Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/comcom/comcom8.bht:"
@article{DBLP:journals/comcom/ApostolopoulosP85, author = {Theodore K. Apostolopoulos and Emmanuel N. Protonotarios}, title = {Queueing analysis of buffered slotted multiple access protocols}, journal = {Comput. Commun.}, volume = {8}, number = {1}, pages = {9--21}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90126-4}, doi = {10.1016/0140-3664(85)90126-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ApostolopoulosP85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ApostolopoulosSP85, author = {Theodore K. Apostolopoulos and Efstathios D. Sykas and Emmanuel N. Protonotarios}, title = {Performance analysis of a retransmission control algorithm for local area networks}, journal = {Comput. Commun.}, volume = {8}, number = {3}, pages = {128--140}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90153-7}, doi = {10.1016/0140-3664(85)90153-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ApostolopoulosSP85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Brooks85, author = {Tom Brooks}, title = {New technologies and their implications for local area networks}, journal = {Comput. Commun.}, volume = {8}, number = {2}, pages = {82--87}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90218-X}, doi = {10.1016/0140-3664(85)90218-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Brooks85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Chidley85, author = {Jon Chidley}, title = {Development of the {ISDN} in the {UK}}, journal = {Comput. Commun.}, volume = {8}, number = {6}, pages = {299--305}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90336-6}, doi = {10.1016/0140-3664(85)90336-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Chidley85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CoffieldH85, author = {David Coffield and David Hutchison}, title = {Managing local area networks}, journal = {Comput. Commun.}, volume = {8}, number = {5}, pages = {240--246}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90112-4}, doi = {10.1016/0140-3664(85)90112-4}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/CoffieldH85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Davidson85, author = {Ian Davidson}, title = {Testing conformance to {OSI} standards}, journal = {Comput. Commun.}, volume = {8}, number = {4}, pages = {170--179}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90250-6}, doi = {10.1016/0140-3664(85)90250-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Davidson85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FadiniMM85, author = {B. Fadini and Angelo Marcelli and Antonino Mazzeo}, title = {Approach to the performance evaluation and tuning of communication protocol implementation}, journal = {Comput. Commun.}, volume = {8}, number = {2}, pages = {59--63}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90214-2}, doi = {10.1016/0140-3664(85)90214-2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/FadiniMM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Fenton85, author = {Nigel Fenton}, title = {Network service for data exchange}, journal = {Comput. Commun.}, volume = {8}, number = {5}, pages = {227--230}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90109-4}, doi = {10.1016/0140-3664(85)90109-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Fenton85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Grant85, author = {J. S. Grant}, title = {Multilink - an open network for personal computers}, journal = {Comput. Commun.}, volume = {8}, number = {1}, pages = {27--34}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90128-8}, doi = {10.1016/0140-3664(85)90128-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Grant85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Housley85, author = {Norman Housley}, title = {Issues in telecommunications planning}, journal = {Comput. Commun.}, volume = {8}, number = {4}, pages = {193--198}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90253-1}, doi = {10.1016/0140-3664(85)90253-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Housley85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Leighfield85, author = {J. P. Leighfield}, title = {Implementing and operating a value added network}, journal = {Comput. Commun.}, volume = {8}, number = {4}, pages = {199--202}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90254-3}, doi = {10.1016/0140-3664(85)90254-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Leighfield85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Lorin85, author = {Harold Lorin}, title = {Emerging security requirements}, journal = {Comput. Commun.}, volume = {8}, number = {6}, pages = {293--298}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90335-4}, doi = {10.1016/0140-3664(85)90335-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Lorin85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/MajithiaLP85, author = {Jayanti C. Majithia and San{-}qi Li and Tracy Parker}, title = {Congestion control technique for an integrated services local area network}, journal = {Comput. Commun.}, volume = {8}, number = {4}, pages = {180--185}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90251-8}, doi = {10.1016/0140-3664(85)90251-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/MajithiaLP85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Moudiotis85, author = {G. Moudiotis}, title = {Development of {CCITT} standards for packet data networks in the period 1980-1984}, journal = {Comput. Commun.}, volume = {8}, number = {4}, pages = {186--192}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90252-X}, doi = {10.1016/0140-3664(85)90252-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Moudiotis85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Newton85, author = {Steve Newton}, title = {Voice messaging systems}, journal = {Comput. Commun.}, volume = {8}, number = {3}, pages = {115--120}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90151-3}, doi = {10.1016/0140-3664(85)90151-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Newton85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Price85, author = {Wyn L. Price}, title = {Standards for data security - the state of the art}, journal = {Comput. Commun.}, volume = {8}, number = {5}, pages = {231--234}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90110-0}, doi = {10.1016/0140-3664(85)90110-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Price85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Prycker85, author = {Martin De Prycker}, title = {LANs in an {ISDN:} consistency with the {OSI} Reference Model}, journal = {Comput. Commun.}, volume = {8}, number = {2}, pages = {74--78}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90216-6}, doi = {10.1016/0140-3664(85)90216-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Prycker85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/RaghupatiRS85, author = {M. Raghupati and K. Ramkumar and M. Satyam}, title = {Priority-oriented reservation multiple access scheme for data communication through satellites}, journal = {Comput. Commun.}, volume = {8}, number = {1}, pages = {22--26}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90127-6}, doi = {10.1016/0140-3664(85)90127-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/RaghupatiRS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Rashvand85, author = {H. F. Rashvand}, title = {Multilevel signals and trellis coding for data communication modems}, journal = {Comput. Commun.}, volume = {8}, number = {5}, pages = {247--253}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90113-6}, doi = {10.1016/0140-3664(85)90113-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Rashvand85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Reed85, author = {Terry Reed}, title = {Operating and managing a commercial worldwide network}, journal = {Comput. Commun.}, volume = {8}, number = {3}, pages = {141--147}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90154-9}, doi = {10.1016/0140-3664(85)90154-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Reed85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Rich85, author = {Brian Rich}, title = {Communications and the personal computer}, journal = {Comput. Commun.}, volume = {8}, number = {2}, pages = {64--73}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90215-4}, doi = {10.1016/0140-3664(85)90215-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Rich85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SaundersB85, author = {David Saunders and Bill Brian}, title = {Role of technology and communications in dealing rooms}, journal = {Comput. Commun.}, volume = {8}, number = {5}, pages = {254--257}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90114-8}, doi = {10.1016/0140-3664(85)90114-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SaundersB85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Serpell85, author = {Stephen C. Serpell}, title = {Networking secure electronic funds transfer at point of sale}, journal = {Comput. Commun.}, volume = {8}, number = {1}, pages = {3--8}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90125-2}, doi = {10.1016/0140-3664(85)90125-2}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Serpell85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SmytheS85, author = {C. Smythe and C. T. Spracklen}, title = {Code sequence allocation in a direct sequence spread spectrum local area network}, journal = {Comput. Commun.}, volume = {8}, number = {6}, pages = {283--292}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90334-2}, doi = {10.1016/0140-3664(85)90334-2}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SmytheS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Stokes85, author = {Adrian V. Stokes}, title = {Distributed processing: a strategy for health care computing}, journal = {Comput. Commun.}, volume = {8}, number = {6}, pages = {306--315}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90337-8}, doi = {10.1016/0140-3664(85)90337-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Stokes85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/VaradharajanS85, author = {Vijay Varadharajan and Peter W. Sanders}, title = {Practical secure electronic mail system with public key distribution}, journal = {Comput. Commun.}, volume = {8}, number = {3}, pages = {121--127}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90152-5}, doi = {10.1016/0140-3664(85)90152-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/VaradharajanS85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WileyH85, author = {A. J. Wiley and David Hutchison}, title = {An {ISDN} for the {UK}}, journal = {Comput. Commun.}, volume = {8}, number = {5}, pages = {235--239}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90111-2}, doi = {10.1016/0140-3664(85)90111-2}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/WileyH85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Yates85, author = {Patricia Yates}, title = {Factory monitoring and control network}, journal = {Comput. Commun.}, volume = {8}, number = {2}, pages = {79--81}, year = {1985}, url = {https://doi.org/10.1016/0140-3664(85)90217-8}, doi = {10.1016/0140-3664(85)90217-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Yates85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.