- Yiwei Thomas Hou, Bo Li, Shivendra S. Panwar, Henry H.-Y. Tzeng:
On network bandwidth allocation policies and feedback control algorithms for packet networks. Comput. Networks 34(3): 481-501 (2000) - Larry Hughes, Omid Banyasad, Evan J. Hughes:
Cartesian routing. Comput. Networks 34(3): 455-466 (2000) - Ren-Hung Hwang, James F. Kurose, Donald F. Towsley:
MDP routing for multi-rate loss networks. Comput. Networks 34(2): 241-261 (2000) - Gregory Karvounarakis, Sarantos Kapidakis:
Submission and repository management of digital libraries, using WWW. Comput. Networks 34(6): 861-872 (2000) - Demetres D. Kouvatsos:
Performance Modelling and Evaluation of ATM Networks. Comput. Networks 34(1): 1-2 (2000) - Demetres D. Kouvatsos, Irfan-Ullah Awan, Rod J. Fretwell, George Dimakopoulos:
A cost-effective approximation for SRD traffic in arbitrary multi-buffered networks. Comput. Networks 34(1): 97-113 (2000) - Wei Kuang Lai, Mu-Rung Shiu:
Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes. Comput. Networks 34(3): 419-437 (2000) - Ilhem Lengliz, Farouk Kamoun:
A rate-based flow control method for ABR service in ATM networks. Comput. Networks 34(1): 129-138 (2000) - Richard Lippmann, Robert K. Cunningham:
Improving intrusion detection performance using keyword selection and neural networks. Comput. Networks 34(4): 597-603 (2000) - Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:
The 1999 DARPA off-line intrusion detection evaluation. Comput. Networks 34(4): 579-595 (2000) - Luigi Logrippo, John Visser:
Future wireless networks. Comput. Networks 34(5): 701-703 (2000) - Alfio Lombardo, Ferdinando Lucidi, Marina Samarotto, Sebastiano Trigila:
Personal mobility aspects in service architectures: extensions to TINA. Comput. Networks 34(5): 745-762 (2000) - Emilie Lundin, Erland Jonsson:
Anomaly-based intrusion detection: privacy concerns and other problems. Comput. Networks 34(4): 623-640 (2000) - Giulio Maggiore, Giulio Brusasco, Marco Vecchiato:
Network integration testing: concepts, test specifications and tools for automatic telecommunication services verification. Comput. Networks 34(5): 799-819 (2000) - Ádám Magi, Áron Szentesi, Balázs Szviatovszki:
Analysis of link cost functions for PNNI routing. Comput. Networks 34(1): 181-197 (2000) - Keith Mainwaring:
A role for ATM in telephony and IP networks. Comput. Networks 34(3): 439-454 (2000) - Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz:
A data mining analysis of RTID alarms. Comput. Networks 34(4): 571-577 (2000) - Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto:
Towards trapping wily intruders in the large. Comput. Networks 34(4): 659-670 (2000) - Peter Mell, Donald G. Marks, Mark McLarnon:
A denial-of-service resistant intrusion detection architecture. Comput. Networks 34(4): 641-658 (2000) - Stanislav Milanovic, Alessandro Maglianella:
ATM over ADSL probe in Telecom Italia environment. Comput. Networks 34(6): 965-980 (2000) - Michael Montgomery, Gustavo de Veciana:
Hierarchical source routing using implied costs. Comput. Networks 34(3): 379-397 (2000) - Jan Naudts:
Towards real-time measurement of traffic control parameters. Comput. Networks 34(1): 157-167 (2000) - Peter Ørbæk:
An experimental system for distributed classroom education. Comput. Networks 34(6): 843-850 (2000) - Sui Meng Poon, Jie Song, Bu-Sung Lee, Chai Kiat Yeo:
Performance of buffer-based request-reply scheme for VoD streams over IP networks. Comput. Networks 34(2): 229-240 (2000) - Claudia Raibulet, Claudio Demartini:
Mobile agent technology for the management of distributed systems - a case study. Comput. Networks 34(6): 823-830 (2000) - Mahmoud Saleh, Mohammed Atiquzzaman:
Analysis of shared buffer switches under non-uniform traffic pattern and global flow control. Comput. Networks 34(2): 297-315 (2000) - Jean Claude Samou, Drissa Houatra, Philippe Godlewski, Elie Najm:
IMT-2000 wireless terminal mobility over object-oriented distributed platforms. Comput. Networks 34(5): 717-743 (2000) - Volker Sander, Ian T. Foster, Alain J. Roy, Linda Winkler:
A differentiated services implementation for high-performance TCP flows. Comput. Networks 34(6): 915-929 (2000) - Harald Schmidts, John Visser:
Framework for IMT-2000 networks. Comput. Networks 34(5): 705-715 (2000) - John Soldatos, Evangelos Vayias, Nikolas Mitrou:
CAC and traffic shaping for performance control in ATM: the two-class paradigm. Comput. Networks 34(1): 65-83 (2000)