Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/bell/bell12.bht:"
@article{DBLP:journals/bell/Burns08, author = {Michael J. Burns}, title = {Deploying, hardening, and benefiting from next-generation networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {1--4}, year = {2008}, url = {https://doi.org/10.1002/bltj.20262}, doi = {10.1002/BLTJ.20262}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/Burns08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/CalinMMZ08, author = {Doru Calin and Andrew Mackay and Thomas B. Morawski and Hardy Zhang}, title = {An approach for just-in-time radio access network capacity planning in {CDMA} networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {67--82}, year = {2008}, url = {https://doi.org/10.1002/bltj.20267}, doi = {10.1002/BLTJ.20267}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/CalinMMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ErmanM08, author = {Bilgehan Erman and Elissa P. Matthews}, title = {Analysis and realization of {IPTV} service quality}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {195--212}, year = {2008}, url = {https://doi.org/10.1002/bltj.20276}, doi = {10.1002/BLTJ.20276}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/ErmanM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Hao08, author = {Qingwang Michael Hao}, title = {Toward a unified service delivery process for next-generation services}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {5--20}, year = {2008}, url = {https://doi.org/10.1002/bltj.20263}, doi = {10.1002/BLTJ.20263}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/Hao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/IsukapalliBPF08, author = {Ramana Isukapalli and Steven A. Benno and Candace Park and Peretz Feder}, title = {Advanced {IMS} client supporting secure signaling}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {49--65}, year = {2008}, url = {https://doi.org/10.1002/bltj.20266}, doi = {10.1002/BLTJ.20266}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/IsukapalliBPF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Joseph08, author = {Jean{-}Philippe Joseph}, title = {{IMS} network signaling peering: Challenges and proposal}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {33--48}, year = {2008}, url = {https://doi.org/10.1002/bltj.20265}, doi = {10.1002/BLTJ.20265}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/Joseph08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KirovaKKC08, author = {Vassilka Kirova and Neil Kirby and Darshak Kothari and Glenda Childress}, title = {Effective requirements traceability: Models, tools, and practices}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {143--157}, year = {2008}, url = {https://doi.org/10.1002/bltj.20272}, doi = {10.1002/BLTJ.20272}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/KirovaKKC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/LeeU08, author = {Anne Lee and Carlos Urrutia{-}Vald{\'{e}}s}, title = {An analysis of capital expenses and performance trade-offs among {IMS} {CSCF} deployment options}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {21--31}, year = {2008}, url = {https://doi.org/10.1002/bltj.20264}, doi = {10.1002/BLTJ.20264}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/LeeU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/LengWM08, author = {Bing Leng and Dave P. Weeks and Manoj K. Mahapatra}, title = {Automating network configuration tasks using multi-level modeling}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {83--101}, year = {2008}, url = {https://doi.org/10.1002/bltj.20268}, doi = {10.1002/BLTJ.20268}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/LengWM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Liu08, author = {Hans Peng Liu}, title = {Generic service provisioning and invocation in {IMS}}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {173--178}, year = {2008}, url = {https://doi.org/10.1002/bltj.20274}, doi = {10.1002/BLTJ.20274}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/Liu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/OReillyC08, author = {Gerard P. O'Reilly and Chi{-}Hung Kelvin Chu}, title = {Optimal deployment of power reserves across telecom critical infrastructures}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {127--141}, year = {2008}, url = {https://doi.org/10.1002/bltj.20271}, doi = {10.1002/BLTJ.20271}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/OReillyC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/PantCRJO08, author = {Himanshu Pant and Chi{-}Hung Kelvin Chu and Steven H. Richman and Ahmad M. Jrad and Gerard P. O'Reilly}, title = {Reliability of next-generation networks with a focus on {IMS} architecture}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {109--125}, year = {2008}, url = {https://doi.org/10.1002/bltj.20270}, doi = {10.1002/BLTJ.20270}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/PantCRJO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/RichmanP08, author = {Steven H. Richman and Himanshu Pant}, title = {Reliability concerns for next-generation networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {103--108}, year = {2008}, url = {https://doi.org/10.1002/bltj.20269}, doi = {10.1002/BLTJ.20269}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/RichmanP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/TuijnB08, author = {Jasper Aartse Tuijn and Dennis J. A. Bijwaard}, title = {Spanning a multimedia session across multiple devices}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {179--193}, year = {2008}, url = {https://doi.org/10.1002/bltj.20275}, doi = {10.1002/BLTJ.20275}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/TuijnB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ViswanathanW08, author = {Ramesh Viswanathan and Thomas L. Wood}, title = {Portable Call Agent: {A} model for rapid development and emulation of network services}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {4}, pages = {159--172}, year = {2008}, url = {https://doi.org/10.1002/bltj.20273}, doi = {10.1002/BLTJ.20273}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/ViswanathanW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/AgrawalKNRRSS07, author = {Shipra Agrawal and C. N. Kanthi and K. V. M. Naidu and Jeyashankher Ramamirtham and Rajeev Rastogi and Scott Satkin and Anand Srinivasan}, title = {Monitoring infrastructure for converged networks and services}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {63--77}, year = {2007}, url = {https://doi.org/10.1002/bltj.20236}, doi = {10.1002/BLTJ.20236}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/AgrawalKNRRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Alexiou07, author = {Angeliki Alexiou}, title = {{WINNER:} Designing a new radio interface for next-generation systems}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {19--35}, year = {2007}, url = {https://doi.org/10.1002/bltj.20234}, doi = {10.1002/BLTJ.20234}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Alexiou07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/AndersonBFLS07, author = {Thomas W. Anderson and Peter B. Busschbach and Igor Faynberg and Hui{-}Lan Lu and Dong Sun}, title = {The emerging resource and admission control function standards and their application to the new triple-play services}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {5--21}, year = {2007}, url = {https://doi.org/10.1002/bltj.20214}, doi = {10.1002/BLTJ.20214}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/AndersonBFLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/AshikhminWHHMPQWZZZ07, author = {Alexei E. Ashikhmin and Adriaan J. de Lind van Wijngaarden and Zhao Haibo and Bertrand M. Hochwald and Thomas L. Marzetta and Vinay Purohit and Chen Qinghong and Paul A. Wilford and Sheng{-}Rong Zhou and Michael A. Zuniga and Edward S. Zuranski}, title = {Design and development of a terrestrial digital video broadcast demodulation core: An international collaborative effort}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {97--118}, year = {2007}, url = {https://doi.org/10.1002/bltj.20239}, doi = {10.1002/BLTJ.20239}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/AshikhminWHHMPQWZZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BauerDSS07, author = {Markus Bauer and Armin Dekorsy and Peter Schefczik and Michael S{\"{o}}llner}, title = {IP-driven access-independent resource management in converged access networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {37--61}, year = {2007}, url = {https://doi.org/10.1002/bltj.20235}, doi = {10.1002/BLTJ.20235}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BauerDSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BeckDEEFGKR07, author = {Andre Beck and Robert E. Daugherty and J. Robert Ensor and Jairo O. Esteban and F. Theodore Freuler and Sugato Ganguly and Kristin F. Kocan and William D. Roome}, title = {Blending telephony and {IPTV:} Building the TV-link service package using the Alcatel-Lucent Service Broker\({}^{\mbox{TM}}\)}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {23--39}, year = {2007}, url = {https://doi.org/10.1002/bltj.20215}, doi = {10.1002/BLTJ.20215}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BeckDEEFGKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Bessis07, author = {Thierry Bessis}, title = {Improving the {DNS} mechanism in a data center intranet}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {131--144}, year = {2007}, url = {https://doi.org/10.1002/bltj.20222}, doi = {10.1002/BLTJ.20222}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Bessis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BorgerIKR07, author = {Jim Borger and Alina M. Ionescu{-}Graff and Samrat Kulkarni and Narayan Raman}, title = {Economics of ethernet over {SONET/SDH}}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {187--206}, year = {2007}, url = {https://doi.org/10.1002/bltj.20226}, doi = {10.1002/BLTJ.20226}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BorgerIKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BrennerU07, author = {Michael R. Brenner and Musa R. Unmehopa}, title = {Service-oriented architecture and Web services penetration in next-generation networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {147--159}, year = {2007}, url = {https://doi.org/10.1002/bltj.20243}, doi = {10.1002/BLTJ.20243}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/BrennerU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ChenLC07, author = {Sheng Chen and Xiangyang Li and Yigang Cai}, title = {{IP} multimedia subsystem converged call control services}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {145--160}, year = {2007}, url = {https://doi.org/10.1002/bltj.20223}, doi = {10.1002/BLTJ.20223}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ChenLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ChengSL07, author = {Terry S. Cheng and Kenneth W. Del Signore and Frances Lin}, title = {Cost effective treatment of short message service on the paging channel for the {CDMA} system}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {133--141}, year = {2007}, url = {https://doi.org/10.1002/bltj.20241}, doi = {10.1002/BLTJ.20241}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ChengSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ClarkP07, author = {Andrew C. Clark and Karen E. Plonty}, title = {Common security management for {CDMA2000} 1x and 1x {EV-DO} networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {187--203}, year = {2007}, url = {https://doi.org/10.1002/bltj.20259}, doi = {10.1002/BLTJ.20259}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ClarkP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Cowsar07, author = {Lawrence C. Cowsar}, title = {A global research presence}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {1--2}, year = {2007}, url = {https://doi.org/10.1002/bltj.20232}, doi = {10.1002/BLTJ.20232}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Cowsar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/DebJMNRRS07, author = {Supratim Deb and Ankur Jain and Anirban Majumder and K. V. M. Naidu and Jeyashankher Ramamirtham and Rajeev Rastogi and Anand Srinivasan}, title = {Augmenting handset capacity through virtual storage}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {87--96}, year = {2007}, url = {https://doi.org/10.1002/bltj.20238}, doi = {10.1002/BLTJ.20238}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/DebJMNRRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/DuttaJR07, author = {Partha Dutta and Sharad Jaiswal and Rajeev Rastogi}, title = {VillageNet: {A} low-cost, {IEEE} 802.11-based mesh network for connecting rural areas}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {119--131}, year = {2007}, url = {https://doi.org/10.1002/bltj.20240}, doi = {10.1002/BLTJ.20240}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/DuttaJR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Fischer07, author = {Georg Fischer}, title = {Next-generation base station radio frequency architecture}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {3--18}, year = {2007}, url = {https://doi.org/10.1002/bltj.20233}, doi = {10.1002/BLTJ.20233}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/Fischer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/FisherFGGLMW07, author = {Eric S. Fisher and Steven Fortune and Martin K. Gladstein and Suresh Goyal and William B. Lyons and James H. Mosher Jr. and Gordon T. Wilfong}, title = {Economic modeling of global test strategy {I:} Mathematical models}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {161--173}, year = {2007}, url = {https://doi.org/10.1002/bltj.20224}, doi = {10.1002/BLTJ.20224}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/FisherFGGLMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/FisherFGGLMW07a, author = {Eric S. Fisher and Steven Fortune and Martin K. Gladstein and Suresh Goyal and William B. Lyons and James H. Mosher Jr. and Gordon T. Wilfong}, title = {Economic modeling of global test strategy {II:} Software system and examples}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {175--186}, year = {2007}, url = {https://doi.org/10.1002/bltj.20225}, doi = {10.1002/BLTJ.20225}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/FisherFGGLMW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/GaydeMW07, author = {Ruth S. Gayde and Stinson S. Mathai and Kevin Wang}, title = {Aspects of network security for VoIP solutions using {IMS} core network and Wi-Fi access}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {167--185}, year = {2007}, url = {https://doi.org/10.1002/bltj.20258}, doi = {10.1002/BLTJ.20258}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/GaydeMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/GreenwaldT07, author = {Lloyd G. Greenwald and Tavaris J. Thomas}, title = {Understanding and preventing network device fingerprinting}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {149--166}, year = {2007}, url = {https://doi.org/10.1002/bltj.20257}, doi = {10.1002/BLTJ.20257}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/GreenwaldT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/GuptaCSB07, author = {Ashok K. Gupta and Uma Chandrashekhar and Suhasini V. Sabnis and Frank A. Bastry}, title = {Building secure products and solutions}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {21--38}, year = {2007}, url = {https://doi.org/10.1002/bltj.20247}, doi = {10.1002/BLTJ.20247}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/GuptaCSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/GurbaniM07, author = {Vijay K. Gurbani and Andrew R. McGee}, title = {An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {7--19}, year = {2007}, url = {https://doi.org/10.1002/bltj.20246}, doi = {10.1002/BLTJ.20246}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/GurbaniM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/HanmerMM07, author = {Robert S. Hanmer and Donald T. McBride and Veena B. Mendiratta}, title = {Comparing reliability and security: Concepts, requirements, and techniques}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {65--78}, year = {2007}, url = {https://doi.org/10.1002/bltj.20250}, doi = {10.1002/BLTJ.20250}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/HanmerMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/HermsmeyerHST07, author = {Christian Hermsmeyer and Enrique J. Hernandez{-}Valencia and Dieter Stoll and Oliver Tamm}, title = {Ethernet aggregation and core network models for effcient and reliable {IPTV} services}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {57--76}, year = {2007}, url = {https://doi.org/10.1002/bltj.20217}, doi = {10.1002/BLTJ.20217}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/HermsmeyerHST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Hernandez-HerreroS07, author = {Jorge Hernandez{-}Herrero and Jon A. Solworth}, title = {The need for a multi-perspective approach to solve the DDos problem}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {121--130}, year = {2007}, url = {https://doi.org/10.1002/bltj.20254}, doi = {10.1002/BLTJ.20254}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Hernandez-HerreroS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/HuMSUE07, author = {Ying Hu and Amit Mukhopadhyay and Zulfiquar Sayeed and Carlos Urrutia{-}Vald{\'{e}}s and Mohamed El{-}Sayed}, title = {{IMS} service enhancement layer: {A} quantitative value proposition}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {95--114}, year = {2007}, url = {https://doi.org/10.1002/bltj.20219}, doi = {10.1002/BLTJ.20219}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/HuMSUE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/JiaoCL07, author = {Wenhua Jiao and Jianfeng Chen and Fang Liu}, title = {Provisioning end-to-end QoS under {IMS} over a WiMAX architecture}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {115--121}, year = {2007}, url = {https://doi.org/10.1002/bltj.20220}, doi = {10.1002/BLTJ.20220}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/JiaoCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KimT07, author = {Doh{-}Suk Kim and Ahmed A. Tarraf}, title = {{ANIQUE+:} {A} new American national standard for non-intrusive estimation of narrowband speech quality}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {221--236}, year = {2007}, url = {https://doi.org/10.1002/bltj.20228}, doi = {10.1002/BLTJ.20228}, timestamp = {Thu, 08 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/KimT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Kocan07, author = {Kristin F. Kocan}, title = {Achieving the transformation to next-generation networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {1--4}, year = {2007}, url = {https://doi.org/10.1002/bltj.20213}, doi = {10.1002/BLTJ.20213}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Kocan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/LiGH07, author = {Dalton Li and Andrew Guo and Brian Huang}, title = {Generic policy decision function framework}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {123--129}, year = {2007}, url = {https://doi.org/10.1002/bltj.20221}, doi = {10.1002/BLTJ.20221}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/LiGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/LuettmannB07, author = {Bjoern M. Luettmann and Adam C. Bender}, title = {Man-in-the-middle attacks on auto-updating software}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {131--138}, year = {2007}, url = {https://doi.org/10.1002/bltj.20255}, doi = {10.1002/BLTJ.20255}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/LuettmannB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Ma07, author = {David C. Ma}, title = {Deterministic-based performance modeling of a cluster of nodes handling subscriber profile query and update in {CDMA} mobile switching center}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {247--261}, year = {2007}, url = {https://doi.org/10.1002/bltj.20230}, doi = {10.1002/BLTJ.20230}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Ma07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/McGeeBCVF07, author = {Andrew R. McGee and Frank A. Bastry and Uma Chandrashekhar and S. Rao Vasireddy and Lori A. Flynn}, title = {Using the Bell Labs security framework to enhance the {ISO} 17799/27001 information security management system}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {39--54}, year = {2007}, url = {https://doi.org/10.1002/bltj.20248}, doi = {10.1002/BLTJ.20248}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/McGeeBCVF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/MeeuwissenRL07, author = {Erik Meeuwissen and Paul Reinold and Cynthia C. S. Liem}, title = {Inferring and predicting context of mobile users}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {79--86}, year = {2007}, url = {https://doi.org/10.1002/bltj.20237}, doi = {10.1002/BLTJ.20237}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/MeeuwissenRL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ParkS07, author = {Seyong Park and Alexandro Salvarani}, title = {IP-based radio access network implementation cost vs. network security trade-off}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {95--99}, year = {2007}, url = {https://doi.org/10.1002/bltj.20252}, doi = {10.1002/BLTJ.20252}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ParkS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/PrakashSST07, author = {Subramanian Prakash and Abdol Saleh and Salman Shaikh and David Tsay}, title = {Economic analysis of class 5 migration to {IMS}}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {77--93}, year = {2007}, url = {https://doi.org/10.1002/bltj.20218}, doi = {10.1002/BLTJ.20218}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/PrakashSST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Radhakrishnan07, author = {Ganesan Radhakrishnan}, title = {Provisioning in complex networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {41--55}, year = {2007}, url = {https://doi.org/10.1002/bltj.20216}, doi = {10.1002/BLTJ.20216}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Radhakrishnan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Ramirez07, author = {David Ram{\'{\i}}rez}, title = {Case study: {ITU-T} recommendation {X.805} applied to an enterprise environment - banking}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {55--64}, year = {2007}, url = {https://doi.org/10.1002/bltj.20249}, doi = {10.1002/BLTJ.20249}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Ramirez07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Shaw07, author = {Bradley D. Shaw}, title = {The use of conduction to cool small form-factor pluggable optical transceivers}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {2}, pages = {143--146}, year = {2007}, url = {https://doi.org/10.1002/bltj.20242}, doi = {10.1002/BLTJ.20242}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Shaw07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Sheehan07, author = {Michael J. Sheehan}, title = {Secure parallel file distribution through a streaming worm network}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {237--246}, year = {2007}, url = {https://doi.org/10.1002/bltj.20229}, doi = {10.1002/BLTJ.20229}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Sheehan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Solari07, author = {Carlos C. Solari}, title = {Designing for security}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {1--6}, year = {2007}, url = {https://doi.org/10.1002/bltj.20245}, doi = {10.1002/BLTJ.20245}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Solari07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/StiliadisFKAHKGS07, author = {Dimitrios Stiliadis and Andrea Francini and Sanjay Kamat and Mansoor Alicherry and Adiseshu Hari and Pramod V. Koppol and Ashok K. Gupta and Dor Skuler}, title = {Evros: {A} service-delivery platform for extending security coverage and {IT} reach}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {101--119}, year = {2007}, url = {https://doi.org/10.1002/bltj.20253}, doi = {10.1002/BLTJ.20253}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/StiliadisFKAHKGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/StollTB07, author = {Dieter Stoll and Wolfgang Thomas and Martin Belzner}, title = {The role of pseudo-wires for layer 2 services in intelligent transport networks}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {1}, pages = {207--220}, year = {2007}, url = {https://doi.org/10.1002/bltj.20227}, doi = {10.1002/BLTJ.20227}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/StollTB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ThompsonF07, author = {Gerald R. Thompson and Lori A. Flynn}, title = {Polymorphic malware detection and identification via context-free grammar homomorphism}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {139--147}, year = {2007}, url = {https://doi.org/10.1002/bltj.20256}, doi = {10.1002/BLTJ.20256}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ThompsonF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/Wang07, author = {Daping Wang}, title = {An XML-based testing strategy for probing security vulnerabilities in the diameter protocol}, journal = {Bell Labs Tech. J.}, volume = {12}, number = {3}, pages = {79--93}, year = {2007}, url = {https://doi.org/10.1002/bltj.20251}, doi = {10.1002/BLTJ.20251}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/Wang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.