Search dblp for Publications

export results for "toc:db/journals/cn/cn34.bht:"

 download as .bib file

@article{DBLP:journals/cn/Al-FawzanH00,
  author       = {Mohammad Abdulrahman Al{-}Fawzan and
                  Fahad Hoymany},
  title        = {Placement of network servers in a wide-area network},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {355--361},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00115-8},
  doi          = {10.1016/S1389-1286(00)00115-8},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Al-FawzanH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AlheraishS00,
  author       = {Abdulmohsen A. Alheraish and
                  D. G. Smith},
  title        = {Cell rate moderation of {VBR} video under an {FEC} environment in
                  {ATM} networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {23--35},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00094-3},
  doi          = {10.1016/S1389-1286(00)00094-3},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AlheraishS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Allocchio00,
  author       = {Claudio Allocchio},
  title        = {Guest editorial},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {821--822},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00152-3},
  doi          = {10.1016/S1389-1286(00)00152-3},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Allocchio00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AtlasisLV00,
  author       = {Antonios F. Atlasis and
                  Nikolaos H. Loukas and
                  Athanasios V. Vasilakos},
  title        = {The use of learning algorithms in {ATM} networks call admission control
                  problem: a methodology},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {341--353},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00090-6},
  doi          = {10.1016/S1389-1286(00)00090-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AtlasisLV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BalaourasSM00,
  author       = {Pantelis Balaouras and
                  Ioannis Stavrakakis and
                  Lazaros F. Merakos},
  title        = {Potential and limitations of a teleteaching environment based on {H.323}
                  audio-visual communication systems},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {945--958},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00164-X},
  doi          = {10.1016/S1389-1286(00)00164-X},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BalaourasSM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BalestrieriPDC00,
  author       = {Francesco Balestrieri and
                  Pantelis L. Panteli and
                  Vasillios Dionissopoulos and
                  Trevor G. Clarkson},
  title        = {{ATM} connection admission control using pRAM based artificial neural
                  networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {49--63},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00096-7},
  doi          = {10.1016/S1389-1286(00)00096-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BalestrieriPDC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaltatuLMM00,
  author       = {Madalina Baltatu and
                  Antonio Lioy and
                  Fabio Maino and
                  Daniele Mazzocchi},
  title        = {Security issues in control, management and routing protocols},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {881--894},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00159-6},
  doi          = {10.1016/S1389-1286(00)00159-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BaltatuLMM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BeckerB00,
  author       = {Monique Becker and
                  Andr{\'{e}}{-}Luc Beylot},
  title        = {Performance comparison criteria for {ATM} switch models},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {85--95},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00098-0},
  doi          = {10.1016/S1389-1286(00)00098-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BeckerB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BhabutaH00,
  author       = {Madhu D. K. Bhabuta and
                  Peter G. Harrison},
  title        = {Optimising bandwidth of {ABR} sources},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {115--128},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00100-6},
  doi          = {10.1016/S1389-1286(00)00100-6},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BhabutaH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BisselBBH00,
  author       = {Torsten Bissel and
                  Manfred Bogen and
                  Christian Bonkowski and
                  Volker Hadamschek},
  title        = {Service level management with agent technology},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {831--841},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00154-7},
  doi          = {10.1016/S1389-1286(00)00154-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BisselBBH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BoitenBDLS00,
  author       = {Eerke A. Boiten and
                  Howard Bowman and
                  John Derrick and
                  Peter F. Linington and
                  Maarten Steen},
  title        = {Viewpoint consistency in {ODP}},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {503--537},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00114-6},
  doi          = {10.1016/S1389-1286(00)00114-6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BoitenBDLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BonettiRP00,
  author       = {Pierluigi Bonetti and
                  Stefano Ravaioli and
                  Simone Piergallini},
  title        = {The Italian academic community's electronic voting system},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {851--860},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00156-0},
  doi          = {10.1016/S1389-1286(00)00156-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BonettiRP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BoudierS00,
  author       = {Thomas Boudier and
                  David M. Shotton},
  title        = {VIDOS, a system for video editing and format conversion over the Internet},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {931--944},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00163-8},
  doi          = {10.1016/S1389-1286(00)00163-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BoudierS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CasettiCM00,
  author       = {Claudio Casetti and
                  Renato Lo Cigno and
                  Marco Mellia},
  title        = {Load-balancing solutions for static routing schemes in {ATM} networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {169--180},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00104-3},
  doi          = {10.1016/S1389-1286(00)00104-3},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CasettiCM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChangYL00,
  author       = {Yue{-}Shan Chang and
                  Shyan{-}Ming Yuan and
                  Winston Lo},
  title        = {A new multi-search engine for querying data through an Internet search
                  service on {CORBA}},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {467--480},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00131-6},
  doi          = {10.1016/S1389-1286(00)00131-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChangYL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Daoud00,
  author       = {Fawzi Daoud},
  title        = {Hybrid satellite/terrestrial networks integration},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {781--797},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00128-6},
  doi          = {10.1016/S1389-1286(00)00128-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Daoud00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DenteneerPGC00,
  author       = {Dee Denteneer and
                  Verus Pronk and
                  J. M. Griffiths and
                  Laurie G. Cuthbert},
  title        = {Impact of the resource needed for renegotiating {ATM} rates},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {211--225},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00107-9},
  doi          = {10.1016/S1389-1286(00)00107-9},
  timestamp    = {Wed, 29 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/DenteneerPGC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DeriS00,
  author       = {Luca Deri and
                  Stefano Suin},
  title        = {Practical network security: experiences with ntop},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {873--880},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00158-4},
  doi          = {10.1016/S1389-1286(00)00158-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/DeriS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DoNTKV00,
  author       = {Tien Van Do and
                  Thong T. Nguyen and
                  Hung Tuan Tran and
                  G{\'{a}}bor Kalvach and
                  Bal{\'{a}}zs Varga},
  title        = {Topology optimization of an overlay {ATM} network in an {SDH} infrastructure},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {199--210},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00106-7},
  doi          = {10.1016/S1389-1286(00)00106-7},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/DoNTKV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/EvangelatosRMS00,
  author       = {A. Evangelatos and
                  Th. Rapsomanikis and
                  Nikolas Mitrou and
                  George I. Stassinopoulos},
  title        = {A burst-level traffic analysis tool},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {3--22},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00093-1},
  doi          = {10.1016/S1389-1286(00)00093-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/EvangelatosRMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/FeiertagSLHPCBRW00,
  author       = {Richard J. Feiertag and
                  Stuart Staniford{-}Chen and
                  Karl N. Levitt and
                  Mark R. Heckman and
                  Dave Peticolas and
                  Rick Crawford and
                  Lee A. Benzinger and
                  Sue Rho and
                  Stephen Wu},
  title        = {Intrusion detection inter-component adaptive negotiation},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {605--621},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00137-7},
  doi          = {10.1016/S1389-1286(00)00137-7},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/FeiertagSLHPCBRW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Ferrari00,
  author       = {Tiziana Ferrari},
  title        = {End-to-end performance analysis with traffic aggregation},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {905--914},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00161-4},
  doi          = {10.1016/S1389-1286(00)00161-4},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Ferrari00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/FrinckeH00,
  author       = {Deborah A. Frincke and
                  Ming{-}Yuh Huang},
  title        = {Recent advances in intrusion detection systems},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {541--545},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00133-X},
  doi          = {10.1016/S1389-1286(00)00133-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/FrinckeH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GhribiL00,
  author       = {Brahim Ghribi and
                  Luigi Logrippo},
  title        = {Understanding {GPRS:} the {GSM} packet radio service},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {763--779},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00127-4},
  doi          = {10.1016/S1389-1286(00)00127-4},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/GhribiL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GuilleminDBM00,
  author       = {Fabrice Guillemin and
                  Olivier Dugeon and
                  Jacqueline Boyer and
                  Christophe Mangin},
  title        = {Lightweight signaling in {ATM} networks for high quality transfer
                  of Internet traffic},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {2},
  pages        = {263--278},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00091-8},
  doi          = {10.1016/S1389-1286(00)00091-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/GuilleminDBM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HaasDB00,
  author       = {Robert Haas and
                  Patrick Droz and
                  Daniel Bauer},
  title        = {{PNNI} Augmented Routing {(PAR)} and Proxy-PAR},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {399--418},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00120-1},
  doi          = {10.1016/S1389-1286(00)00120-1},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HaasDB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HabraK00,
  author       = {Shatha K. Habra and
                  Ahmed E. Kamal},
  title        = {An MCR-weighted protocol for multipoint-to-point communication over
                  {ABR} service},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {363--378},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00118-3},
  doi          = {10.1016/S1389-1286(00)00118-3},
  timestamp    = {Wed, 05 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HabraK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HerrmannK00,
  author       = {Peter Herrmann and
                  Heiko Krumm},
  title        = {A framework for modeling transfer protocols},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {2},
  pages        = {317--337},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00089-X},
  doi          = {10.1016/S1389-1286(00)00089-X},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HerrmannK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Hoffmann00,
  author       = {Gertraud Hoffmann},
  title        = {G-WiN - the Gbit/s infrastructure for the German scientific community},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {959--964},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00165-1},
  doi          = {10.1016/S1389-1286(00)00165-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Hoffmann00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HommesPZ00,
  author       = {Ferdinand Hommes and
                  Eva Pless and
                  Lothar Zier},
  title        = {Did {MPOA} achieve its objective?},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {895--904},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00160-2},
  doi          = {10.1016/S1389-1286(00)00160-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/HommesPZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HouLPT00,
  author       = {Yiwei Thomas Hou and
                  Bo Li and
                  Shivendra S. Panwar and
                  Henry H.{-}Y. Tzeng},
  title        = {On network bandwidth allocation policies and feedback control algorithms
                  for packet networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {481--501},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00132-8},
  doi          = {10.1016/S1389-1286(00)00132-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HouLPT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HughesBH00,
  author       = {Larry Hughes and
                  Omid Banyasad and
                  Evan J. Hughes},
  title        = {Cartesian routing},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {455--466},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00130-4},
  doi          = {10.1016/S1389-1286(00)00130-4},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/HughesBH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HwangKT00,
  author       = {Ren{-}Hung Hwang and
                  James F. Kurose and
                  Donald F. Towsley},
  title        = {{MDP} routing for multi-rate loss networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {2},
  pages        = {241--261},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00030-X},
  doi          = {10.1016/S1389-1286(00)00030-X},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HwangKT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KarvounarakisK00,
  author       = {Gregory Karvounarakis and
                  Sarantos Kapidakis},
  title        = {Submission and repository management of digital libraries, using {WWW}},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {861--872},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00157-2},
  doi          = {10.1016/S1389-1286(00)00157-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/KarvounarakisK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Kouvatsos00,
  author       = {Demetres D. Kouvatsos},
  title        = {Performance Modelling and Evaluation of {ATM} Networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {1--2},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00092-X},
  doi          = {10.1016/S1389-1286(00)00092-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Kouvatsos00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KouvatsosAFD00,
  author       = {Demetres D. Kouvatsos and
                  Irfan{-}Ullah Awan and
                  Rod J. Fretwell and
                  George Dimakopoulos},
  title        = {A cost-effective approximation for {SRD} traffic in arbitrary multi-buffered
                  networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {97--113},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00099-2},
  doi          = {10.1016/S1389-1286(00)00099-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/KouvatsosAFD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LaiS00,
  author       = {Wei Kuang Lai and
                  Mu{-}Rung Shiu},
  title        = {Improving goodputs of {IP} packets under {ATM} {UBR} traffic with
                  port-based queueing schemes},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {419--437},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00121-3},
  doi          = {10.1016/S1389-1286(00)00121-3},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LaiS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LenglizK00,
  author       = {Ilhem Lengliz and
                  Farouk Kamoun},
  title        = {A rate-based flow control method for {ABR} service in {ATM} networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {129--138},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00101-8},
  doi          = {10.1016/S1389-1286(00)00101-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LenglizK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LippmannC00,
  author       = {Richard Lippmann and
                  Robert K. Cunningham},
  title        = {Improving intrusion detection performance using keyword selection
                  and neural networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {597--603},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00140-7},
  doi          = {10.1016/S1389-1286(00)00140-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LippmannC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LippmannHFKD00,
  author       = {Richard Lippmann and
                  Joshua W. Haines and
                  David J. Fried and
                  Jonathan Korba and
                  Kumar Das},
  title        = {The 1999 {DARPA} off-line intrusion detection evaluation},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {579--595},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00139-0},
  doi          = {10.1016/S1389-1286(00)00139-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LippmannHFKD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LogrippoV00,
  author       = {Luigi Logrippo and
                  John Visser},
  title        = {Future wireless networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {701--703},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00123-7},
  doi          = {10.1016/S1389-1286(00)00123-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LogrippoV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LombardoLST00,
  author       = {Alfio Lombardo and
                  Ferdinando Lucidi and
                  Marina Samarotto and
                  Sebastiano Trigila},
  title        = {Personal mobility aspects in service architectures: extensions to
                  {TINA}},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {745--762},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00126-2},
  doi          = {10.1016/S1389-1286(00)00126-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LombardoLST00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LundinJ00,
  author       = {Emilie Lundin and
                  Erland Jonsson},
  title        = {Anomaly-based intrusion detection: privacy concerns and other problems},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {623--640},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00134-1},
  doi          = {10.1016/S1389-1286(00)00134-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LundinJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MaggioreBV00,
  author       = {Giulio Maggiore and
                  Giulio Brusasco and
                  Marco Vecchiato},
  title        = {Network integration testing: concepts, test specifications and tools
                  for automatic telecommunication services verification},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {799--819},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00129-8},
  doi          = {10.1016/S1389-1286(00)00129-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MaggioreBV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MagiSS00,
  author       = {{\'{A}}d{\'{a}}m Magi and
                  {\'{A}}ron Szentesi and
                  Bal{\'{a}}zs Szviatovszki},
  title        = {Analysis of link cost functions for {PNNI} routing},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {181--197},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00105-5},
  doi          = {10.1016/S1389-1286(00)00105-5},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MagiSS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Mainwaring00,
  author       = {Keith Mainwaring},
  title        = {A role for {ATM} in telephony and {IP} networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {439--454},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00122-5},
  doi          = {10.1016/S1389-1286(00)00122-5},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Mainwaring00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ManganarisCZH00,
  author       = {Stefanos Manganaris and
                  Marvin Christensen and
                  Dan Zerkle and
                  Keith Hermiz},
  title        = {A data mining analysis of {RTID} alarms},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {571--577},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00138-9},
  doi          = {10.1016/S1389-1286(00)00138-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ManganarisCZH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MansfieldOTKN00,
  author       = {Glenn Mansfield and
                  Kohei Ohta and
                  Yohsuke Takei and
                  Nei Kato and
                  Yoshiaki Nemoto},
  title        = {Towards trapping wily intruders in the large},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {659--670},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00135-3},
  doi          = {10.1016/S1389-1286(00)00135-3},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MansfieldOTKN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MellMM00,
  author       = {Peter Mell and
                  Donald G. Marks and
                  Mark McLarnon},
  title        = {A denial-of-service resistant intrusion detection architecture},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {641--658},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00141-9},
  doi          = {10.1016/S1389-1286(00)00141-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MellMM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MilanovicM00,
  author       = {Stanislav Milanovic and
                  Alessandro Maglianella},
  title        = {{ATM} over {ADSL} probe in Telecom Italia environment},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {965--980},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00166-3},
  doi          = {10.1016/S1389-1286(00)00166-3},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MilanovicM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MontgomeryV00,
  author       = {Michael Montgomery and
                  Gustavo de Veciana},
  title        = {Hierarchical source routing using implied costs},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {3},
  pages        = {379--397},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00119-5},
  doi          = {10.1016/S1389-1286(00)00119-5},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MontgomeryV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Naudts00,
  author       = {Jan Naudts},
  title        = {Towards real-time measurement of traffic control parameters},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {157--167},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00103-1},
  doi          = {10.1016/S1389-1286(00)00103-1},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Naudts00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Orbaek00,
  author       = {Peter {\O}rb{\ae}k},
  title        = {An experimental system for distributed classroom education},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {843--850},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00155-9},
  doi          = {10.1016/S1389-1286(00)00155-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Orbaek00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PoonJLY00,
  author       = {Sui Meng Poon and
                  Jie Song and
                  Bu{-}Sung Lee and
                  Chai Kiat Yeo},
  title        = {Performance of buffer-based request-reply scheme for VoD streams over
                  {IP} networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {2},
  pages        = {229--240},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00004-9},
  doi          = {10.1016/S1389-1286(00)00004-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PoonJLY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RaibuletD00,
  author       = {Claudia Raibulet and
                  Claudio Demartini},
  title        = {Mobile agent technology for the management of distributed systems
                  - a case study},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {823--830},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00153-5},
  doi          = {10.1016/S1389-1286(00)00153-5},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RaibuletD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SalehA00,
  author       = {Mahmoud Saleh and
                  Mohammed Atiquzzaman},
  title        = {Analysis of shared buffer switches under non-uniform traffic pattern
                  and global flow control},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {2},
  pages        = {297--315},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00113-4},
  doi          = {10.1016/S1389-1286(00)00113-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SalehA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SamouHGN00,
  author       = {Jean Claude Samou and
                  Drissa Houatra and
                  Philippe Godlewski and
                  Elie Najm},
  title        = {{IMT-2000} wireless terminal mobility over object-oriented distributed
                  platforms},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {717--743},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00125-0},
  doi          = {10.1016/S1389-1286(00)00125-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SamouHGN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SanderFRW00,
  author       = {Volker Sander and
                  Ian T. Foster and
                  Alain J. Roy and
                  Linda Winkler},
  title        = {A differentiated services implementation for high-performance {TCP}
                  flows},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {6},
  pages        = {915--929},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00162-6},
  doi          = {10.1016/S1389-1286(00)00162-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SanderFRW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SchmidtsV00,
  author       = {Harald Schmidts and
                  John Visser},
  title        = {Framework for {IMT-2000} networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {5},
  pages        = {705--715},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00124-9},
  doi          = {10.1016/S1389-1286(00)00124-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SchmidtsV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SoldatosVM00,
  author       = {John Soldatos and
                  Evangelos Vayias and
                  Nikolas Mitrou},
  title        = {{CAC} and traffic shaping for performance control in {ATM:} the two-class
                  paradigm},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {65--83},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00097-9},
  doi          = {10.1016/S1389-1286(00)00097-9},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SoldatosVM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Song00,
  author       = {Shaowen Song},
  title        = {A credit-based flow control algorithm for broadband access networks},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {2},
  pages        = {279--295},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00108-0},
  doi          = {10.1016/S1389-1286(00)00108-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Song00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SpaffordZ00,
  author       = {Eugene H. Spafford and
                  Diego Zamboni},
  title        = {Intrusion detection using autonomous agents},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {547--570},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00136-5},
  doi          = {10.1016/S1389-1286(00)00136-5},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SpaffordZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/StathisM00,
  author       = {Christos Stathis and
                  Basil S. Maglaris},
  title        = {Modelling the self-similar behaviour of network traffic},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {37--47},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00095-5},
  doi          = {10.1016/S1389-1286(00)00095-5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/StathisM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/VojnoviR00,
  author       = {Milan Vojnovic and
                  Nikola Rozic},
  title        = {An evaluation of the {ABR} explicit-rate allocation interfering with
                  the guaranteed services traffic},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {1},
  pages        = {139--155},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00102-X},
  doi          = {10.1016/S1389-1286(00)00102-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/VojnoviR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YuillWSGFHA00,
  author       = {Jim Yuill and
                  Shyhtsun Felix Wu and
                  J. Settle and
                  Fengmin Gong and
                  R. Forno and
                  Ming{-}Yuh Huang and
                  J. Asbery},
  title        = {Intrusion-detection for incident-response, using a military battlefield-intelligence
                  process},
  journal      = {Comput. Networks},
  volume       = {34},
  number       = {4},
  pages        = {671--697},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00142-0},
  doi          = {10.1016/S1389-1286(00)00142-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YuillWSGFHA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics