Volume 18,
Number 1,
January 1995
Local and Metropolitan Networks
- Thomas Meuser:
Performance Comparison of Media Access Protocols for Gbit/s Networks in the Local Area.
4-14
- Marco Conti, Enrico Gregori, Luciano Lenzini:
Estimating the Quality of Service of Token Passing MAC Protocols.
15-23
- Paola Crocetti, Shivi Fotedar, Luigi Fratta, Giorgio Gallassi, Mario Gerla:
ATM Virtual Private Network Design Alternatives.
24-31
- Ruixi Yuan:
Traffic Pattern Based Mobile Routing Scheme.
32-36
- Milan Kovacevic, Mario Gerla, Joseph A. Bannister:
Performance of Shared-Channel Multihop Lightwave Networks.
37-44
- Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
45-47
- Tien-Yu Huang, Jean-Lien C. Wu, I. Bosley, T. Kuchlein, Krzysztof Pawlikowski, A. Stewart:
On Priority Promotion DQDB Networks to Improve Fairness.
48-49
- Christopher Ward, Thomas M. Phillips:
Throughput Efficiency of an Enhanced Link Management Procedure.
50-51
Volume 18,
Number 2,
February 1995
- Magdalena Feldhoffer:
Model for Flexible Configuration of Application-Oriented Communication Services.
69-78
- Luis Orozco-Barbosa, Na'el Hirzalla:
Share-Based Congestion Control Scheme for Systems of Interconnected Networks.
79-88
- Eckhard Moeller, Sanjay Manandhar, Luc Neumann, Johannes Rückert, Gerd Schürmann, Susan Thomas, Frieder Wolf:
The BERKOM Multimedia-Mail Teleservice.
89-102
- C. K. Chirchir, Ahmed E. Kamal:
The Leaky Window: A Flow and Congestion Control Technique for HS-WANs.
103-112
- T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman:
Fault Detection and Diagnosis Capabilities of Test Sequence Selection Methods Based on the FSM Model.
113-122
- W. D. K. Macrosson, R. L. Wickramasinghe:
Progress Within UK Firms Towards Inter-Departmental Data Exchange In the Open System Context.
123-126
Volume 18,
Number 3,
March 1995
Multimedia Storage Servers
- Thomas D. C. Little:
Multimedia Storage Servers - Introduction.
131-132
- Ralf Steinmetz:
Multimedia File Systems Survey: Approaches for Continuous Media Disk Scheduling.
133-144
- Jonathan C. L. Liu, David Hung-Chang Du, James A. Schnepf:
Supporting Random Access on Real-Time Retrieval of Digital Continuous Media.
145-159
- Tom Pfeifer, A. Blobelt:
Local Storage Systems for Continuous Data with Heterogeneous Timing Requirements.
160-169
- Shahram Ghandeharizadeh, Ali E. Dashti, Cyrus Shahabi:
Pipelining Mechanism to Minimize the Latency Time in Hierarchical Multimedia Storage Managers.
170-184
- M. Seo, Chee-Ha Kim:
Allocation Strategies of Multimedia Data on Disk Arrays.
185-191
- Harrick M. Vin, Alok Goyal, Pawan Goyal:
Algorithms for Designing Multimedia Servers.
192-203
- Christos H. Papadimitriou, Srinivas Ramanathan, P. Venkat Rangan, Srihari Sampath Kumar:
Multimedia Information Caching for Personalized Video-on-Demand.
204-216
- R. Clark Robertson, Tri T. Ha, D. V. Banh:
Effect of Capture on Throughput of Variable Length Packet Aloha Systems.
220
Volume 18,
Number 4,
April 1995
- K. Poon:
Inside a Trader in Global Trading.
227-246
- A. T. H. van der Voort, A. L. Boonstra, F. H. R. de Thouars:
Routing Names and Addresses in the International MHS.
247-251
- S. S. Alwakeel, Mohammad Ilyas:
Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network.
252-261
- Andreas Cramer, Richard Hofmann, Norbert Luttenberger:
Performance Measurements on the Heidelberg Audio/Video Distribution System: Methodology and Results.
262-275
- Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:
Recovery Approach to the Design of Stabilizing Communication Protocols.
276-287
- Christos Douligeris, Lakshmana N. Kumar:
Fairness Issues in the Networking Environment.
288-299
- Dieter Baum, Luciano Lenzini:
Performance Analysis of SDN-Specific Error Recovery Procedures: Comparison of Step-by-Step and End-to-End Schemes.
300-309
Volume 18,
Number 5,
May 1995
- K. P. Kontovassilis, J. T. Tsiligaridis, George I. Stassinopoulos:
Buffer Dimensioning for Delay- and Loss-Sensitive Traffic.
315-328
- T. Ramalingam, Anindya Das, Krishnaiyan Thulasiraman:
On Testing and Diagnosis of Communication Protocols Based on the FSM Model.
329-337
- Andrzej R. Pach, Sergio Palazzo, Daniela Panno:
Delay Analysis of DQDB Networks with Slot Preuse and Reuse.
338-344
- R. C. Betini, Hisao Kameda, Kentaro Shimizu:
Flow Control and Routing Algorithms in WAPSN.
345-356
- Nen-Fu Huang, Gin-Kou Ma, Yi-Jang Wu:
Hot-Spot Spanning Tree Algorithm for a Bridged LAN/MAN.
357-366
- C. Y. Lee:
Application of a Cross Decomposition Algorithm to a Location and Allocation Problem in Distributed Systems.
367-377
- Debanjan Saha, Amitava Mukherjee:
Design of Hierarchical Communication Networks Under Node/Link Failure Constraints.
378-383
- Debanjan Saha:
Verifying the Progress Properties of a Heterogeneous Protocol System in an Internetworking Environment.
384-391
- C. Hirsch, L. Rojas:
Internal Communications in a Multiprocessor ISDN PBX.
392-396
Volume 18,
Number 6,
June 1995
Electronic Document Delivery
Volume 18,
Number 7,
July 1995
Volume 18,
Number 8,
August 1995
Bandwidth Management on High Speed Networks
Volume 18,
Number 9,
September 1995
- T. Burrage, S. Ward:
Adaptive priority timer control of the SAE LTPB for fair prioritization in military avionics networks.
591-599
- Jean Lambert, Béatrice Stéphan:
Modelling network profiles.
600-608
- Wen-Huei Chen, Chuan Yi Tang, Son T. Vuong:
Improving the UIOv-method for protocol conformance testing.
609-619
- Craig E. Wills, David Finkel:
Scalable approaches to load sharing in the presence of multicasting.
620-630
- Raed Y. Awdeh, Hussein T. Mouftah:
MS4 - a high performance output buffering ATM switch.
631-644
- Philippe A. Janson, Gene Tsudik:
Secure and minimal protocols for authenticated key distribution.
645-653
- Tzong-Chen Wu, Tzong-Sun Wu:
Group commitment protocol based on zero knowledge proofs.
654-656
- Constantine Katsinis, Amelie Constant:
Bandwidth allocation in wide-band communication networks under two types of priorities.
657-662
- Ruey-yih Lin, Chyan Yang:
Link enhancement using constrained range and reduced candidate set searches: a revision.
663-668
- Toong Shoon Chan, Ian Gorton:
HTPNET: a high performance transport protocol.
669-681
- Aloknath De, N. Prithviraj:
Comments on 'Analysis of 1-ROR networks'.
682-683
- Krishna M. Sivalingam:
Asynchronous transfer mode networks: Performance issues: By R Onvural, Artech House, London, 1994, 254 pp.
687
- Rita Puzmanova:
LAN times encyclopedia of networking: By T Sheldon, McGraw-Hill, New York, 1994, $39.95, 1006 pp, ISBN 0-07-881965-2.
687-688
Volume 18,
Number 10,
October 1995
System Suport for Multimedia Computing
Volume 18,
Number 11,
November 1995
Beyond Intelligent Systems
Volume 18,
Number 12,
December 1995
- Giuseppe Anastasi, Marco Conti, Enrico Gregori, Luciano Lenzini:
Real-time applications in a CRMA network: a performance analysis.
871-879
- Jae Hwoon Lee, Chong Kwan Un:
Asynchronous reservation protocol for variable-sized messages in a WDM-based local network.
880-888
- Reinhard Baier, Eckhard Moeller, Angela Scheller:
ODA implementation for multimedia teleservices.
889-895
- Lakshmana N. Kumar, Andreas D. Bovopoulos:
Access protection solution for heavy load unfairness in DQDB.
896-910
- Ali Rezaki, Hasan Ural:
Construction of checking sequences based on characterization sets.
911-920
- Denis Trcek, Borka Jerman-Blazic:
Formal language for security services base modelling and analysis.
921-928
- Ji-Horng Liaw, Cheng-Ming Weng:
Modular multicast ATM switching architecture.
929-935
- Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen:
Remote scheme for password authentication based on theory of quadratic residues.
936-942
- Özgür Ulusoy:
Network access protocol for hard real-time communication systems.
943-948
- Ioannis E. Pountourakis, Efstathios D. Sykas, Emmanuel N. Protonotarios:
Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol.
949-958
- Tzong-Chen Wu:
Remote login authentication scheme based on a geometric approach.
959-963
- Howard Bowman, Gordon S. Blair, Lynne Blair, Amanda G. Chetwynd:
Formal description of distributed multimedia systems: an assessment of potential techniques.
964-977
- Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system.
978-981
- Kee Chaing Chua, W. M. Tan, Kin Mun Lye:
Performance of PRMA in a mobile radio channel.
982-987
- Kwok-Yan Lam:
Replay tolerance of authentication protocols.
988-992
- Yung-Hsiang Chen, Tzonelih Hwang:
ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer.
993-996
Copyright © Fri Mar 12 17:25:32 2010
by Michael Ley (ley@uni-trier.de)