callback( { "result":{ "query":":facetid:toc:\"db/journals/monet/monet2.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"74.58" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"34", "@dc":"34", "@oc":"34", "@id":"43462244", "text":":facetid:toc:db/journals/monet/monet2.bht" } }, "hits":{ "@total":"34", "@computed":"34", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"6633955", "info":{"authors":{"author":[{"@pid":"82/2448","text":"Giuseppe Anastasi"},{"@pid":"88/581","text":"Davide Grillo"},{"@pid":"l/LucianoLenzini","text":"Luciano Lenzini"},{"@pid":"05/1433","text":"Enzo Mingozzi"}]},"title":"A Contention/Reservation Access Protocol for Speech and Data Integration in TDMA-Based Advanced Mobile Systems.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"3-18","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/AnastasiGLM97","doi":"10.1023/A:1013247725628","ee":"https://doi.org/10.1023/A:1013247725628","url":"https://dblp.org/rec/journals/monet/AnastasiGLM97"}, "url":"URL#6633955" }, { "@score":"1", "@id":"6633956", "info":{"authors":{"author":[{"@pid":"29/934","text":"Vanitha Aravamudhan"},{"@pid":"93/6483","text":"Karunaharan Ratnam"},{"@pid":"67/43","text":"Sampath Rangarajan"}]},"title":"An Efficient Multicast Protocol for PCS Networks.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"333-344","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/AravamudhanRR97","doi":"10.1023/A:1013657422419","ee":"https://doi.org/10.1023/A:1013657422419","url":"https://dblp.org/rec/journals/monet/AravamudhanRR97"}, "url":"URL#6633956" }, { "@score":"1", "@id":"6633957", "info":{"authors":{"author":[{"@pid":"25/198","text":"Sergio Barberis"},{"@pid":"34/3238","text":"Ermanno Berruto"}]},"title":"A CDMA-Based Radio Interface for Third Generation Mobile Systems.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"19-29","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/BarberisB97","doi":"10.1023/A:1013299709699","ee":"https://doi.org/10.1023/A:1013299709699","url":"https://dblp.org/rec/journals/monet/BarberisB97"}, "url":"URL#6633957" }, { "@score":"1", "@id":"6633958", "info":{"authors":{"author":{"@pid":"18/1840","text":"Chatschik Bisdikian"}},"title":"The n-ary Stack Algorithm for the Wireless Random Access Channel.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"89-99","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/Bisdikian97","doi":"10.1023/A:1013260028354","ee":"https://doi.org/10.1023/A:1013260028354","url":"https://dblp.org/rec/journals/monet/Bisdikian97"}, "url":"URL#6633958" }, { "@score":"1", "@id":"6633959", "info":{"authors":{"author":[{"@pid":"47/1541","text":"Raffaele Bolla"},{"@pid":"72/147","text":"Franco Davoli"},{"@pid":"18/412","text":"Carlo Nobile"}]},"title":"The RRA-ISA Multiple Access Protocol With and Without Simple Priority Schemes for Real-Time and Data Traffic in Wireless Cellular Systems.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"45-53","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/BollaDN97","doi":"10.1023/A:1013203910607","ee":"https://doi.org/10.1023/A:1013203910607","url":"https://dblp.org/rec/journals/monet/BollaDN97"}, "url":"URL#6633959" }, { "@score":"1", "@id":"6633960", "info":{"authors":{"author":[{"@pid":"23/5033","text":"Mooi Choo Chuah"},{"@pid":"60/4584","text":"Bharat T. Doshi"},{"@pid":"31/5483","text":"Subrahmanyam Dravida"},{"@pid":"81/6689","text":"Richard P. Ejzak"},{"@pid":"94/1445","text":"Sanjiv Nanda"}]},"title":"Link Layer Retransmission Schemes for Circuit-Mode Sata Over the CDMA Physical Channel.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"195-211","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/ChuahDDEN97","doi":"10.1023/A:1013680600129","ee":"https://doi.org/10.1023/A:1013680600129","url":"https://dblp.org/rec/journals/monet/ChuahDDEN97"}, "url":"URL#6633960" }, { "@score":"1", "@id":"6633961", "info":{"authors":{"author":[{"@pid":"91/3070-1","text":"Russell J. Clark 0001"},{"@pid":"a/MHAmmar","text":"Mostafa H. Ammar"},{"@pid":"99/4063","text":"Kenneth L. Calvert"}]},"title":"Protocol Discovery in Multiprotocol Networks.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"271-284","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/ClarkAC97","doi":"10.1023/A:1013645019693","ee":"https://doi.org/10.1023/A:1013645019693","url":"https://dblp.org/rec/journals/monet/ClarkAC97"}, "url":"URL#6633961" }, { "@score":"1", "@id":"6633962", "info":{"authors":{"author":[{"@pid":"57/1999","text":"Allan C. Cleary"},{"@pid":"68/2015","text":"Michael Paterakis"}]},"title":"Design and Performance Evaluation of an RRA Scheme for Voice-Data Channel Access in Outdoor Microcellular Environments.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"31-43","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/ClearyP97","doi":"10.1023/A:1013251826537","ee":"https://doi.org/10.1023/A:1013251826537","url":"https://dblp.org/rec/journals/monet/ClearyP97"}, "url":"URL#6633962" }, { "@score":"1", "@id":"6633963", "info":{"authors":{"author":[{"@pid":"17/4829","text":"Marco Conti"},{"@pid":"57/1492","text":"Claudio Demaria"},{"@pid":"71/6270","text":"Lorenzo Donatiello"}]},"title":"Design and Performance Evaluation of a MAC Protocol for Wireless Local Area Networks.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"69-87","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/ContiDD97","doi":"10.1023/A:1013208011516","ee":"https://doi.org/10.1023/A:1013208011516","url":"https://dblp.org/rec/journals/monet/ContiDD97"}, "url":"URL#6633963" }, { "@score":"1", "@id":"6633964", "info":{"authors":{"author":[{"@pid":"41/5360","text":"Jian Cui"},{"@pid":"62/4101","text":"David D. Falconer"},{"@pid":"92/2711","text":"Asrar U. H. Sheikh"}]},"title":"Performance Evaluation of Optimum Combining and Maximal Ratio Combining in the Presence of Co-channel Interference and Channel Correlation for Wireless Communication Systems.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"315-324","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/CuiFS97","doi":"10.1023/A:1013653321510","ee":"https://doi.org/10.1023/A:1013653321510","url":"https://dblp.org/rec/journals/monet/CuiFS97"}, "url":"URL#6633964" }, { "@score":"1", "@id":"6633965", "info":{"authors":{"author":[{"@pid":"82/312","text":"Babak Daneshrad"},{"@pid":"19/1152","text":"Leonard J. Cimini Jr."},{"@pid":"23/5116","text":"Manny Carloni"},{"@pid":"56/6692","text":"Nelson Sollenberger"}]},"title":"Performance and Implementation of Clustered-OFDM for Wireless Communications.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"305-314","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/DaneshradCCS97","doi":"10.1023/A:1013601204672","ee":"https://doi.org/10.1023/A:1013601204672","url":"https://dblp.org/rec/journals/monet/DaneshradCCS97"}, "url":"URL#6633965" }, { "@score":"1", "@id":"6633966", "info":{"authors":{"author":[{"@pid":"61/3056","text":"Abdel-Ghani A. Daraiseh"},{"@pid":"55/85","text":"Carl W. Baum"}]},"title":"Methods for Packet Combining in HARQ Systems Over Bursty Channels.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"213-224","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/DaraisehB97","doi":"10.1023/A:1013632716967","ee":"https://doi.org/10.1023/A:1013632716967","url":"https://dblp.org/rec/journals/monet/DaraisehB97"}, "url":"URL#6633966" }, { "@score":"1", "@id":"6633967", "info":{"authors":{"author":[{"@pid":"d/MargaretHDunham","text":"Margaret H. Dunham"},{"@pid":"h/AHelal","text":"Abdelsalam Helal"},{"@pid":"90/4745","text":"Santosh Balakrishnan"}]},"title":"A Mobile Transaction Model That Captures Both the Data and Movement Behavior.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"149-162","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/DunhamHB97","doi":"10.1023/A:1013672431080","ee":"https://doi.org/10.1023/A:1013672431080","url":"https://dblp.org/rec/journals/monet/DunhamHB97"}, "url":"URL#6633967" }, { "@score":"1", "@id":"6633968", "info":{"authors":{"author":[{"@pid":"11/4828","text":"Andrew A. Hanish"},{"@pid":"25/4706","text":"Tharam S. Dillon"}]},"title":"Communication Protocol Design to Facilitate Re-Use Based on the Object-Oriented Paradigm.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"285-301","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/HanishD97","doi":"10.1023/A:1013697003764","ee":"https://doi.org/10.1023/A:1013697003764","url":"https://dblp.org/rec/journals/monet/HanishD97"}, "url":"URL#6633968" }, { "@score":"1", "@id":"6633969", "info":{"authors":{"author":[{"@pid":"71/461","text":"Jin Jing"},{"@pid":"e/AKElmagarmid","text":"Ahmed K. Elmagarmid"},{"@pid":"h/AHelal","text":"Abdelsalam Helal"},{"@pid":"01/6037","text":"Rafael Alonso"}]},"title":"Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/Server Environments.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"115-127","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/JingEHA97","doi":"10.1023/A:1013616213333","ee":"https://doi.org/10.1023/A:1013616213333","url":"https://dblp.org/rec/journals/monet/JingEHA97"}, "url":"URL#6633969" }, { "@score":"1", "@id":"6633970", "info":{"authors":{"author":[{"@pid":"29/3467","text":"Arthur M. Keller"},{"@pid":"20/2682","text":"Owen Densmore"},{"@pid":"81/6685","text":"Wei Huang"},{"@pid":"21/3533","text":"Behfar Razavi"}]},"title":"Zippering: Managing Intermittent Connectivity in DIANA.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"357-364","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/KellerDHR97","doi":"10.1023/A:1013661523328","ee":"https://doi.org/10.1023/A:1013661523328","url":"https://dblp.org/rec/journals/monet/KellerDHR97"}, "url":"URL#6633970" }, { "@score":"1", "@id":"6633971", "info":{"authors":{"author":[{"@pid":"39/659","text":"William C. Y. Lee"},{"@pid":"l/YiBingLin","text":"Yi-Bing Lin"}]},"title":"Personal Communications Services - Editorial.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"303-304","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/LeeL97","doi":"10.1023/A:1013649120602","ee":"https://doi.org/10.1023/A:1013649120602","url":"https://dblp.org/rec/journals/monet/LeeL97"}, "url":"URL#6633971" }, { "@score":"1", "@id":"6633972", "info":{"authors":{"author":[{"@pid":"43/6690","text":"Hang Liu"},{"@pid":"98/1620","text":"Hairuo Ma"},{"@pid":"32/353","text":"Magda El Zarki"},{"@pid":"52/5228","text":"Sanjay Gupta"}]},"title":"Error Control Schemes for Networks: An Overview.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"167-182","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/LiuMZG97","doi":"10.1023/A:1013676531988","ee":"https://doi.org/10.1023/A:1013676531988","url":"https://dblp.org/rec/journals/monet/LiuMZG97"}, "url":"URL#6633972" }, { "@score":"1", "@id":"6633973", "info":{"authors":{"author":[{"@pid":"65/2213","text":"Te-Kai Liu"},{"@pid":"27/4662","text":"John A. Silvester"},{"@pid":"32/5934","text":"Andreas Polydoros"}]},"title":"Retransmission Control and Fairness Issue in Mobile Slotted ALOHA Networks With Fading and Near-Far Effect.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"101-110","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/LiuSP97","doi":"10.1023/A:1013212112424","ee":"https://doi.org/10.1023/A:1013212112424","url":"https://dblp.org/rec/journals/monet/LiuSP97"}, "url":"URL#6633973" }, { "@score":"1", "@id":"6633974", "info":{"authors":{"author":[{"@pid":"40/3724","text":"Kia Makki"},{"@pid":"p/NPissinou","text":"Niki Pissinou"}]},"title":"Protocols for Mobile Environments - Editorial.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"225-226","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/MakkiP97","doi":"10.1023/A:1013684701038","ee":"https://doi.org/10.1023/A:1013684701038","url":"https://dblp.org/rec/journals/monet/MakkiP97"}, "url":"URL#6633974" }, { "@score":"1", "@id":"6633975", "info":{"authors":{"author":[{"@pid":"27/526","text":"Dimitrios Makrakis"},{"@pid":"37/2978","text":"Ranjeet S. Mander"},{"@pid":"12/978","text":"Luis Orozco-Barbosa"},{"@pid":"p/PPapantoniKazakos","text":"P. Papantoni-Kazakos"}]},"title":"A Spread-Slotted Random-Access Protocol with Multi-Priority for Personal and Mobile Communication Networks Carrying Integrated Traffic.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"325-331","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/MakrakisMOP97","doi":"10.1023/A:1013605405581","ee":"https://doi.org/10.1023/A:1013605405581","url":"https://dblp.org/rec/journals/monet/MakrakisMOP97"}, "url":"URL#6633975" }, { "@score":"1", "@id":"6633976", "info":{"authors":{"author":[{"@pid":"49/5843","text":"Lazaros F. Merakos"},{"@pid":"s/IoannisStavrakakis","text":"Ioannis Stavrakakis"}]},"title":"Editorial: Channel Access in Wireless Networks.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"1-2","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/MerakosS97","doi":"10.1023/A:1013289708790","ee":"https://doi.org/10.1023/A:1013289708790","url":"https://dblp.org/rec/journals/monet/MerakosS97"}, "url":"URL#6633976" }, { "@score":"1", "@id":"6633977", "info":{"authors":{"author":{"@pid":"46/2146","text":"Wuxu Peng"}},"title":"Deadlock Detection in Communicating Finite State Machines by Even Reachability Analysis.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"251-257","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/Peng97","doi":"10.1023/A:1013640918785","ee":"https://doi.org/10.1023/A:1013640918785","url":"https://dblp.org/rec/journals/monet/Peng97"}, "url":"URL#6633977" }, { "@score":"1", "@id":"6633978", "info":{"authors":{"author":{"@pid":"r/ADRubin","text":"Aviel D. Rubin"}},"title":"Extending NCP for Protocols Using Public Keys.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"227-241","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/Rubin97","doi":"10.1023/A:1013636817876","ee":"https://doi.org/10.1023/A:1013636817876","url":"https://dblp.org/rec/journals/monet/Rubin97"}, "url":"URL#6633978" }, { "@score":"1", "@id":"6633979", "info":{"authors":{"author":[{"@pid":"s/NShivakumar","text":"Narayanan Shivakumar"},{"@pid":"j/JanJannink","text":"Jan Jannink"},{"@pid":"w/JenniferWidom","text":"Jennifer Widom"}]},"title":"Per-User Profile Replication in Mobile Environments: Algorithms, Analysis, and Simulation Results.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"129-140","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/ShivakumarJW97","doi":"10.1023/A:1013668230171","ee":"https://doi.org/10.1023/A:1013668230171","url":"https://dblp.org/rec/journals/monet/ShivakumarJW97"}, "url":"URL#6633979" }, { "@score":"1", "@id":"6633980", "info":{"authors":{"author":[{"@pid":"88/2415","text":"Werner Storz"},{"@pid":"38/4999","text":"G. Beling"}]},"title":"Transmitting Time-Critical Data Over Heterogeneous Subnetworks Using Standardized Protocols.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"243-249","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/StorzB97","doi":"10.1023/A:1013688801946","ee":"https://doi.org/10.1023/A:1013688801946","url":"https://dblp.org/rec/journals/monet/StorzB97"}, "url":"URL#6633980" }, { "@score":"1", "@id":"6633981", "info":{"authors":{"author":[{"@pid":"03/2492","text":"Zhongping Tao"},{"@pid":"b/GvBochmann","text":"Gregor von Bochmann"},{"@pid":"29/2226","text":"Rachida Dssouli"}]},"title":"A Formal Method for Synthesizing Optimized Protocol Converters and Its Application to Mobile Data Networks.","venue":"Mob. Networks Appl.","volume":"2","number":"3","pages":"259-269","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/TaoBD97","doi":"10.1023/A:1013692902855","ee":"https://doi.org/10.1023/A:1013692902855","url":"https://dblp.org/rec/journals/monet/TaoBD97"}, "url":"URL#6633981" }, { "@score":"1", "@id":"6633982", "info":{"authors":{"author":[{"@pid":"30/2696","text":"Wen-Nung Tsai"},{"@pid":"l/YiBingLin","text":"Yi-Bing Lin"}]},"title":"A Data Request Scheduling Policy for PCS Networks.","venue":"Mob. Networks Appl.","volume":"2","number":"2","pages":"141-148","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/TsaiL97","doi":"10.1023/A:1013620314242","ee":"https://doi.org/10.1023/A:1013620314242","url":"https://dblp.org/rec/journals/monet/TsaiL97"}, "url":"URL#6633982" }, { "@score":"1", "@id":"6633983", "info":{"authors":{"author":[{"@pid":"35/4308","text":"Jost Weinmiller"},{"@pid":"42/5781","text":"Morten Schläger"},{"@pid":"20/3246","text":"Andreas Festag"},{"@pid":"w/AdamWolisz","text":"Adam Wolisz"}]},"title":"Performance Study of Access Control in Wireless LANs - IEEE 802.11 DFWMAC and ETSI RES 10 Hiperlan.","venue":"Mob. Networks Appl.","volume":"2","number":"1","pages":"55-67","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/WeinmillerSFW97","doi":"10.1023/A:1013255927445","ee":"https://doi.org/10.1023/A:1013255927445","url":"https://dblp.org/rec/journals/monet/WeinmillerSFW97"}, "url":"URL#6633983" }, { "@score":"1", "@id":"6633984", "info":{"authors":{"author":[{"@pid":"66/3000","text":"Jyhi-Kong Wey"},{"@pid":"20/5454","text":"Wei-Pang Yang"},{"@pid":"39/3550","text":"Lir-Fang Sun"}]},"title":"Traffic Impacts of International Roaming on Mobile and Personal Communications with Distributed Data Management.","venue":"Mob. Networks Appl.","volume":"2","number":"4","pages":"345-356","year":"1997","type":"Journal Articles","access":"closed","key":"journals/monet/WeyYS97","doi":"10.1023/A:1013609506489","ee":"https://doi.org/10.1023/A:1013609506489","url":"https://dblp.org/rec/journals/monet/WeyYS97"}, "url":"URL#6633984" } ] } } } )