Search dblp for Publications

export results for "toc:db/journals/bell/bell12.bht:"

 download as .bib file

@article{DBLP:journals/bell/Burns08,
  author       = {Michael J. Burns},
  title        = {Deploying, hardening, and benefiting from next-generation networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {1--4},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20262},
  doi          = {10.1002/BLTJ.20262},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/Burns08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/CalinMMZ08,
  author       = {Doru Calin and
                  Andrew Mackay and
                  Thomas B. Morawski and
                  Hardy Zhang},
  title        = {An approach for just-in-time radio access network capacity planning
                  in {CDMA} networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {67--82},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20267},
  doi          = {10.1002/BLTJ.20267},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/CalinMMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ErmanM08,
  author       = {Bilgehan Erman and
                  Elissa P. Matthews},
  title        = {Analysis and realization of {IPTV} service quality},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {195--212},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20276},
  doi          = {10.1002/BLTJ.20276},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/ErmanM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Hao08,
  author       = {Qingwang Michael Hao},
  title        = {Toward a unified service delivery process for next-generation services},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {5--20},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20263},
  doi          = {10.1002/BLTJ.20263},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/Hao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/IsukapalliBPF08,
  author       = {Ramana Isukapalli and
                  Steven A. Benno and
                  Candace Park and
                  Peretz Feder},
  title        = {Advanced {IMS} client supporting secure signaling},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {49--65},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20266},
  doi          = {10.1002/BLTJ.20266},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/IsukapalliBPF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Joseph08,
  author       = {Jean{-}Philippe Joseph},
  title        = {{IMS} network signaling peering: Challenges and proposal},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {33--48},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20265},
  doi          = {10.1002/BLTJ.20265},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/Joseph08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KirovaKKC08,
  author       = {Vassilka Kirova and
                  Neil Kirby and
                  Darshak Kothari and
                  Glenda Childress},
  title        = {Effective requirements traceability: Models, tools, and practices},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {143--157},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20272},
  doi          = {10.1002/BLTJ.20272},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/KirovaKKC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/LeeU08,
  author       = {Anne Lee and
                  Carlos Urrutia{-}Vald{\'{e}}s},
  title        = {An analysis of capital expenses and performance trade-offs among {IMS}
                  {CSCF} deployment options},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {21--31},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20264},
  doi          = {10.1002/BLTJ.20264},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/LeeU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/LengWM08,
  author       = {Bing Leng and
                  Dave P. Weeks and
                  Manoj K. Mahapatra},
  title        = {Automating network configuration tasks using multi-level modeling},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {83--101},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20268},
  doi          = {10.1002/BLTJ.20268},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/LengWM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Liu08,
  author       = {Hans Peng Liu},
  title        = {Generic service provisioning and invocation in {IMS}},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {173--178},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20274},
  doi          = {10.1002/BLTJ.20274},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/Liu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/OReillyC08,
  author       = {Gerard P. O'Reilly and
                  Chi{-}Hung Kelvin Chu},
  title        = {Optimal deployment of power reserves across telecom critical infrastructures},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {127--141},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20271},
  doi          = {10.1002/BLTJ.20271},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/OReillyC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/PantCRJO08,
  author       = {Himanshu Pant and
                  Chi{-}Hung Kelvin Chu and
                  Steven H. Richman and
                  Ahmad M. Jrad and
                  Gerard P. O'Reilly},
  title        = {Reliability of next-generation networks with a focus on {IMS} architecture},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {109--125},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20270},
  doi          = {10.1002/BLTJ.20270},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/PantCRJO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/RichmanP08,
  author       = {Steven H. Richman and
                  Himanshu Pant},
  title        = {Reliability concerns for next-generation networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {103--108},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20269},
  doi          = {10.1002/BLTJ.20269},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/RichmanP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/TuijnB08,
  author       = {Jasper Aartse Tuijn and
                  Dennis J. A. Bijwaard},
  title        = {Spanning a multimedia session across multiple devices},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {179--193},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20275},
  doi          = {10.1002/BLTJ.20275},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/TuijnB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ViswanathanW08,
  author       = {Ramesh Viswanathan and
                  Thomas L. Wood},
  title        = {Portable Call Agent: {A} model for rapid development and emulation
                  of network services},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {4},
  pages        = {159--172},
  year         = {2008},
  url          = {https://doi.org/10.1002/bltj.20273},
  doi          = {10.1002/BLTJ.20273},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/ViswanathanW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/AgrawalKNRRSS07,
  author       = {Shipra Agrawal and
                  C. N. Kanthi and
                  K. V. M. Naidu and
                  Jeyashankher Ramamirtham and
                  Rajeev Rastogi and
                  Scott Satkin and
                  Anand Srinivasan},
  title        = {Monitoring infrastructure for converged networks and services},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {63--77},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20236},
  doi          = {10.1002/BLTJ.20236},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/AgrawalKNRRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Alexiou07,
  author       = {Angeliki Alexiou},
  title        = {{WINNER:} Designing a new radio interface for next-generation systems},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {19--35},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20234},
  doi          = {10.1002/BLTJ.20234},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Alexiou07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/AndersonBFLS07,
  author       = {Thomas W. Anderson and
                  Peter B. Busschbach and
                  Igor Faynberg and
                  Hui{-}Lan Lu and
                  Dong Sun},
  title        = {The emerging resource and admission control function standards and
                  their application to the new triple-play services},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {5--21},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20214},
  doi          = {10.1002/BLTJ.20214},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/AndersonBFLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/AshikhminWHHMPQWZZZ07,
  author       = {Alexei E. Ashikhmin and
                  Adriaan J. de Lind van Wijngaarden and
                  Zhao Haibo and
                  Bertrand M. Hochwald and
                  Thomas L. Marzetta and
                  Vinay Purohit and
                  Chen Qinghong and
                  Paul A. Wilford and
                  Sheng{-}Rong Zhou and
                  Michael A. Zuniga and
                  Edward S. Zuranski},
  title        = {Design and development of a terrestrial digital video broadcast demodulation
                  core: An international collaborative effort},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {97--118},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20239},
  doi          = {10.1002/BLTJ.20239},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/AshikhminWHHMPQWZZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BauerDSS07,
  author       = {Markus Bauer and
                  Armin Dekorsy and
                  Peter Schefczik and
                  Michael S{\"{o}}llner},
  title        = {IP-driven access-independent resource management in converged access
                  networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {37--61},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20235},
  doi          = {10.1002/BLTJ.20235},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BauerDSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BeckDEEFGKR07,
  author       = {Andre Beck and
                  Robert E. Daugherty and
                  J. Robert Ensor and
                  Jairo O. Esteban and
                  F. Theodore Freuler and
                  Sugato Ganguly and
                  Kristin F. Kocan and
                  William D. Roome},
  title        = {Blending telephony and {IPTV:} Building the TV-link service package
                  using the Alcatel-Lucent Service Broker\({}^{\mbox{TM}}\)},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {23--39},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20215},
  doi          = {10.1002/BLTJ.20215},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BeckDEEFGKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Bessis07,
  author       = {Thierry Bessis},
  title        = {Improving the {DNS} mechanism in a data center intranet},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {131--144},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20222},
  doi          = {10.1002/BLTJ.20222},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Bessis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BorgerIKR07,
  author       = {Jim Borger and
                  Alina M. Ionescu{-}Graff and
                  Samrat Kulkarni and
                  Narayan Raman},
  title        = {Economics of ethernet over {SONET/SDH}},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {187--206},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20226},
  doi          = {10.1002/BLTJ.20226},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BorgerIKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/BrennerU07,
  author       = {Michael R. Brenner and
                  Musa R. Unmehopa},
  title        = {Service-oriented architecture and Web services penetration in next-generation
                  networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {147--159},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20243},
  doi          = {10.1002/BLTJ.20243},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/BrennerU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ChenLC07,
  author       = {Sheng Chen and
                  Xiangyang Li and
                  Yigang Cai},
  title        = {{IP} multimedia subsystem converged call control services},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {145--160},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20223},
  doi          = {10.1002/BLTJ.20223},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ChenLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ChengSL07,
  author       = {Terry S. Cheng and
                  Kenneth W. Del Signore and
                  Frances Lin},
  title        = {Cost effective treatment of short message service on the paging channel
                  for the {CDMA} system},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {133--141},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20241},
  doi          = {10.1002/BLTJ.20241},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ChengSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ClarkP07,
  author       = {Andrew C. Clark and
                  Karen E. Plonty},
  title        = {Common security management for {CDMA2000} 1x and 1x {EV-DO} networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {187--203},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20259},
  doi          = {10.1002/BLTJ.20259},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ClarkP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Cowsar07,
  author       = {Lawrence C. Cowsar},
  title        = {A global research presence},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {1--2},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20232},
  doi          = {10.1002/BLTJ.20232},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Cowsar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/DebJMNRRS07,
  author       = {Supratim Deb and
                  Ankur Jain and
                  Anirban Majumder and
                  K. V. M. Naidu and
                  Jeyashankher Ramamirtham and
                  Rajeev Rastogi and
                  Anand Srinivasan},
  title        = {Augmenting handset capacity through virtual storage},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {87--96},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20238},
  doi          = {10.1002/BLTJ.20238},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/DebJMNRRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/DuttaJR07,
  author       = {Partha Dutta and
                  Sharad Jaiswal and
                  Rajeev Rastogi},
  title        = {VillageNet: {A} low-cost, {IEEE} 802.11-based mesh network for connecting
                  rural areas},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {119--131},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20240},
  doi          = {10.1002/BLTJ.20240},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/DuttaJR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Fischer07,
  author       = {Georg Fischer},
  title        = {Next-generation base station radio frequency architecture},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {3--18},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20233},
  doi          = {10.1002/BLTJ.20233},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/Fischer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/FisherFGGLMW07,
  author       = {Eric S. Fisher and
                  Steven Fortune and
                  Martin K. Gladstein and
                  Suresh Goyal and
                  William B. Lyons and
                  James H. Mosher Jr. and
                  Gordon T. Wilfong},
  title        = {Economic modeling of global test strategy {I:} Mathematical models},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {161--173},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20224},
  doi          = {10.1002/BLTJ.20224},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/FisherFGGLMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/FisherFGGLMW07a,
  author       = {Eric S. Fisher and
                  Steven Fortune and
                  Martin K. Gladstein and
                  Suresh Goyal and
                  William B. Lyons and
                  James H. Mosher Jr. and
                  Gordon T. Wilfong},
  title        = {Economic modeling of global test strategy {II:} Software system and
                  examples},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {175--186},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20225},
  doi          = {10.1002/BLTJ.20225},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/FisherFGGLMW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/GaydeMW07,
  author       = {Ruth S. Gayde and
                  Stinson S. Mathai and
                  Kevin Wang},
  title        = {Aspects of network security for VoIP solutions using {IMS} core network
                  and Wi-Fi access},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {167--185},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20258},
  doi          = {10.1002/BLTJ.20258},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/GaydeMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/GreenwaldT07,
  author       = {Lloyd G. Greenwald and
                  Tavaris J. Thomas},
  title        = {Understanding and preventing network device fingerprinting},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {149--166},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20257},
  doi          = {10.1002/BLTJ.20257},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/GreenwaldT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/GuptaCSB07,
  author       = {Ashok K. Gupta and
                  Uma Chandrashekhar and
                  Suhasini V. Sabnis and
                  Frank A. Bastry},
  title        = {Building secure products and solutions},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {21--38},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20247},
  doi          = {10.1002/BLTJ.20247},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/GuptaCSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/GurbaniM07,
  author       = {Vijay K. Gurbani and
                  Andrew R. McGee},
  title        = {An early application of the Bell Labs Security framework to analyze
                  vulnerabilities in the Internet telephony domain},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {7--19},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20246},
  doi          = {10.1002/BLTJ.20246},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/GurbaniM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/HanmerMM07,
  author       = {Robert S. Hanmer and
                  Donald T. McBride and
                  Veena B. Mendiratta},
  title        = {Comparing reliability and security: Concepts, requirements, and techniques},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {65--78},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20250},
  doi          = {10.1002/BLTJ.20250},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/HanmerMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/HermsmeyerHST07,
  author       = {Christian Hermsmeyer and
                  Enrique J. Hernandez{-}Valencia and
                  Dieter Stoll and
                  Oliver Tamm},
  title        = {Ethernet aggregation and core network models for effcient and reliable
                  {IPTV} services},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {57--76},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20217},
  doi          = {10.1002/BLTJ.20217},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/HermsmeyerHST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Hernandez-HerreroS07,
  author       = {Jorge Hernandez{-}Herrero and
                  Jon A. Solworth},
  title        = {The need for a multi-perspective approach to solve the DDos problem},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {121--130},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20254},
  doi          = {10.1002/BLTJ.20254},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Hernandez-HerreroS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/HuMSUE07,
  author       = {Ying Hu and
                  Amit Mukhopadhyay and
                  Zulfiquar Sayeed and
                  Carlos Urrutia{-}Vald{\'{e}}s and
                  Mohamed El{-}Sayed},
  title        = {{IMS} service enhancement layer: {A} quantitative value proposition},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {95--114},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20219},
  doi          = {10.1002/BLTJ.20219},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/HuMSUE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/JiaoCL07,
  author       = {Wenhua Jiao and
                  Jianfeng Chen and
                  Fang Liu},
  title        = {Provisioning end-to-end QoS under {IMS} over a WiMAX architecture},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {115--121},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20220},
  doi          = {10.1002/BLTJ.20220},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/JiaoCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KimT07,
  author       = {Doh{-}Suk Kim and
                  Ahmed A. Tarraf},
  title        = {{ANIQUE+:} {A} new American national standard for non-intrusive estimation
                  of narrowband speech quality},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {221--236},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20228},
  doi          = {10.1002/BLTJ.20228},
  timestamp    = {Thu, 08 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bell/KimT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Kocan07,
  author       = {Kristin F. Kocan},
  title        = {Achieving the transformation to next-generation networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {1--4},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20213},
  doi          = {10.1002/BLTJ.20213},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Kocan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/LiGH07,
  author       = {Dalton Li and
                  Andrew Guo and
                  Brian Huang},
  title        = {Generic policy decision function framework},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {123--129},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20221},
  doi          = {10.1002/BLTJ.20221},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/LiGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/LuettmannB07,
  author       = {Bjoern M. Luettmann and
                  Adam C. Bender},
  title        = {Man-in-the-middle attacks on auto-updating software},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {131--138},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20255},
  doi          = {10.1002/BLTJ.20255},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/LuettmannB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Ma07,
  author       = {David C. Ma},
  title        = {Deterministic-based performance modeling of a cluster of nodes handling
                  subscriber profile query and update in {CDMA} mobile switching center},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {247--261},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20230},
  doi          = {10.1002/BLTJ.20230},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Ma07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/McGeeBCVF07,
  author       = {Andrew R. McGee and
                  Frank A. Bastry and
                  Uma Chandrashekhar and
                  S. Rao Vasireddy and
                  Lori A. Flynn},
  title        = {Using the Bell Labs security framework to enhance the {ISO} 17799/27001
                  information security management system},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {39--54},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20248},
  doi          = {10.1002/BLTJ.20248},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/McGeeBCVF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/MeeuwissenRL07,
  author       = {Erik Meeuwissen and
                  Paul Reinold and
                  Cynthia C. S. Liem},
  title        = {Inferring and predicting context of mobile users},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {79--86},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20237},
  doi          = {10.1002/BLTJ.20237},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/MeeuwissenRL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ParkS07,
  author       = {Seyong Park and
                  Alexandro Salvarani},
  title        = {IP-based radio access network implementation cost vs. network security
                  trade-off},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {95--99},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20252},
  doi          = {10.1002/BLTJ.20252},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ParkS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/PrakashSST07,
  author       = {Subramanian Prakash and
                  Abdol Saleh and
                  Salman Shaikh and
                  David Tsay},
  title        = {Economic analysis of class 5 migration to {IMS}},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {77--93},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20218},
  doi          = {10.1002/BLTJ.20218},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/PrakashSST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Radhakrishnan07,
  author       = {Ganesan Radhakrishnan},
  title        = {Provisioning in complex networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {41--55},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20216},
  doi          = {10.1002/BLTJ.20216},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Radhakrishnan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Ramirez07,
  author       = {David Ram{\'{\i}}rez},
  title        = {Case study: {ITU-T} recommendation {X.805} applied to an enterprise
                  environment - banking},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {55--64},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20249},
  doi          = {10.1002/BLTJ.20249},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Ramirez07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Shaw07,
  author       = {Bradley D. Shaw},
  title        = {The use of conduction to cool small form-factor pluggable optical
                  transceivers},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {2},
  pages        = {143--146},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20242},
  doi          = {10.1002/BLTJ.20242},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Shaw07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Sheehan07,
  author       = {Michael J. Sheehan},
  title        = {Secure parallel file distribution through a streaming worm network},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {237--246},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20229},
  doi          = {10.1002/BLTJ.20229},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Sheehan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Solari07,
  author       = {Carlos C. Solari},
  title        = {Designing for security},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {1--6},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20245},
  doi          = {10.1002/BLTJ.20245},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Solari07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/StiliadisFKAHKGS07,
  author       = {Dimitrios Stiliadis and
                  Andrea Francini and
                  Sanjay Kamat and
                  Mansoor Alicherry and
                  Adiseshu Hari and
                  Pramod V. Koppol and
                  Ashok K. Gupta and
                  Dor Skuler},
  title        = {Evros: {A} service-delivery platform for extending security coverage
                  and {IT} reach},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {101--119},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20253},
  doi          = {10.1002/BLTJ.20253},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/StiliadisFKAHKGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/StollTB07,
  author       = {Dieter Stoll and
                  Wolfgang Thomas and
                  Martin Belzner},
  title        = {The role of pseudo-wires for layer 2 services in intelligent transport
                  networks},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {1},
  pages        = {207--220},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20227},
  doi          = {10.1002/BLTJ.20227},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/StollTB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/ThompsonF07,
  author       = {Gerald R. Thompson and
                  Lori A. Flynn},
  title        = {Polymorphic malware detection and identification via context-free
                  grammar homomorphism},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {139--147},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20256},
  doi          = {10.1002/BLTJ.20256},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/ThompsonF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/Wang07,
  author       = {Daping Wang},
  title        = {An XML-based testing strategy for probing security vulnerabilities
                  in the diameter protocol},
  journal      = {Bell Labs Tech. J.},
  volume       = {12},
  number       = {3},
  pages        = {79--93},
  year         = {2007},
  url          = {https://doi.org/10.1002/bltj.20251},
  doi          = {10.1002/BLTJ.20251},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/Wang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics