Search dblp for Publications

export results for "toc:db/journals/ijnm/ijnm9.bht:"

 download as .bib file

@article{DBLP:journals/ijnm/AhnYC99,
  author       = {Seong{-}Jin Ahn and
                  Seung Keun Yoo and
                  Jin{-}Wook Chung},
  title        = {Design and implementation of a web-based Internet performance management
                  system using {SNMP} {MIB-II0}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {309--321},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C309::AID-NEM339\%3E3.0.CO;2-8},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C309::AID-NEM339\%3E3.0.CO;2-8},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhnYC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-BarrakNB99,
  author       = {Saud Andrew Al{-}Barrak and
                  Adnan Andrew Nouh and
                  Saad Haj Bakry},
  title        = {Computer simulation for the evaluation of static and dynamic priority
                  schemes in an {ATM} multiplexer with multimedia traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {359--369},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-BarrakNB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-TawilA99,
  author       = {Khalid Al{-}Tawil and
                  Ibrahim A. Al{-}Kaltham},
  title        = {Evaluation and testing of internet firewalls},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {135--149},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C135::AID-NEM311\%3E3.0.CO;2-5},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C135::AID-NEM311\%3E3.0.CO;2-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-TawilA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Au99,
  author       = {T. Andrew Au},
  title        = {Topological considerations of {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {347--358},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C347::AID-NEM338\%3E3.0.CO;2-9},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C347::AID-NEM338\%3E3.0.CO;2-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Au99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryA99,
  author       = {Saad Haj Bakry and
                  Abdullah Al{-}Dhelaan},
  title        = {Planning information networks: the scope and the customer issues},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {28--37},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryZ99,
  author       = {Saad Haj Bakry and
                  Naim Zawawi},
  title        = {An initial zone-splitting design method for cellular telephone systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {291--297},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Biloon99,
  author       = {Audrey Biloon},
  title        = {Caveat emptor},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {209--211},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C209::AID-NEM327\%3E3.0.CO;2-0},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C209::AID-NEM327\%3E3.0.CO;2-0},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Biloon99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CicaleseKDVZF99,
  author       = {Cynthia Della Torre Cicalese and
                  Martha L. Kahn and
                  John DeCarlo and
                  Pushkar Varna and
                  Elizabeth D. Zeisler and
                  Hal Folts},
  title        = {Intelligent interdomain distributed service management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {68--79},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C68::AID-NEM277\%3E3.0.CO;2-J},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C68::AID-NEM277\%3E3.0.CO;2-J},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CicaleseKDVZF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurtisS99,
  author       = {Walt Curtis and
                  Lori Sinton},
  title        = {Securing the global, remote, mobile user},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {9--21},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C9::AID-NEM246\%3E3.0.CO;2-6},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C9::AID-NEM246\%3E3.0.CO;2-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurtisS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Deri99,
  author       = {Luca Deri},
  title        = {Desktop versus web-based network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {371--378},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C371::AID-NEM347\%3E3.0.CO;2-Q},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C371::AID-NEM347\%3E3.0.CO;2-Q},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Deri99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Engel99,
  author       = {Fred Engel},
  title        = {The role of service level agreements in the internet service provider
                  industry},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {299--301},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C299::AID-NEM335\%3E3.0.CO;2-E},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C299::AID-NEM335\%3E3.0.CO;2-E},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Engel99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Engel99a,
  author       = {Fred Engel},
  title        = {Developing standards for {IT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {303--304},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C303::AID-NEM336\%3E3.0.CO;2-Z},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C303::AID-NEM336\%3E3.0.CO;2-Z},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Engel99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Fuller99,
  author       = {Wayne Fuller},
  title        = {Network management using expert diagnostics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {199--208},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C199::AID-NEM324\%3E3.0.CO;2-3},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C199::AID-NEM324\%3E3.0.CO;2-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Fuller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GuiagoussouS99,
  author       = {Mahamat Guiagoussou and
                  Said Soulhi},
  title        = {Implementation of a diagnostic and troubleshooting multi-agent system
                  for cellular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {221--237},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C221::AID-NEM329\%3E3.0.CO;2-G},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C221::AID-NEM329\%3E3.0.CO;2-G},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GuiagoussouS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hac99,
  author       = {Anna Hac},
  title        = {Congestion control in a wireless network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {185--192},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C185::AID-NEM326\%3E3.0.CO;2-L},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C185::AID-NEM326\%3E3.0.CO;2-L},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hac99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacL99,
  author       = {Anna Hac and
                  Hong Lin},
  title        = {Congestion control for {ABR} traffic in an {ATM} network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {249--264},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C249::AID-NEM325\%3E3.0.CO;2-2},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C249::AID-NEM325\%3E3.0.CO;2-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacM99,
  author       = {Anna Hac and
                  Chunlei Mo},
  title        = {Dynamic channel assignment in wireless communication networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {44--66},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C44::AID-NEM310\%3E3.0.CO;2-T},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C44::AID-NEM310\%3E3.0.CO;2-T},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacZ99,
  author       = {Anna Hac and
                  Zhu Zhu},
  title        = {Performance of routing schemes in wireless personal networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {80--105},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C80::AID-NEM301\%3E3.0.CO;2-Q},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C80::AID-NEM301\%3E3.0.CO;2-Q},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacZ99a,
  author       = {Anna Hac and
                  Kelei Zhou},
  title        = {A new heuristic algorithm for finding minimum-cost multicast trees
                  with bounded path delay},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {265--278},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C265::AID-NEM331\%3E3.0.CO;2-N},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C265::AID-NEM331\%3E3.0.CO;2-N},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacZ99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99,
  author       = {Gilbert Held},
  title        = {Beware of a new potential liability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {1},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C1::AID-NEM315\%3E3.0.CO;2-X},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C1::AID-NEM315\%3E3.0.CO;2-X},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99a,
  author       = {Gilbert Held},
  title        = {Extend the product cycle},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {67},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C67::AID-NEM322\%3E3.0.CO;2-2},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C67::AID-NEM322\%3E3.0.CO;2-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99b,
  author       = {Gilbert Held},
  title        = {Network undelete for Windows {NT} 4.04},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {126--132},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C126::AID-NEM323\%3E3.0.CO;2-7},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C126::AID-NEM323\%3E3.0.CO;2-7},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99c,
  author       = {Gilbert Held},
  title        = {Control runaway email},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {133},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C133::AID-NEM334\%3E3.0.CO;2-0},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C133::AID-NEM334\%3E3.0.CO;2-0},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99d,
  author       = {Gilbert Held},
  title        = {Working with Cisco access lists},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {151--154},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C151::AID-NEM314\%3E3.0.CO;2-6},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C151::AID-NEM314\%3E3.0.CO;2-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99e,
  author       = {Gilbert Held},
  title        = {Diskeeper server for Windows {NT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {193--196},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C193::AID-NEM333\%3E3.0.CO;2-Y},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C193::AID-NEM333\%3E3.0.CO;2-Y},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99f,
  author       = {Gilbert Held},
  title        = {The evil of the urge to merge},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {197},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C197::AID-NEM340\%3E3.0.CO;2-J},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C197::AID-NEM340\%3E3.0.CO;2-J},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99g,
  author       = {Gilbert Held},
  title        = {Focus on WebTrends},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {279--284},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C279::AID-NEM341\%3E3.0.CO;2-9},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C279::AID-NEM341\%3E3.0.CO;2-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99h,
  author       = {Gilbert Held},
  title        = {Father Gore needs a reality check},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {285},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C285::AID-NEM344\%3E3.0.CO;2-T},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C285::AID-NEM344\%3E3.0.CO;2-T},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99i,
  author       = {Gilbert Held},
  title        = {Focus on Hyena},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {339--343},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C339::AID-NEM345\%3E3.0.CO;2-G},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C339::AID-NEM345\%3E3.0.CO;2-G},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99j,
  author       = {Gilbert Held},
  title        = {Are you prepared for an Internet hoax},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {345},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C345::AID-NEM350\%3E3.0.CO;2-0},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C345::AID-NEM350\%3E3.0.CO;2-0},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99k,
  author       = {Gilbert Held},
  title        = {Focus on Cisco switch management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {387--392},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C387::AID-NEM351\%3E3.0.CO;2-O},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C387::AID-NEM351\%3E3.0.CO;2-O},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Herscovitz99,
  author       = {Eli Herscovitz},
  title        = {Secure virtual private networks: the future of data communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {213--220},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C213::AID-NEM328\%3E3.0.CO;2-E},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C213::AID-NEM328\%3E3.0.CO;2-E},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Herscovitz99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hoymany99,
  author       = {Fahad Hoymany},
  title        = {{ATM} adaptation layer choice for {IP-ATM} integration},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {379--386},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C379::AID-NEM352\%3E3.0.CO;2-G},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C379::AID-NEM352\%3E3.0.CO;2-G},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hoymany99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HussainB99,
  author       = {Iftekhar Hussain and
                  Kuldip Bains},
  title        = {An explicit rate {ABR} algorithm for new-generation {ATM} switches},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {323--338},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C323::AID-NEM343\%3E3.0.CO;2-4},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C323::AID-NEM343\%3E3.0.CO;2-4},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HussainB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jenkins99,
  author       = {Ron Jenkins},
  title        = {Why web-based network monitoring? Leveraging the platform},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {175--183},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C175::AID-NEM320\%3E3.0.CO;2-3},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C175::AID-NEM320\%3E3.0.CO;2-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jenkins99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LuC99,
  author       = {Yantian Lu and
                  Kenneth J. Christensen},
  title        = {Using selective discard to improve real-time video quality on an ethernet
                  local area network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {106--117},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C106::AID-NEM312\%3E3.0.CO;2-D},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C106::AID-NEM312\%3E3.0.CO;2-D},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LuC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller99,
  author       = {Nathan J. Muller},
  title        = {Managing service level agreements},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {155--166},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C155::AID-NEM317\%3E3.0.CO;2-M},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C155::AID-NEM317\%3E3.0.CO;2-M},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Myerson99,
  author       = {Judith M. Myerson},
  title        = {Risk management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {305--308},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C305::AID-NEM337\%3E3.0.CO;2-Q},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C305::AID-NEM337\%3E3.0.CO;2-Q},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Myerson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nicoll99,
  author       = {Chris Nicoll},
  title        = {A closer look at service level metrics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {287--290},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C287::AID-NEM321\%3E3.0.CO;2-Y},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C287::AID-NEM321\%3E3.0.CO;2-Y},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nicoll99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen99,
  author       = {Jesper Nilausen},
  title        = {{APPN} in heterogeneous environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {2--8},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C2::AID-NEM237\%3E3.0.CO;2-P},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C2::AID-NEM237\%3E3.0.CO;2-P},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen99a,
  author       = {Jesper Nilausen},
  title        = {{APPN} - a continuous evolution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {22--27},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C22::AID-NEM253\%3E3.0.CO;2-R},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C22::AID-NEM253\%3E3.0.CO;2-R},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Post99,
  author       = {Stephen D. Post},
  title        = {Network planning with a performance-prediction tool},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {167--173},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C167::AID-NEM319\%3E3.0.CO;2-9},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C167::AID-NEM319\%3E3.0.CO;2-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Post99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Stallings99,
  author       = {William Stallings},
  title        = {Integrated services architecture: the next-generation internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {38--43},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C38::AID-NEM294\%3E3.0.CO;2-1},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C38::AID-NEM294\%3E3.0.CO;2-1},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Stallings99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Watson99,
  author       = {Terry Watson},
  title        = {An introduction to {WAN} analysis and the {HCT-6000} protocol analyser},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {239--247},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C239::AID-NEM330\%3E3.0.CO;2-H},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C239::AID-NEM330\%3E3.0.CO;2-H},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Watson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Wright99,
  author       = {Michele Wright},
  title        = {Using policies for effective network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {118--125},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C118::AID-NEM313\%3E3.0.CO;2-3},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C118::AID-NEM313\%3E3.0.CO;2-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Wright99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics