Search dblp for Publications

export results for "toc:db/journals/ijnm/ijnm12.bht:"

 download as .bib file

@article{DBLP:journals/ijnm/Al-AmriA02,
  author       = {Marei S. Al{-}Amri and
                  Rana Ejaz Ahmed},
  title        = {New job selection and location policies for load-distributing algorithms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {165--178},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.428},
  doi          = {10.1002/NEM.428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-AmriA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-Ruwais02,
  author       = {Abdulaziz S. Al{-}Ruwais},
  title        = {Teletraffic capacity of {CDMA} cellular mobile networks and adaptive
                  antennas},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {203--211},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.435},
  doi          = {10.1002/NEM.435},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-Ruwais02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlheraishSI02,
  author       = {Abdulmohsen A. Alheraish and
                  D. G. Smith and
                  James Irvine},
  title        = {A novel methodology for robust {VBR} video transmission in an {ATM}
                  system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {347--355},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.450},
  doi          = {10.1002/NEM.450},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlheraishSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM02,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Service differentiation using a multi-level {RED} mechanism},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {81--98},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.424},
  doi          = {10.1002/NEM.424},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM02a,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {A self-regulating {TCP} acknowledgment {(ACK)} pacing scheme},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {145--163},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.426},
  doi          = {10.1002/NEM.426},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM02b,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Interworking of switched ethernet and {ATM} flow control mechanisms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {357--366},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.452},
  doi          = {10.1002/NEM.452},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMDF02,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Bernard Doray and
                  Kent Felske},
  title        = {An adaptive load balancing scheme for web servers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {3--39},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.421},
  doi          = {10.1002/NEM.421},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMDF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChaoHT02,
  author       = {Han{-}Chieh Chao and
                  C. L. Hung and
                  Tak{-}Goa Tsuei},
  title        = {{ECVBA} traffic-smoothing scheme for {VBR} media streams},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {179--185},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.434},
  doi          = {10.1002/NEM.434},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChaoHT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChellappaG02,
  author       = {Ramnath K. Chellappa and
                  Alok Gupta},
  title        = {Managing computing resources in active intranets},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {117--128},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.427},
  doi          = {10.1002/NEM.427},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChellappaG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chen02,
  author       = {Yen{-}Wen Chen},
  title        = {Traffic behavior analysis and modeling of sub-networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {323--330},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.451},
  doi          = {10.1002/NEM.451},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenY02,
  author       = {Jiann{-}Liang Chen and
                  Ka{-}Chin Yen},
  title        = {Transparent bridging support for Bluetooth-IP service interworking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {379--386},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.454},
  doi          = {10.1002/NEM.454},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChengCLC02,
  author       = {Sheng{-}Tzong Cheng and
                  C. Chen and
                  C. Li and
                  Chia{-}Mei Chen},
  title        = {Network topology management in a mobile-switch {ATM} network: dynamic
                  partition algorithms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {99--115},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.425},
  doi          = {10.1002/NEM.425},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChengCLC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranP02,
  author       = {Kevin Curran and
                  Gerard Parr},
  title        = {A framework for the transmission of streaming media to mobile devices},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {41--59},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.420},
  doi          = {10.1002/NEM.420},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FlynnCL02,
  author       = {Paul Flynn and
                  Kevin Curran and
                  Tom Lunney},
  title        = {A decision support system for telecommunications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {69--80},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.422},
  doi          = {10.1002/NEM.422},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FlynnCL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GreschlerM02,
  author       = {David Greschler and
                  Tim Mangan},
  title        = {Networking lessons in delivering Software as a Service - part {I}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {317--321},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.446},
  doi          = {10.1002/NEM.446},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GreschlerM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GreschlerM02a,
  author       = {David Greschler and
                  Tim Mangan},
  title        = {Networking lessons in delivering Software as a Service - Part {II}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {339--345},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.447},
  doi          = {10.1002/NEM.447},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GreschlerM02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacZ02,
  author       = {Anna Hac and
                  Yongcan Zhang},
  title        = {Reducing signaling traffic in wireless {ATM} networks through handoff
                  scheme improvement},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {281--302},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.444},
  doi          = {10.1002/NEM.444},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HanAC02,
  author       = {Jeong{-}Soo Han and
                  Seong{-}Jin Ahn and
                  Jin{-}Wook Chung},
  title        = {Study of delay patterns of weighted voice traffic of end-to-end users
                  on the VoIP network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {271--280},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.443},
  doi          = {10.1002/NEM.443},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HanAC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02,
  author       = {Gilbert Held},
  title        = {Amazon needs a Sampson},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {1},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.419},
  doi          = {10.1002/NEM.419},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02a,
  author       = {Gilbert Held},
  title        = {Focus on: Encryption Plus},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {61--66},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.416},
  doi          = {10.1002/NEM.416},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02b,
  author       = {Gilbert Held},
  title        = {Minimizing wireless {LAN} exposure},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {67},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.440},
  doi          = {10.1002/NEM.440},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02c,
  author       = {Gilbert Held},
  title        = {Focus on: Router Sim},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {129--132},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.417},
  doi          = {10.1002/NEM.417},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02d,
  author       = {Gilbert Held},
  title        = {Our new world},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {133},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.449},
  doi          = {10.1002/NEM.449},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02e,
  author       = {Gilbert Held},
  title        = {Focus on Agere System's Orinoco {PC} Card},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {187--193},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.432},
  doi          = {10.1002/NEM.432},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02f,
  author       = {Gilbert Held},
  title        = {Focus on EtherPeek},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {195--199},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.429},
  doi          = {10.1002/NEM.429},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02g,
  author       = {Gilbert Held},
  title        = {Fed up with the Feds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {201},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.441},
  doi          = {10.1002/NEM.441},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02h,
  author       = {Gilbert Held},
  title        = {Focus on System Mechanic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {259--263},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.430},
  doi          = {10.1002/NEM.430},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02i,
  author       = {Gilbert Held},
  title        = {Focus on the {SMC} network {EZ} Connect Wireless {PC} Card},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {265--267},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.437},
  doi          = {10.1002/NEM.437},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02j,
  author       = {Gilbert Held},
  title        = {Fighting junk fax},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {269},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.448},
  doi          = {10.1002/NEM.448},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02k,
  author       = {Gilbert Held},
  title        = {Focus on AiroPeek},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {331--335},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.431},
  doi          = {10.1002/NEM.431},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02l,
  author       = {Gilbert Held},
  title        = {Are Our Rights Illegal?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {337},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.474},
  doi          = {10.1002/NEM.474},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02m,
  author       = {Gilbert Held},
  title        = {Focus on the {SMC} Networks Barricade},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {387--393},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.438},
  doi          = {10.1002/NEM.438},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HendriksSL02,
  author       = {J. C. W. Hendriks and
                  Marcel E. M. Spruit and
                  Maarten Looijen},
  title        = {Network management abroad},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {303--316},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.445},
  doi          = {10.1002/NEM.445},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HendriksSL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongH02,
  author       = {Daniel Won{-}Kyu Hong and
                  Choong Seon Hong},
  title        = {Hierarchical {VP} restoration management system for a reliable {ATM}
                  backbone network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {213--224},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.436},
  doi          = {10.1002/NEM.436},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimCH02,
  author       = {Myung{-}Sup Kim and
                  Mi{-}Joung Choi and
                  James Won{-}Ki Hong},
  title        = {A load cluster management system using {SNMP} and web},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {367--378},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.453},
  doi          = {10.1002/NEM.453},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimCH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Lincke-SaleckerH02,
  author       = {Susan Lincke{-}Salecker and
                  Cynthia S. Hood},
  title        = {Integrated networks that overflow speech and data between component
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {235--257},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.442},
  doi          = {10.1002/NEM.442},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Lincke-SaleckerH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Liu02,
  author       = {Xian Liu},
  title        = {Network optimization with stochastic traffic flows},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {225--234},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.439},
  doi          = {10.1002/NEM.439},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Liu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Myerson02,
  author       = {Judith M. Myerson},
  title        = {Identifying enterprise network vulnerabilities},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {135--144},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.433},
  doi          = {10.1002/NEM.433},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Myerson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics