Search dblp for Publications

export results for "toc:db/journals/comcom/comcom8.bht:"

 download as .bib file

@article{DBLP:journals/comcom/ApostolopoulosP85,
  author       = {Theodore K. Apostolopoulos and
                  Emmanuel N. Protonotarios},
  title        = {Queueing analysis of buffered slotted multiple access protocols},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {9--21},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90126-4},
  doi          = {10.1016/0140-3664(85)90126-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ApostolopoulosP85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ApostolopoulosSP85,
  author       = {Theodore K. Apostolopoulos and
                  Efstathios D. Sykas and
                  Emmanuel N. Protonotarios},
  title        = {Performance analysis of a retransmission control algorithm for local
                  area networks},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {3},
  pages        = {128--140},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90153-7},
  doi          = {10.1016/0140-3664(85)90153-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ApostolopoulosSP85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Brooks85,
  author       = {Tom Brooks},
  title        = {New technologies and their implications for local area networks},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {2},
  pages        = {82--87},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90218-X},
  doi          = {10.1016/0140-3664(85)90218-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Brooks85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Chidley85,
  author       = {Jon Chidley},
  title        = {Development of the {ISDN} in the {UK}},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {6},
  pages        = {299--305},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90336-6},
  doi          = {10.1016/0140-3664(85)90336-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Chidley85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CoffieldH85,
  author       = {David Coffield and
                  David Hutchison},
  title        = {Managing local area networks},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {5},
  pages        = {240--246},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90112-4},
  doi          = {10.1016/0140-3664(85)90112-4},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/CoffieldH85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Davidson85,
  author       = {Ian Davidson},
  title        = {Testing conformance to {OSI} standards},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {170--179},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90250-6},
  doi          = {10.1016/0140-3664(85)90250-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Davidson85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FadiniMM85,
  author       = {B. Fadini and
                  Angelo Marcelli and
                  Antonino Mazzeo},
  title        = {Approach to the performance evaluation and tuning of communication
                  protocol implementation},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {2},
  pages        = {59--63},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90214-2},
  doi          = {10.1016/0140-3664(85)90214-2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/FadiniMM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Fenton85,
  author       = {Nigel Fenton},
  title        = {Network service for data exchange},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {5},
  pages        = {227--230},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90109-4},
  doi          = {10.1016/0140-3664(85)90109-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Fenton85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Grant85,
  author       = {J. S. Grant},
  title        = {Multilink - an open network for personal computers},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {27--34},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90128-8},
  doi          = {10.1016/0140-3664(85)90128-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Grant85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Housley85,
  author       = {Norman Housley},
  title        = {Issues in telecommunications planning},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {193--198},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90253-1},
  doi          = {10.1016/0140-3664(85)90253-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Housley85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Leighfield85,
  author       = {J. P. Leighfield},
  title        = {Implementing and operating a value added network},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {199--202},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90254-3},
  doi          = {10.1016/0140-3664(85)90254-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Leighfield85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Lorin85,
  author       = {Harold Lorin},
  title        = {Emerging security requirements},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {6},
  pages        = {293--298},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90335-4},
  doi          = {10.1016/0140-3664(85)90335-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Lorin85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MajithiaLP85,
  author       = {Jayanti C. Majithia and
                  San{-}qi Li and
                  Tracy Parker},
  title        = {Congestion control technique for an integrated services local area
                  network},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {180--185},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90251-8},
  doi          = {10.1016/0140-3664(85)90251-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/MajithiaLP85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Moudiotis85,
  author       = {G. Moudiotis},
  title        = {Development of {CCITT} standards for packet data networks in the period
                  1980-1984},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {186--192},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90252-X},
  doi          = {10.1016/0140-3664(85)90252-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Moudiotis85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Newton85,
  author       = {Steve Newton},
  title        = {Voice messaging systems},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {3},
  pages        = {115--120},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90151-3},
  doi          = {10.1016/0140-3664(85)90151-3},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Newton85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Price85,
  author       = {Wyn L. Price},
  title        = {Standards for data security - the state of the art},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {5},
  pages        = {231--234},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90110-0},
  doi          = {10.1016/0140-3664(85)90110-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Price85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Prycker85,
  author       = {Martin De Prycker},
  title        = {LANs in an {ISDN:} consistency with the {OSI} Reference Model},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {2},
  pages        = {74--78},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90216-6},
  doi          = {10.1016/0140-3664(85)90216-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Prycker85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RaghupatiRS85,
  author       = {M. Raghupati and
                  K. Ramkumar and
                  M. Satyam},
  title        = {Priority-oriented reservation multiple access scheme for data communication
                  through satellites},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {22--26},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90127-6},
  doi          = {10.1016/0140-3664(85)90127-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/RaghupatiRS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Rashvand85,
  author       = {H. F. Rashvand},
  title        = {Multilevel signals and trellis coding for data communication modems},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {5},
  pages        = {247--253},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90113-6},
  doi          = {10.1016/0140-3664(85)90113-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Rashvand85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Reed85,
  author       = {Terry Reed},
  title        = {Operating and managing a commercial worldwide network},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {3},
  pages        = {141--147},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90154-9},
  doi          = {10.1016/0140-3664(85)90154-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Reed85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Rich85,
  author       = {Brian Rich},
  title        = {Communications and the personal computer},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {2},
  pages        = {64--73},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90215-4},
  doi          = {10.1016/0140-3664(85)90215-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Rich85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SaundersB85,
  author       = {David Saunders and
                  Bill Brian},
  title        = {Role of technology and communications in dealing rooms},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {5},
  pages        = {254--257},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90114-8},
  doi          = {10.1016/0140-3664(85)90114-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SaundersB85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Serpell85,
  author       = {Stephen C. Serpell},
  title        = {Networking secure electronic funds transfer at point of sale},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {3--8},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90125-2},
  doi          = {10.1016/0140-3664(85)90125-2},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Serpell85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SmytheS85,
  author       = {C. Smythe and
                  C. T. Spracklen},
  title        = {Code sequence allocation in a direct sequence spread spectrum local
                  area network},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {6},
  pages        = {283--292},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90334-2},
  doi          = {10.1016/0140-3664(85)90334-2},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SmytheS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Stokes85,
  author       = {Adrian V. Stokes},
  title        = {Distributed processing: a strategy for health care computing},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {6},
  pages        = {306--315},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90337-8},
  doi          = {10.1016/0140-3664(85)90337-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Stokes85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VaradharajanS85,
  author       = {Vijay Varadharajan and
                  Peter W. Sanders},
  title        = {Practical secure electronic mail system with public key distribution},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {3},
  pages        = {121--127},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90152-5},
  doi          = {10.1016/0140-3664(85)90152-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/VaradharajanS85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WileyH85,
  author       = {A. J. Wiley and
                  David Hutchison},
  title        = {An {ISDN} for the {UK}},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {5},
  pages        = {235--239},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90111-2},
  doi          = {10.1016/0140-3664(85)90111-2},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/WileyH85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Yates85,
  author       = {Patricia Yates},
  title        = {Factory monitoring and control network},
  journal      = {Comput. Commun.},
  volume       = {8},
  number       = {2},
  pages        = {79--81},
  year         = {1985},
  url          = {https://doi.org/10.1016/0140-3664(85)90217-8},
  doi          = {10.1016/0140-3664(85)90217-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Yates85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics