Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm9.bht:"
@article{DBLP:journals/ijnm/AhnYC99, author = {Seong{-}Jin Ahn and Seung Keun Yoo and Jin{-}Wook Chung}, title = {Design and implementation of a web-based Internet performance management system using {SNMP} {MIB-II0}}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {309--321}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C309::AID-NEM339\%3E3.0.CO;2-8}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C309::AID-NEM339\%3E3.0.CO;2-8}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AhnYC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-BarrakNB99, author = {Saud Andrew Al{-}Barrak and Adnan Andrew Nouh and Saad Haj Bakry}, title = {Computer simulation for the evaluation of static and dynamic priority schemes in an {ATM} multiplexer with multimedia traffic}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {359--369}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-BarrakNB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-TawilA99, author = {Khalid Al{-}Tawil and Ibrahim A. Al{-}Kaltham}, title = {Evaluation and testing of internet firewalls}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {135--149}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C135::AID-NEM311\%3E3.0.CO;2-5}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C135::AID-NEM311\%3E3.0.CO;2-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-TawilA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Au99, author = {T. Andrew Au}, title = {Topological considerations of {ATM} networks}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {347--358}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C347::AID-NEM338\%3E3.0.CO;2-9}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C347::AID-NEM338\%3E3.0.CO;2-9}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Au99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryA99, author = {Saad Haj Bakry and Abdullah Al{-}Dhelaan}, title = {Planning information networks: the scope and the customer issues}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {28--37}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryZ99, author = {Saad Haj Bakry and Naim Zawawi}, title = {An initial zone-splitting design method for cellular telephone systems}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {291--297}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Biloon99, author = {Audrey Biloon}, title = {Caveat emptor}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {209--211}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C209::AID-NEM327\%3E3.0.CO;2-0}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C209::AID-NEM327\%3E3.0.CO;2-0}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Biloon99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CicaleseKDVZF99, author = {Cynthia Della Torre Cicalese and Martha L. Kahn and John DeCarlo and Pushkar Varna and Elizabeth D. Zeisler and Hal Folts}, title = {Intelligent interdomain distributed service management}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {2}, pages = {68--79}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C68::AID-NEM277\%3E3.0.CO;2-J}, doi = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C68::AID-NEM277\%3E3.0.CO;2-J}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/CicaleseKDVZF99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CurtisS99, author = {Walt Curtis and Lori Sinton}, title = {Securing the global, remote, mobile user}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {9--21}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C9::AID-NEM246\%3E3.0.CO;2-6}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C9::AID-NEM246\%3E3.0.CO;2-6}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/CurtisS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Deri99, author = {Luca Deri}, title = {Desktop versus web-based network management}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {371--378}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C371::AID-NEM347\%3E3.0.CO;2-Q}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C371::AID-NEM347\%3E3.0.CO;2-Q}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Deri99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Engel99, author = {Fred Engel}, title = {The role of service level agreements in the internet service provider industry}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {299--301}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C299::AID-NEM335\%3E3.0.CO;2-E}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C299::AID-NEM335\%3E3.0.CO;2-E}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Engel99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Engel99a, author = {Fred Engel}, title = {Developing standards for {IT}}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {303--304}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C303::AID-NEM336\%3E3.0.CO;2-Z}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C303::AID-NEM336\%3E3.0.CO;2-Z}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Engel99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Fuller99, author = {Wayne Fuller}, title = {Network management using expert diagnostics}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {199--208}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C199::AID-NEM324\%3E3.0.CO;2-3}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C199::AID-NEM324\%3E3.0.CO;2-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Fuller99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/GuiagoussouS99, author = {Mahamat Guiagoussou and Said Soulhi}, title = {Implementation of a diagnostic and troubleshooting multi-agent system for cellular networks}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {221--237}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C221::AID-NEM329\%3E3.0.CO;2-G}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C221::AID-NEM329\%3E3.0.CO;2-G}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/GuiagoussouS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Hac99, author = {Anna Hac}, title = {Congestion control in a wireless network}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {185--192}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C185::AID-NEM326\%3E3.0.CO;2-L}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C185::AID-NEM326\%3E3.0.CO;2-L}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Hac99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HacL99, author = {Anna Hac and Hong Lin}, title = {Congestion control for {ABR} traffic in an {ATM} network}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {249--264}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C249::AID-NEM325\%3E3.0.CO;2-2}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C249::AID-NEM325\%3E3.0.CO;2-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HacL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HacM99, author = {Anna Hac and Chunlei Mo}, title = {Dynamic channel assignment in wireless communication networks}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {44--66}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C44::AID-NEM310\%3E3.0.CO;2-T}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C44::AID-NEM310\%3E3.0.CO;2-T}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HacM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HacZ99, author = {Anna Hac and Zhu Zhu}, title = {Performance of routing schemes in wireless personal networks}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {2}, pages = {80--105}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C80::AID-NEM301\%3E3.0.CO;2-Q}, doi = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C80::AID-NEM301\%3E3.0.CO;2-Q}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HacZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HacZ99a, author = {Anna Hac and Kelei Zhou}, title = {A new heuristic algorithm for finding minimum-cost multicast trees with bounded path delay}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {265--278}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C265::AID-NEM331\%3E3.0.CO;2-N}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C265::AID-NEM331\%3E3.0.CO;2-N}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HacZ99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99, author = {Gilbert Held}, title = {Beware of a new potential liability}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {1}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C1::AID-NEM315\%3E3.0.CO;2-X}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C1::AID-NEM315\%3E3.0.CO;2-X}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99a, author = {Gilbert Held}, title = {Extend the product cycle}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {2}, pages = {67}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C67::AID-NEM322\%3E3.0.CO;2-2}, doi = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C67::AID-NEM322\%3E3.0.CO;2-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99b, author = {Gilbert Held}, title = {Network undelete for Windows {NT} 4.04}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {2}, pages = {126--132}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C126::AID-NEM323\%3E3.0.CO;2-7}, doi = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C126::AID-NEM323\%3E3.0.CO;2-7}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99c, author = {Gilbert Held}, title = {Control runaway email}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {133}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C133::AID-NEM334\%3E3.0.CO;2-0}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C133::AID-NEM334\%3E3.0.CO;2-0}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99d, author = {Gilbert Held}, title = {Working with Cisco access lists}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {151--154}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C151::AID-NEM314\%3E3.0.CO;2-6}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C151::AID-NEM314\%3E3.0.CO;2-6}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99e, author = {Gilbert Held}, title = {Diskeeper server for Windows {NT}}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {193--196}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C193::AID-NEM333\%3E3.0.CO;2-Y}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C193::AID-NEM333\%3E3.0.CO;2-Y}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99f, author = {Gilbert Held}, title = {The evil of the urge to merge}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {197}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C197::AID-NEM340\%3E3.0.CO;2-J}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C197::AID-NEM340\%3E3.0.CO;2-J}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99g, author = {Gilbert Held}, title = {Focus on WebTrends}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {279--284}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C279::AID-NEM341\%3E3.0.CO;2-9}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C279::AID-NEM341\%3E3.0.CO;2-9}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99h, author = {Gilbert Held}, title = {Father Gore needs a reality check}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {285}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C285::AID-NEM344\%3E3.0.CO;2-T}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C285::AID-NEM344\%3E3.0.CO;2-T}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99i, author = {Gilbert Held}, title = {Focus on Hyena}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {339--343}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C339::AID-NEM345\%3E3.0.CO;2-G}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C339::AID-NEM345\%3E3.0.CO;2-G}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99j, author = {Gilbert Held}, title = {Are you prepared for an Internet hoax}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {345}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C345::AID-NEM350\%3E3.0.CO;2-0}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C345::AID-NEM350\%3E3.0.CO;2-0}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held99k, author = {Gilbert Held}, title = {Focus on Cisco switch management}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {387--392}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C387::AID-NEM351\%3E3.0.CO;2-O}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C387::AID-NEM351\%3E3.0.CO;2-O}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held99k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Herscovitz99, author = {Eli Herscovitz}, title = {Secure virtual private networks: the future of data communications}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {213--220}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C213::AID-NEM328\%3E3.0.CO;2-E}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C213::AID-NEM328\%3E3.0.CO;2-E}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Herscovitz99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Hoymany99, author = {Fahad Hoymany}, title = {{ATM} adaptation layer choice for {IP-ATM} integration}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {379--386}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C379::AID-NEM352\%3E3.0.CO;2-G}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C379::AID-NEM352\%3E3.0.CO;2-G}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Hoymany99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HussainB99, author = {Iftekhar Hussain and Kuldip Bains}, title = {An explicit rate {ABR} algorithm for new-generation {ATM} switches}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {323--338}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C323::AID-NEM343\%3E3.0.CO;2-4}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C323::AID-NEM343\%3E3.0.CO;2-4}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HussainB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jenkins99, author = {Ron Jenkins}, title = {Why web-based network monitoring? Leveraging the platform}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {175--183}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C175::AID-NEM320\%3E3.0.CO;2-3}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C175::AID-NEM320\%3E3.0.CO;2-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jenkins99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LuC99, author = {Yantian Lu and Kenneth J. Christensen}, title = {Using selective discard to improve real-time video quality on an ethernet local area network}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {2}, pages = {106--117}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C106::AID-NEM312\%3E3.0.CO;2-D}, doi = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C106::AID-NEM312\%3E3.0.CO;2-D}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LuC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Muller99, author = {Nathan J. Muller}, title = {Managing service level agreements}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {155--166}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C155::AID-NEM317\%3E3.0.CO;2-M}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C155::AID-NEM317\%3E3.0.CO;2-M}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Muller99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Myerson99, author = {Judith M. Myerson}, title = {Risk management}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {305--308}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C305::AID-NEM337\%3E3.0.CO;2-Q}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C305::AID-NEM337\%3E3.0.CO;2-Q}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Myerson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nicoll99, author = {Chris Nicoll}, title = {A closer look at service level metrics}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {287--290}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C287::AID-NEM321\%3E3.0.CO;2-Y}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C287::AID-NEM321\%3E3.0.CO;2-Y}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nicoll99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen99, author = {Jesper Nilausen}, title = {{APPN} in heterogeneous environments}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {2--8}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C2::AID-NEM237\%3E3.0.CO;2-P}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C2::AID-NEM237\%3E3.0.CO;2-P}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen99a, author = {Jesper Nilausen}, title = {{APPN} - a continuous evolution}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {22--27}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C22::AID-NEM253\%3E3.0.CO;2-R}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C22::AID-NEM253\%3E3.0.CO;2-R}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Post99, author = {Stephen D. Post}, title = {Network planning with a performance-prediction tool}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {3}, pages = {167--173}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C167::AID-NEM319\%3E3.0.CO;2-9}, doi = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C167::AID-NEM319\%3E3.0.CO;2-9}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Post99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Stallings99, author = {William Stallings}, title = {Integrated services architecture: the next-generation internet}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {38--43}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C38::AID-NEM294\%3E3.0.CO;2-1}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C38::AID-NEM294\%3E3.0.CO;2-1}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Stallings99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Watson99, author = {Terry Watson}, title = {An introduction to {WAN} analysis and the {HCT-6000} protocol analyser}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {4}, pages = {239--247}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C239::AID-NEM330\%3E3.0.CO;2-H}, doi = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C239::AID-NEM330\%3E3.0.CO;2-H}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Watson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Wright99, author = {Michele Wright}, title = {Using policies for effective network management}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {2}, pages = {118--125}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C118::AID-NEM313\%3E3.0.CO;2-3}, doi = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C118::AID-NEM313\%3E3.0.CO;2-3}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Wright99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.