Armin Fricke:

Market requirements and the functionality of intelligent networks. 802-806 - Kai Jakobs:

Future (data) communication networks - the challenge to (public) service providers. 807-815 - Raúl Gutiérrez, Jørgen Nørgaard, Kjell Randsted:

IN and beyond: two approaches to the evolution of INs. 816-824 - Martin Chapman, Hendrik Berndt, Nicola Gatti:

Software architecture for the future information market. 825-837 - Sebastiano Trigila, Alvin P. Mullery, Mário Campolargo, June Hunt:

Service architectures and service creation for integrated broadband communications. 838-848 - Jean-Bernard Stefani:

Open distributed processing: an architectural basis for information networks. 849-862
Volume 18, Number 12, December 1995
- Giuseppe Anastasi, Marco Conti

, Enrico Gregori, Luciano Lenzini:
Real-time applications in a CRMA network: a performance analysis. 871-879 - Jae Hwoon Lee, Chong Kwan Un:

Asynchronous reservation protocol for variable-sized messages in a WDM-based local network. 880-888 - Reinhard Baier, Eckhard Moeller, Angela Scheller:

ODA implementation for multimedia teleservices. 889-895 - Lakshmana N. Kumar, Andreas D. Bovopoulos:

Access protection solution for heavy load unfairness in DQDB. 896-910 - Ali Rezaki, Hasan Ural:

Construction of checking sequences based on characterization sets. 911-920 - Denis Trcek, Borka Jerman-Blazic:

Formal language for security services base modelling and analysis. 921-928 - Ji-Horng Liaw, Cheng-Ming Weng:

Modular multicast ATM switching architecture. 929-935 - Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen:

Remote scheme for password authentication based on theory of quadratic residues. 936-942 - Özgür Ulusoy

:
Network access protocol for hard real-time communication systems. 943-948 - Ioannis E. Pountourakis, Efstathios D. Sykas, Emmanuel N. Protonotarios:

Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol. 949-958 - Tzong-Chen Wu:

Remote login authentication scheme based on a geometric approach. 959-963 - Howard Bowman, Gordon S. Blair

, Lynne Blair, Amanda G. Chetwynd
:
Formal description of distributed multimedia systems: an assessment of potential techniques. 964-977 - Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko:

On the security of Wu and Yeh's conference key distribution system. 978-981 - Kee Chaing Chua, W. M. Tan, Kin Mun Lye:

Performance of PRMA in a mobile radio channel. 982-987 - Kwok-Yan Lam:

Replay tolerance of authentication protocols. 988-992 - Yung-Hsiang Chen, Tzonelih Hwang:

ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer. 993-996

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














