default search action
Computer Communications, Volume 22
Volume 22, Number 1, 15 January 1999
- Sheng-Tzong Cheng:
Backtrack Routing and Priority-Based Wavelength Assignment in WDM Networks. Comput. Commun. 22(1): 1-10 (1999) - Georgios I. Papadimitriou:
Centralized Packet Filtering Protocols: A New Family of MAC Protocols for WDM Star Networks. Comput. Commun. 22(1): 11-19 (1999) - Periklis Tsingotjidis, Jeremiah F. Hayes:
Proactive Congestion Controls for the Support of Variable Bit Rate Services on Broadband satellite Networks - A Feasibility Study. Comput. Commun. 22(1): 20-29 (1999) - Nada Golmie, Mark D. Corner, Jörg Liebeherr, David H. Su:
ATM Traffic Control in Hybrid Fiber-Coax Networks - Problems and Solutions. Comput. Commun. 22(1): 30-39 (1999) - Xinyu Wang, James S. Meditch:
Adaptive Wavelet Predictor to Improve Bandwidth Allocation Efficiency of VBR Video Traffic. Comput. Commun. 22(1): 40-45 (1999) - Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu:
Optimal Assignment of Mobile Agents for Software Authorization and Protection. Comput. Commun. 22(1): 46-55 (1999) - Jau-Hsiung Huang, Chun-Chuan Yang, Nai-Cheng Fang:
A Novel Congestion Control Mechanism for Multicast Real-Time Connections. Comput. Commun. 22(1): 56-72 (1999) - Wen-Shenq Juang, Chin-Laung Lei:
Partially Blind Threshold signatures Based on Discrete Logarithm. Comput. Commun. 22(1): 73-86 (1999) - Narn-Yih Lee, Tzonelih Hwang:
Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy". Comput. Commun. 22(1): 87-89 (1999)
Volume 22, Number 2, 25 January 1999
- Jung-Shian Li, Adam Wolisz, Radu Popescu-Zeletin:
Measurement and Performance Evaluation of NFS Traffic in ATM Network. Comput. Commun. 22(2): 101-109 (1999) - Hasan Cam:
A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network. Comput. Commun. 22(2): 110-119 (1999) - Robert M. Hierons:
Minimizing the Cost of Fault Location when Testing from a Finite State Machine. Comput. Commun. 22(2): 120-127 (1999) - Samphel Norden, S. Balaji, G. Manimaran, C. Siva Ram Murthy:
Deterministic Protocols for Real-Time Communication in Multiple Access Networks. Comput. Commun. 22(2): 128-136 (1999) - Yong Lee, JooSeok Song:
An Overload Control of SCP in Advanced Intelligent Network with Fairness and Priority. Comput. Commun. 22(2): 137-143 (1999) - Jhyda Lin, Ruay Shiung Chang:
A Comparison of the Internet Multicast Routing Protocols. Comput. Commun. 22(2): 144-155 (1999) - Debanjan Saha, M. D. Purkayastha, Amitava Mukherjee:
An Approach to Wide Area WDM Optical Network Design Using Genetic Algorithm. Comput. Commun. 22(2): 156-172 (1999) - Sooyong Kang, Heon Young Yeom:
Transmission of Video Streams with Constant Bandwidth Allocation. Comput. Commun. 22(2): 173-180 (1999) - Chor Ping Low:
Loop-Free Multicast Routing with End-to-End Delay Constraint. Comput. Commun. 22(2): 181-192 (1999) - Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun:
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Comput. Commun. 22(2): 193-194 (1999)
Volume 22, Number 3, February 1999
- Giuseppe Ficili, Daniela Panno:
A fuzzy algorithm for combined control of traffic parameters: assessment and key issues. 199-210 - Stefan Fischer:
Towards the automatic generation of quality-of-service-preserving implementations from formal specifications. 211-223 - W. K. Lai, R. F. Chang:
Virtual path layout in ATM networks based on the P-median problem. 224-231 - Gurusamy Mohan, C. Siva Ram Murthy:
Efficient algorithms for wavelength rerouting in WDM multi-fiber unidirectional ring networks. 232-243 - K. R. Venugopal, E. Ezhil Rajan, P. Sreenivasa Kumar:
Impact of wavelength converters in wavelength routed all-optical networks. 244-257 - Vincenzo Catania, Giuseppe Ficili, Daniela Panno:
On the impact of traffic control algorithms on resource management in ATM networks. 258-265 - D. Venkatesulu, Timothy A. Gonsalves:
Efficient fault-tolerant reliable broadcast in a multi-switch extended LAN. 266-278 - Wei-Chi Ku, Sheng-De Wang:
A secure and practical electronic voting scheme. 279-286 - Narn-Yih Lee, Tzonelih Hwang:
On the security of fair blind signature scheme using oblivious transfer. 287-290
- Rita Puzmanova:
Daniel Minoli and Andrew Schmidt: Network Layer Switched Services. 291-292
Volume 22, Number 4, March 1999
- Neeraj K. Sharma:
Review of recent shared memory based ATM switches. 297-316 - Ibrahim W. Habib, Tarek N. Saadawi:
Dynamic bandwidth control in ATM networks. 317-339 - Elias Drakopoulos:
Enterprise network planning and design: methodology and application. 340-352 - Anirban Roy, Pallapa Venkataram:
A multiple access scheme for VBR traffic in broadband wireless local communication. 353-360 - Evangelia Tzifa, Panagiotis Demestichas, Malamati D. Louta, E. S. Tsouka, Michael E. Theologou, Miltiades E. Anagnostou:
Adaptive radio spectrum allocation through mid-term reconfigurations for cellular communications systems. 361-375 - Robert Leslie, Sati McKenzie:
Evaluation of loadsharing algorithms for heterogeneous distributed systems. 376-389 - Kaijun Tan, Hongwen Zhu:
Remote password authentication scheme based on cross-product. 390-393
Volume 22, Number 5, April 1999
- Reuven Cohen:
An efficient scheme for accommodating synchronous traffic in a cable-modem network while avoiding segmentation of asynchronous packets. 399-410 - Gung-Chou Lai, Ruay Shiung Chang:
Support QoS in IP over ATM. 411-418 - Li-Shen Juhn, Li-Ming Tseng:
Achieve high accuracy of network time with proper parameters. 419-431 - Chi-Chun Lo, Shing Hong Chen:
A scheduling-based event correlation scheme for fault identification in communications network. 432-438 - Diane Gan, Sati McKenzie:
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket. 439-450 - Y. J. Cho:
Discrete-time analysis of throughput and response time for LAP derivative protocols under Markovian block-error pattern. 451-462 - R. Radhakrishna Pillai, Su Kwe Long, Jit Biswas, Chen-Khong Tham:
Call performance studies on the ATM forum UNI signalling implementations. 463-469 - Tae-Joon Kim, Byung-Choel Shin:
Improving the performance of distributed queue dual bus with slot reuse at overload conditions. 470-482 - Chin-Ling Chen, Ruay Shiung Chang:
Dynamic priority transmission mechanism for DQDB. 483-490
- Rolf Oppliger:
D. B. Parker: Fighting computer crimes: a new framework for protecting information. 491-492 - Z. Fan:
G. N. Higginbottom: Performance evaluation of communication networks. 492 - Jerzy Wechta:
B. Haverkort: Performance of computer communication systems. 492-493 - Tee Hiang Cheng, Andrew T. Campbell, Klara Nahrstedt:
Building QoS into distributed systems. 493-494
Volume 22, Number 6, April 1999
- Z. Fan:
New trends in ATM networks: a research view. 499-515 - Mahmoud Saleh, Mohammed Atiquzzaman:
An accurate performance model of shared buffer ATM switches under hot spot traffic. 516-522 - Gee-Swee Poo, Q. Zeng:
Design, implementation and performance study of reliable transactions in X.500 directory service. 523-542 - W. K. Lai, J.-Y. Tsai:
A flow control scheme on ATM networks with max-min fairness. 543-555 - Woei Lin, Wen-Shyen E. Chen:
Efficient nonblocking multicast communications on baseline networks. 556-567 - Kee Chaing Chua, Y. Z. Li, C. C. Foo:
On a Linux implementation of mobile IP and its effects on TCP performance. 568-588
- Rita Puzmanova:
Virtual LANs: construction, implementation, and management. New York: John Wiley and Sons, 1997, ISBN 0-471-17732-6, US$ 39.33, 321 pages: High-speed networking with LAN switches. 589-590 - Tom Pfeifer:
Speech technology for telecommunications - BT telecommunication series; Vol. 11; F.A. Westall, R.D. Johnston, A.V. Lewis (Eds.). 590 - Robert H. Deng:
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. 591
Volume 22, Number 7, May 1999
- Senad Busovaca:
Editorial. 597- - Yuanyuan Yang:
An analytical model for the performance of buffered multicast banyan networks. 598-607 - Dimiter R. Avresky, Vladimir Shurbanov, Robert W. Horst:
Optimizing router arbitration in point-to-point networks. 608-620 - S. A. M. Makki:
Eulerian tour construction in a distributed environment. 621-628 - Farid G. Hatefi, Forouzan Golshani:
A new framework for secure network management. 629-636 - Kia Makki, Niki Pissinou:
Efficient detection and resolution of deadlocks in distributed databases. 637-643 - Mohammad S. Obaidat, Jun Teng:
A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks. 644-650 - Niki Pissinou, Kia Makki, William J. Campbell:
On the design of a location and query management strategy for mobile and wireless environments. 651-666 - Jaihyung Cho, James Breen:
Analysis of the performance of dynamic multicast routing algorithms. 667-674 - Jerrold F. Stach, Eun Kyo Park, Kia Makki:
Performance of an enhanced GSM protocol supporting non-repudiation of service. 675-680 - Dimiter R. Avresky:
Formal verification and testing of protocols. 681-690
Volume 22, Number 8, May 1999
- Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis:
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. 697-709 - Jianying Zhou, Kwok-Yan Lam:
Securing digital signatures for non-repudiation. 710-716 - Hung-Min Sun:
An efficient nonrepudiable threshold proxy signature scheme with known signers. 717-722 - Wei-Hua He, Tzong-Chen Wu:
Cryptanalysis of Lee and Chang's ID-based information security functions. 723-726 - Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang:
New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. 727-729 - Narn-Yih Lee, Tzonelih Hwang:
Group-oriented undeniable signature schemes with a trusted center. 730-734 - Kaijun Tan, Hongwen Zhu:
A conference key distribution scheme based on the theory of quadratic residues. 735-738 - B. Zhan, Z. Li, Y. Yang, Z. Hu:
On the security of HY-key authentication scheme. 739-741 - Min-Shiang Hwang:
Cryptanalysis of a remote login authentication scheme. 742-744 - Hung-Min Sun:
On-line multiple secret sharing based on a one-way function. 745-748 - Yuh-Min Tseng, Jinn-ke Jan:
Anonymous conference key distribution systems based on the discrete logarithm problem. 749-754 - Kaijun Tan, Hongwen Zhu:
General secret sharing scheme. 755-757 - Valdemar Cardoso da Rocha Jr., David Lopes de Macêdo:
A secret-key cipher based on a non-linear structured code. 758-761 - Kaijun Tan, Hongwen Zhu, S.-J. Gu:
Cheater identification in (t, n) threshold scheme. 762-765
Volume 22, Number 9, June 1999
- Ming-Huang Guo, Ruay Shiung Chang:
Design issues for multicast ATM switches. 771-777 - Giovanni Fruscio, A. Ishaq, Valentina Petrone:
A signalling server prototype for the support of multipoint to multipoint multimedia services. 778-791 - HungKei Keith Chow, Alberto Leon-Garcia:
Integrated services internet with RSVP over ATM short cuts: Implementation and performance evaluation. 792-802 - Tee-Hiang Cheng, Y.-K. Sze, Wesley Chee-Wah Tan:
A heuristic algorithm for allocating virtual path bandwidth in an ATM network. 803-810 - Georgios I. Papadimitriou, Amalia N. Miliou, Andreas S. Pomportsis:
OCON: an optically controlled optical network. 811-824 - Ahmed E. Kamal, Hossam S. Hassanein:
Capacity enhancement of local area bus networks using wavelength division multiplexing. 825-839 - Debabrata Das, S. S. Saini, Debasish Datta:
Performance analysis of computer networks employing linked-cluster topology with single-wavelength and WDM optical backbones. 840-848 - Liren Zhang, Chih-Hong Eyoh, Chee Hock Ng:
An ATM cross-connecting node using optical CDMA. 849-857 - Hairong Sun, Xinyu Zang, Kishor S. Trivedi:
A stochastic reward net model for performance analysis of prioritized DQDB MAN. 858-870 - Chien-Yuan Chen, T.-C. Liu:
A fast modular multiplication method based on the Lempel-Ziv binary tree. 871-874
- Y.-C. Chen:
M. Sexton, A. Reid: Broadband networking: ATM, SDH and SONET. 875 - Debashis Saha:
Mobile systems. I. Groves (Ed.). 876 - Debashis Saha:
Broadband communications: the future of telecommunications by P. Kuhn & R. Ulrich (Eds.). 877-878
Volume 22, Number 10, June 1999
- B. Harris, Ray Hunt:
TCP/IP security threats and attack methods. 885-897 - Cheng-Shong Wu, Steven Shi-Wei Lee:
Backup VP planning for multicast connections in ATM networks. 898-906 - Q. Wu, Thierry Divoux, Francis LePage:
Integrating multimedia communications into an MMS environment. 907-918 - Israel Cidon, Raphael Rom, Yuval Shavitt:
Bandwidth reservation for bursty traffic in the presence of resource availability uncertainty. 919-929 - Joseph Kee-Yin Ng, Victor C. S. Lee:
Transmitting real-time VBR traffic with QoS control in a timed token medium access control network. 930-941 - George Mamais, George A. Politis, Iakovos S. Venieris:
Design and implementation of a broadband intelligent peripheral. 942-954 - Jerzy Wechta, Armin Eberlein, Fred Halsall:
The impact of topology and choice of TCP window size on the performance of switched LANs. 955-965 - Tong Shan, Oliver W. W. Yang:
An efficient admission control scheme for the real-time VBR traffic in the ATM network: deterministic bandwidth allocation. 966-979
- Georgios I. Papadimitriou, Andreas S. Pomportsis:
Optical network design and modelling, by H.R. van As, A. Jukan (Eds.). 980 - Hairong Sun:
Performance Modelling with Deterministic and Stochastic Petri Nets; C. Lindemann (Ed.). 980 - Yonghuan Cao, Hairong Sun:
Quality of service: delivering QoS on the internet and in corporate networks; P. Ferguson, G. Huston. 981
Volume 22, Number 11, July 1999
- Gee-Swee Poo, Andrzej M. Goscinski:
Introduction to special issue on network-based parallel and distributed computing. 987-988 - Amnon Barak, Ilia Gilderman, Igor Metrik:
Performance of the communication layers of TCP/IP with the Myrinet gigabit LAN. 989-997 - Andrzej M. Goscinski:
Finding, expressing and managing parallelism in programs executed on clusters of workstations. 998-1016 - Shiping Chen, Jingling Xue:
Partitioning and scheduling loops on NOWs. 1017-1033 - Micah Beck, Henri Casanova, Jack J. Dongarra, Terry Moore, James S. Plank, Francine Berman, Richard Wolski:
Logistical quality of service in NetSolve. 1034-1044 - Peter J. Keleher:
Update protocols and cluster-based shared memory. 1045-1055 - Wanlei Zhou:
Detecting and tolerating failures in a loosely integrated heterogeneous database system. 1056-1067 - Wanlei Zhu, Tyng-Yeu Liang, Ce-Kuen Shieh:
A Hopfield neural network based task mapping method. 1068-1079
Volume 22, Number 12, July 1999
- Sonia Fahmy, Raj Jain, Rohit Goyal, Bobby Vandalore, Shivkumar Kalyanaraman:
Design and evaluation of feedback consolidation for ABR point-to-multipoint connections in ATM networks. 1085-1103 - Tomaz Klobucar, Borka Jerman-Blazic:
A formalisation and evaluation of certificate policies. 1104-1110 - Liren Zhang, Kee Way Ng, Chee Hock Ng, K. R. Subramanian:
Incorporating priority scheme in IPv6 over ATM networks. 1111-1122 - G. Mueller, Peter W. Sanders, J. Allen:
Traffic profiles and application signatures. 1123-1126 - N. Swaminathan, Jagannathan Srinivasan, S. V. Raghavan:
Bandwidth-demand prediction in virtual path in ATM networks using genetic algorithms. 1127-1135 - Yihong Long, T. K. Ho, Ahmad B. Rad, Stephen P. S. Lam:
A Sigma GIi/D/1/infinity queue with heterogeneous input/output slot times. 1136-1149 - Ki-Ho Cho, Hyunsoo Yoon:
Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees. 1150-1159