Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn34.bht:"
@article{DBLP:journals/cn/Al-FawzanH00, author = {Mohammad Abdulrahman Al{-}Fawzan and Fahad Hoymany}, title = {Placement of network servers in a wide-area network}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {355--361}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00115-8}, doi = {10.1016/S1389-1286(00)00115-8}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Al-FawzanH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlheraishS00, author = {Abdulmohsen A. Alheraish and D. G. Smith}, title = {Cell rate moderation of {VBR} video under an {FEC} environment in {ATM} networks}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {23--35}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00094-3}, doi = {10.1016/S1389-1286(00)00094-3}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AlheraishS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Allocchio00, author = {Claudio Allocchio}, title = {Guest editorial}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {821--822}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00152-3}, doi = {10.1016/S1389-1286(00)00152-3}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Allocchio00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AtlasisLV00, author = {Antonios F. Atlasis and Nikolaos H. Loukas and Athanasios V. Vasilakos}, title = {The use of learning algorithms in {ATM} networks call admission control problem: a methodology}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {341--353}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00090-6}, doi = {10.1016/S1389-1286(00)00090-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AtlasisLV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BalaourasSM00, author = {Pantelis Balaouras and Ioannis Stavrakakis and Lazaros F. Merakos}, title = {Potential and limitations of a teleteaching environment based on {H.323} audio-visual communication systems}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {945--958}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00164-X}, doi = {10.1016/S1389-1286(00)00164-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BalaourasSM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BalestrieriPDC00, author = {Francesco Balestrieri and Pantelis L. Panteli and Vasillios Dionissopoulos and Trevor G. Clarkson}, title = {{ATM} connection admission control using pRAM based artificial neural networks}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {49--63}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00096-7}, doi = {10.1016/S1389-1286(00)00096-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BalestrieriPDC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaltatuLMM00, author = {Madalina Baltatu and Antonio Lioy and Fabio Maino and Daniele Mazzocchi}, title = {Security issues in control, management and routing protocols}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {881--894}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00159-6}, doi = {10.1016/S1389-1286(00)00159-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BaltatuLMM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BeckerB00, author = {Monique Becker and Andr{\'{e}}{-}Luc Beylot}, title = {Performance comparison criteria for {ATM} switch models}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {85--95}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00098-0}, doi = {10.1016/S1389-1286(00)00098-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BeckerB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BhabutaH00, author = {Madhu D. K. Bhabuta and Peter G. Harrison}, title = {Optimising bandwidth of {ABR} sources}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {115--128}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00100-6}, doi = {10.1016/S1389-1286(00)00100-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BhabutaH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BisselBBH00, author = {Torsten Bissel and Manfred Bogen and Christian Bonkowski and Volker Hadamschek}, title = {Service level management with agent technology}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {831--841}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00154-7}, doi = {10.1016/S1389-1286(00)00154-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BisselBBH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoitenBDLS00, author = {Eerke A. Boiten and Howard Bowman and John Derrick and Peter F. Linington and Maarten Steen}, title = {Viewpoint consistency in {ODP}}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {503--537}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00114-6}, doi = {10.1016/S1389-1286(00)00114-6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BoitenBDLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BonettiRP00, author = {Pierluigi Bonetti and Stefano Ravaioli and Simone Piergallini}, title = {The Italian academic community's electronic voting system}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {851--860}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00156-0}, doi = {10.1016/S1389-1286(00)00156-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BonettiRP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoudierS00, author = {Thomas Boudier and David M. Shotton}, title = {VIDOS, a system for video editing and format conversion over the Internet}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {931--944}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00163-8}, doi = {10.1016/S1389-1286(00)00163-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BoudierS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CasettiCM00, author = {Claudio Casetti and Renato Lo Cigno and Marco Mellia}, title = {Load-balancing solutions for static routing schemes in {ATM} networks}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {169--180}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00104-3}, doi = {10.1016/S1389-1286(00)00104-3}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CasettiCM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChangYL00, author = {Yue{-}Shan Chang and Shyan{-}Ming Yuan and Winston Lo}, title = {A new multi-search engine for querying data through an Internet search service on {CORBA}}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {467--480}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00131-6}, doi = {10.1016/S1389-1286(00)00131-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChangYL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Daoud00, author = {Fawzi Daoud}, title = {Hybrid satellite/terrestrial networks integration}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {781--797}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00128-6}, doi = {10.1016/S1389-1286(00)00128-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Daoud00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DenteneerPGC00, author = {Dee Denteneer and Verus Pronk and J. M. Griffiths and Laurie G. Cuthbert}, title = {Impact of the resource needed for renegotiating {ATM} rates}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {211--225}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00107-9}, doi = {10.1016/S1389-1286(00)00107-9}, timestamp = {Wed, 29 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DenteneerPGC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DeriS00, author = {Luca Deri and Stefano Suin}, title = {Practical network security: experiences with ntop}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {873--880}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00158-4}, doi = {10.1016/S1389-1286(00)00158-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DeriS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DoNTKV00, author = {Tien Van Do and Thong T. Nguyen and Hung Tuan Tran and G{\'{a}}bor Kalvach and Bal{\'{a}}zs Varga}, title = {Topology optimization of an overlay {ATM} network in an {SDH} infrastructure}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {199--210}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00106-7}, doi = {10.1016/S1389-1286(00)00106-7}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DoNTKV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EvangelatosRMS00, author = {A. Evangelatos and Th. Rapsomanikis and Nikolas Mitrou and George I. Stassinopoulos}, title = {A burst-level traffic analysis tool}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {3--22}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00093-1}, doi = {10.1016/S1389-1286(00)00093-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/EvangelatosRMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FeiertagSLHPCBRW00, author = {Richard J. Feiertag and Stuart Staniford{-}Chen and Karl N. Levitt and Mark R. Heckman and Dave Peticolas and Rick Crawford and Lee A. Benzinger and Sue Rho and Stephen Wu}, title = {Intrusion detection inter-component adaptive negotiation}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {605--621}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00137-7}, doi = {10.1016/S1389-1286(00)00137-7}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FeiertagSLHPCBRW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Ferrari00, author = {Tiziana Ferrari}, title = {End-to-end performance analysis with traffic aggregation}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {905--914}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00161-4}, doi = {10.1016/S1389-1286(00)00161-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Ferrari00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FrinckeH00, author = {Deborah A. Frincke and Ming{-}Yuh Huang}, title = {Recent advances in intrusion detection systems}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {541--545}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00133-X}, doi = {10.1016/S1389-1286(00)00133-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FrinckeH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GhribiL00, author = {Brahim Ghribi and Luigi Logrippo}, title = {Understanding {GPRS:} the {GSM} packet radio service}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {763--779}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00127-4}, doi = {10.1016/S1389-1286(00)00127-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GhribiL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GuilleminDBM00, author = {Fabrice Guillemin and Olivier Dugeon and Jacqueline Boyer and Christophe Mangin}, title = {Lightweight signaling in {ATM} networks for high quality transfer of Internet traffic}, journal = {Comput. Networks}, volume = {34}, number = {2}, pages = {263--278}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00091-8}, doi = {10.1016/S1389-1286(00)00091-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GuilleminDBM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HaasDB00, author = {Robert Haas and Patrick Droz and Daniel Bauer}, title = {{PNNI} Augmented Routing {(PAR)} and Proxy-PAR}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {399--418}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00120-1}, doi = {10.1016/S1389-1286(00)00120-1}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HaasDB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HabraK00, author = {Shatha K. Habra and Ahmed E. Kamal}, title = {An MCR-weighted protocol for multipoint-to-point communication over {ABR} service}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {363--378}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00118-3}, doi = {10.1016/S1389-1286(00)00118-3}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HabraK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HerrmannK00, author = {Peter Herrmann and Heiko Krumm}, title = {A framework for modeling transfer protocols}, journal = {Comput. Networks}, volume = {34}, number = {2}, pages = {317--337}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00089-X}, doi = {10.1016/S1389-1286(00)00089-X}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HerrmannK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Hoffmann00, author = {Gertraud Hoffmann}, title = {G-WiN - the Gbit/s infrastructure for the German scientific community}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {959--964}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00165-1}, doi = {10.1016/S1389-1286(00)00165-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Hoffmann00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HommesPZ00, author = {Ferdinand Hommes and Eva Pless and Lothar Zier}, title = {Did {MPOA} achieve its objective?}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {895--904}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00160-2}, doi = {10.1016/S1389-1286(00)00160-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HommesPZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HouLPT00, author = {Yiwei Thomas Hou and Bo Li and Shivendra S. Panwar and Henry H.{-}Y. Tzeng}, title = {On network bandwidth allocation policies and feedback control algorithms for packet networks}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {481--501}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00132-8}, doi = {10.1016/S1389-1286(00)00132-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HouLPT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HughesBH00, author = {Larry Hughes and Omid Banyasad and Evan J. Hughes}, title = {Cartesian routing}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {455--466}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00130-4}, doi = {10.1016/S1389-1286(00)00130-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HughesBH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HwangKT00, author = {Ren{-}Hung Hwang and James F. Kurose and Donald F. Towsley}, title = {{MDP} routing for multi-rate loss networks}, journal = {Comput. Networks}, volume = {34}, number = {2}, pages = {241--261}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00030-X}, doi = {10.1016/S1389-1286(00)00030-X}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HwangKT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KarvounarakisK00, author = {Gregory Karvounarakis and Sarantos Kapidakis}, title = {Submission and repository management of digital libraries, using {WWW}}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {861--872}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00157-2}, doi = {10.1016/S1389-1286(00)00157-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KarvounarakisK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Kouvatsos00, author = {Demetres D. Kouvatsos}, title = {Performance Modelling and Evaluation of {ATM} Networks}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {1--2}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00092-X}, doi = {10.1016/S1389-1286(00)00092-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Kouvatsos00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KouvatsosAFD00, author = {Demetres D. Kouvatsos and Irfan{-}Ullah Awan and Rod J. Fretwell and George Dimakopoulos}, title = {A cost-effective approximation for {SRD} traffic in arbitrary multi-buffered networks}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {97--113}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00099-2}, doi = {10.1016/S1389-1286(00)00099-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KouvatsosAFD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LaiS00, author = {Wei Kuang Lai and Mu{-}Rung Shiu}, title = {Improving goodputs of {IP} packets under {ATM} {UBR} traffic with port-based queueing schemes}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {419--437}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00121-3}, doi = {10.1016/S1389-1286(00)00121-3}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LaiS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LenglizK00, author = {Ilhem Lengliz and Farouk Kamoun}, title = {A rate-based flow control method for {ABR} service in {ATM} networks}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {129--138}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00101-8}, doi = {10.1016/S1389-1286(00)00101-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LenglizK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LippmannC00, author = {Richard Lippmann and Robert K. Cunningham}, title = {Improving intrusion detection performance using keyword selection and neural networks}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {597--603}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00140-7}, doi = {10.1016/S1389-1286(00)00140-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LippmannC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LippmannHFKD00, author = {Richard Lippmann and Joshua W. Haines and David J. Fried and Jonathan Korba and Kumar Das}, title = {The 1999 {DARPA} off-line intrusion detection evaluation}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {579--595}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00139-0}, doi = {10.1016/S1389-1286(00)00139-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LippmannHFKD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LogrippoV00, author = {Luigi Logrippo and John Visser}, title = {Future wireless networks}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {701--703}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00123-7}, doi = {10.1016/S1389-1286(00)00123-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LogrippoV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LombardoLST00, author = {Alfio Lombardo and Ferdinando Lucidi and Marina Samarotto and Sebastiano Trigila}, title = {Personal mobility aspects in service architectures: extensions to {TINA}}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {745--762}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00126-2}, doi = {10.1016/S1389-1286(00)00126-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LombardoLST00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LundinJ00, author = {Emilie Lundin and Erland Jonsson}, title = {Anomaly-based intrusion detection: privacy concerns and other problems}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {623--640}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00134-1}, doi = {10.1016/S1389-1286(00)00134-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LundinJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MaggioreBV00, author = {Giulio Maggiore and Giulio Brusasco and Marco Vecchiato}, title = {Network integration testing: concepts, test specifications and tools for automatic telecommunication services verification}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {799--819}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00129-8}, doi = {10.1016/S1389-1286(00)00129-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MaggioreBV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MagiSS00, author = {{\'{A}}d{\'{a}}m Magi and {\'{A}}ron Szentesi and Bal{\'{a}}zs Szviatovszki}, title = {Analysis of link cost functions for {PNNI} routing}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {181--197}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00105-5}, doi = {10.1016/S1389-1286(00)00105-5}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MagiSS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Mainwaring00, author = {Keith Mainwaring}, title = {A role for {ATM} in telephony and {IP} networks}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {439--454}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00122-5}, doi = {10.1016/S1389-1286(00)00122-5}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Mainwaring00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ManganarisCZH00, author = {Stefanos Manganaris and Marvin Christensen and Dan Zerkle and Keith Hermiz}, title = {A data mining analysis of {RTID} alarms}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {571--577}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00138-9}, doi = {10.1016/S1389-1286(00)00138-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ManganarisCZH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MansfieldOTKN00, author = {Glenn Mansfield and Kohei Ohta and Yohsuke Takei and Nei Kato and Yoshiaki Nemoto}, title = {Towards trapping wily intruders in the large}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {659--670}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00135-3}, doi = {10.1016/S1389-1286(00)00135-3}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MansfieldOTKN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MellMM00, author = {Peter Mell and Donald G. Marks and Mark McLarnon}, title = {A denial-of-service resistant intrusion detection architecture}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {641--658}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00141-9}, doi = {10.1016/S1389-1286(00)00141-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MellMM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MilanovicM00, author = {Stanislav Milanovic and Alessandro Maglianella}, title = {{ATM} over {ADSL} probe in Telecom Italia environment}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {965--980}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00166-3}, doi = {10.1016/S1389-1286(00)00166-3}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MilanovicM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MontgomeryV00, author = {Michael Montgomery and Gustavo de Veciana}, title = {Hierarchical source routing using implied costs}, journal = {Comput. Networks}, volume = {34}, number = {3}, pages = {379--397}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00119-5}, doi = {10.1016/S1389-1286(00)00119-5}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MontgomeryV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Naudts00, author = {Jan Naudts}, title = {Towards real-time measurement of traffic control parameters}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {157--167}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00103-1}, doi = {10.1016/S1389-1286(00)00103-1}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Naudts00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Orbaek00, author = {Peter {\O}rb{\ae}k}, title = {An experimental system for distributed classroom education}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {843--850}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00155-9}, doi = {10.1016/S1389-1286(00)00155-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Orbaek00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PoonJLY00, author = {Sui Meng Poon and Jie Song and Bu{-}Sung Lee and Chai Kiat Yeo}, title = {Performance of buffer-based request-reply scheme for VoD streams over {IP} networks}, journal = {Comput. Networks}, volume = {34}, number = {2}, pages = {229--240}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00004-9}, doi = {10.1016/S1389-1286(00)00004-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PoonJLY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RaibuletD00, author = {Claudia Raibulet and Claudio Demartini}, title = {Mobile agent technology for the management of distributed systems - a case study}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {823--830}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00153-5}, doi = {10.1016/S1389-1286(00)00153-5}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RaibuletD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SalehA00, author = {Mahmoud Saleh and Mohammed Atiquzzaman}, title = {Analysis of shared buffer switches under non-uniform traffic pattern and global flow control}, journal = {Comput. Networks}, volume = {34}, number = {2}, pages = {297--315}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00113-4}, doi = {10.1016/S1389-1286(00)00113-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SalehA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SamouHGN00, author = {Jean Claude Samou and Drissa Houatra and Philippe Godlewski and Elie Najm}, title = {{IMT-2000} wireless terminal mobility over object-oriented distributed platforms}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {717--743}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00125-0}, doi = {10.1016/S1389-1286(00)00125-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SamouHGN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SanderFRW00, author = {Volker Sander and Ian T. Foster and Alain J. Roy and Linda Winkler}, title = {A differentiated services implementation for high-performance {TCP} flows}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {915--929}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00162-6}, doi = {10.1016/S1389-1286(00)00162-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SanderFRW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SchmidtsV00, author = {Harald Schmidts and John Visser}, title = {Framework for {IMT-2000} networks}, journal = {Comput. Networks}, volume = {34}, number = {5}, pages = {705--715}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00124-9}, doi = {10.1016/S1389-1286(00)00124-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SchmidtsV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SoldatosVM00, author = {John Soldatos and Evangelos Vayias and Nikolas Mitrou}, title = {{CAC} and traffic shaping for performance control in {ATM:} the two-class paradigm}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {65--83}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00097-9}, doi = {10.1016/S1389-1286(00)00097-9}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SoldatosVM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Song00, author = {Shaowen Song}, title = {A credit-based flow control algorithm for broadband access networks}, journal = {Comput. Networks}, volume = {34}, number = {2}, pages = {279--295}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00108-0}, doi = {10.1016/S1389-1286(00)00108-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Song00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SpaffordZ00, author = {Eugene H. Spafford and Diego Zamboni}, title = {Intrusion detection using autonomous agents}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {547--570}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00136-5}, doi = {10.1016/S1389-1286(00)00136-5}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SpaffordZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/StathisM00, author = {Christos Stathis and Basil S. Maglaris}, title = {Modelling the self-similar behaviour of network traffic}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {37--47}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00095-5}, doi = {10.1016/S1389-1286(00)00095-5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/StathisM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VojnoviR00, author = {Milan Vojnovic and Nikola Rozic}, title = {An evaluation of the {ABR} explicit-rate allocation interfering with the guaranteed services traffic}, journal = {Comput. Networks}, volume = {34}, number = {1}, pages = {139--155}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00102-X}, doi = {10.1016/S1389-1286(00)00102-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/VojnoviR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YuillWSGFHA00, author = {Jim Yuill and Shyhtsun Felix Wu and J. Settle and Fengmin Gong and R. Forno and Ming{-}Yuh Huang and J. Asbery}, title = {Intrusion-detection for incident-response, using a military battlefield-intelligence process}, journal = {Comput. Networks}, volume = {34}, number = {4}, pages = {671--697}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00142-0}, doi = {10.1016/S1389-1286(00)00142-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YuillWSGFHA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.