Computer Communications, Volume 22
Volume 22, Number 1, 15 January 1999
- Sheng-Tzong Cheng:
Backtrack Routing and Priority-Based Wavelength Assignment in WDM Networks. Computer Communications 22(1): 1-10 (1999) - Georgios I. Papadimitriou:
Centralized Packet Filtering Protocols: A New Family of MAC Protocols for WDM Star Networks. Computer Communications 22(1): 11-19 (1999) - Periklis Tsingotjidis, Jeremiah F. Hayes:
Proactive Congestion Controls for the Support of Variable Bit Rate Services on Broadband satellite Networks - A Feasibility Study. Computer Communications 22(1): 20-29 (1999) - Nada Golmie, Mark D. Corner, Jörg Liebeherr, David H. Su:
ATM Traffic Control in Hybrid Fiber-Coax Networks - Problems and Solutions. Computer Communications 22(1): 30-39 (1999) - Xinyu Wang, James S. Meditch:
Adaptive Wavelet Predictor to Improve Bandwidth Allocation Efficiency of VBR Video Traffic. Computer Communications 22(1): 40-45 (1999) - Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu:
Optimal Assignment of Mobile Agents for Software Authorization and Protection. Computer Communications 22(1): 46-55 (1999) - Jau-Hsiung Huang, Chun-Chuan Yang, Nai-Cheng Fang:
A Novel Congestion Control Mechanism for Multicast Real-Time Connections. Computer Communications 22(1): 56-72 (1999) - Wen-Shenq Juang, Chin-Laung Lei:
Partially Blind Threshold signatures Based on Discrete Logarithm. Computer Communications 22(1): 73-86 (1999) - Narn-Yih Lee, Tzonelih Hwang:
Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy". Computer Communications 22(1): 87-89 (1999)
Volume 22, Number 2, 25 January 1999
- Jung-Shian Li, Adam Wolisz, Radu Popescu-Zeletin:
Measurement and Performance Evaluation of NFS Traffic in ATM Network. Computer Communications 22(2): 101-109 (1999) - Hasan Cam:
A High-Performance ATM Switch Based on Modified Shuffle-Exchange Network. Computer Communications 22(2): 110-119 (1999) - Robert M. Hierons:
Minimizing the Cost of Fault Location when Testing from a Finite State Machine. Computer Communications 22(2): 120-127 (1999) - Samphel Norden, S. Balaji, G. Manimaran, C. Siva Ram Murthy:
Deterministic Protocols for Real-Time Communication in Multiple Access Networks. Computer Communications 22(2): 128-136 (1999) - Yong Lee, JooSeok Song:
An Overload Control of SCP in Advanced Intelligent Network with Fairness and Priority. Computer Communications 22(2): 137-143 (1999) - Jhyda Lin, Ruay Shiung Chang:
A Comparison of the Internet Multicast Routing Protocols. Computer Communications 22(2): 144-155 (1999) - Debanjan Saha, M. D. Purkayastha, Amitava Mukherjee:
An Approach to Wide Area WDM Optical Network Design Using Genetic Algorithm. Computer Communications 22(2): 156-172 (1999) - Sooyong Kang, Heon Young Yeom:
Transmission of Video Streams with Constant Bandwidth Allocation. Computer Communications 22(2): 173-180 (1999) - Chor Ping Low:
Loop-Free Multicast Routing with End-to-End Delay Constraint. Computer Communications 22(2): 181-192 (1999) - Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun:
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Computer Communications 22(2): 193-194 (1999)
Volume 22, Number 3, February 1999
- Giuseppe Ficili, Daniela Panno:
A fuzzy algorithm for combined control of traffic parameters: assessment and key issues. 199-210 - Stefan Fischer:
Towards the automatic generation of quality-of-service-preserving implementations from formal specifications. 211-223 - Gurusamy Mohan, C. Siva Ram Murthy:
Efficient algorithms for wavelength rerouting in WDM multi-fiber unidirectional ring networks. 232-243 - K. R. Venugopal, E. Ezhil Rajan, P. Sreenivasa Kumar:
Impact of wavelength converters in wavelength routed all-optical networks. 244-257 - Vincenzo Catania, Giuseppe Ficili, Daniela Panno:
On the impact of traffic control algorithms on resource management in ATM networks. 258-265 - D. Venkatesulu, Timothy A. Gonsalves:
Efficient fault-tolerant reliable broadcast in a multi-switch extended LAN. 266-278 - Narn-Yih Lee, Tzonelih Hwang:
On the security of fair blind signature scheme using oblivious transfer. 287-290
Volume 22, Number 4, March 1999
- Anirban Roy, Pallapa Venkataram:
A multiple access scheme for VBR traffic in broadband wireless local communication. 353-360 - Evangelia Tzifa, Panagiotis Demestichas, Malamati D. Louta, E. S. Tsouka, Michael E. Theologou, Miltiades E. Anagnostou:
Adaptive radio spectrum allocation through mid-term reconfigurations for cellular communications systems. 361-375 - Robert Leslie, Sati McKenzie:
Evaluation of loadsharing algorithms for heterogeneous distributed systems. 376-389
Volume 22, Number 5, April 1999
- Reuven Cohen:
An efficient scheme for accommodating synchronous traffic in a cable-modem network while avoiding segmentation of asynchronous packets. 399-410 - Chi-Chun Lo, Shing Hong Chen:
A scheduling-based event correlation scheme for fault identification in communications network. 432-438 - Diane Gan, Sati McKenzie:
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket. 439-450 - Y. J. Cho:
Discrete-time analysis of throughput and response time for LAP derivative protocols under Markovian block-error pattern. 451-462 - R. Radhakrishna Pillai, Su Kwe Long, Jit Biswas, Chen-Khong Tham:
Call performance studies on the ATM forum UNI signalling implementations. 463-469 - T.-J. Kim, Byung-Choel Shin:
Improving the performance of distributed queue dual bus with slot reuse at overload conditions. 470-482
- Rolf Oppliger:
D. B. Parker: Fighting computer crimes: a new framework for protecting information. 491-492 - Tee Hiang Cheng, Andrew T. Campbell, Klara Nahrstedt:
Building QoS into distributed systems. 493-494
Volume 22, Number 6, April 1999
- Mahmoud Saleh, Mohammed Atiquzzaman:
An accurate performance model of shared buffer ATM switches under hot spot traffic. 516-522 - Gee-Swee Poo, Q. Zeng:
Design, implementation and performance study of reliable transactions in X.500 directory service. 523-542 - Woei Lin, Wen-Shyen E. Chen:
Efficient nonblocking multicast communications on baseline networks. 556-567 - Kee Chaing Chua, Y. Z. Li, C. C. Foo:
On a Linux implementation of mobile IP and its effects on TCP performance. 568-588
- Rita Puzmanova:
Virtual LANs: construction, implementation, and management. New York: John Wiley and Sons, 1997, ISBN 0-471-17732-6, US$ 39.33, 321 pages: High-speed networking with LAN switches. 589-590 - Tom Pfeifer:
Speech technology for telecommunications - BT telecommunication series; Vol. 11; F.A. Westall, R.D. Johnston, A.V. Lewis (Eds.). 590 - Robert H. Deng:
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. 591
Volume 22, Number 7, May 1999
- Yuan Yuan Yang:
An analytical model for the performance of buffered multicast banyan networks. 598-607 - Dimiter R. Avresky, Vladimir Shurbanov, Robert W. Horst:
Optimizing router arbitration in point-to-point networks. 608-620 - Kia Makki, Niki Pissinou:
Efficient detection and resolution of deadlocks in distributed databases. 637-643 - Mohammad S. Obaidat, Jun Teng:
A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks. 644-650 - Niki Pissinou, Kia Makki, William J. Campbell:
On the design of a location and query management strategy for mobile and wireless environments. 651-666 - Jaihyung Cho, James Breen:
Analysis of the performance of dynamic multicast routing algorithms. 667-674 - Jerrold F. Stach, Eun Kyo Park, Kia Makki:
Performance of an enhanced GSM protocol supporting non-repudiation of service. 675-680
Volume 22, Number 8, May 1999
- Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis:
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. 697-709 - Hung-Min Sun:
An efficient nonrepudiable threshold proxy signature scheme with known signers. 717-722 - Wei-Hua He, Tzong-Chen Wu:
Cryptanalysis of Lee and Chang's ID-based information security functions. 723-726 - Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang:
New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. 727-729 - Narn-Yih Lee, Tzonelih Hwang:
Group-oriented undeniable signature schemes with a trusted center. 730-734 - Kaijun Tan, Hongwen Zhu:
A conference key distribution scheme based on the theory of quadratic residues. 735-738 - Yuh-Min Tseng, Jinn-ke Jan:
Anonymous conference key distribution systems based on the discrete logarithm problem. 749-754 - Valdemar Cardoso da Rocha Jr., D. L. de Macêdo:
A secret-key cipher based on a non-linear structured code. 758-761
Volume 22, Number 9, June 1999
- Giovanni Fruscio, A. Ishaq, Valentina Petrone:
A signalling server prototype for the support of multipoint to multipoint multimedia services. 778-791 - HungKei Keith Chow, Alberto Leon-Garcia:
Integrated services internet with RSVP over ATM short cuts: Implementation and performance evaluation. 792-802 - Tee-Hiang Cheng, Y.-K. Sze, Wesley Chee-Wah Tan:
A heuristic algorithm for allocating virtual path bandwidth in an ATM network. 803-810 - Georgios I. Papadimitriou, Amalia N. Miliou, Andreas S. Pomportsis:
OCON: an optically controlled optical network. 811-824 - Ahmed E. Kamal, Hossam S. Hassanein:
Capacity enhancement of local area bus networks using wavelength division multiplexing. 825-839 - D. Das, S. S. Saini, Debasish Datta:
Performance analysis of computer networks employing linked-cluster topology with single-wavelength and WDM optical backbones. 840-848 - Hairong Sun, Xinyu Zang, Kishor S. Trivedi:
A stochastic reward net model for performance analysis of prioritized DQDB MAN. 858-870 - Chien-Yuan Chen, T.-C. Liu:
A fast modular multiplication method based on the Lempel-Ziv binary tree. 871-874
- D. Saha:
Broadband communications: the future of telecommunications by P. Kuhn & R. Ulrich (Eds.). 877-878
Volume 22, Number 10, June 1999
- Q. Wu, Thierry Divoux, Francis LePage:
Integrating multimedia communications into an MMS environment. 907-918 - Israel Cidon, Raphael Rom, Yuval Shavitt:
Bandwidth reservation for bursty traffic in the presence of resource availability uncertainty. 919-929 - Joseph Kee-Yin Ng, Victor C. S. Lee:
Transmitting real-time VBR traffic with QoS control in a timed token medium access control network. 930-941 - G. K. Mamais, George A. Politis, Iakovos S. Venieris:
Design and implementation of a broadband intelligent peripheral. 942-954 - Jerzy Wechta, Armin Eberlein, Fred Halsall:
The impact of topology and choice of TCP window size on the performance of switched LANs. 955-965 - Tong Shan, Oliver W. W. Yang:
An efficient admission control scheme for the real-time VBR traffic in the ATM network: deterministic bandwidth allocation. 966-979
- Georgios I. Papadimitriou, Andreas S. Pomportsis:
Optical network design and modelling, by H.R. van As, A. Jukan (Eds.). 980 - Hairong Sun:
Performance Modelling with Deterministic and Stochastic Petri Nets; C. Lindemann (Ed.). 980 - Yonghuan Cao, Hairong Sun:
Quality of service: delivering QoS on the internet and in corporate networks; P. Ferguson, G. Huston. 981
Volume 22, Number 11, July 1999
- Gee-Swee Poo, Andrzej M. Goscinski:
Introduction to special issue on network-based parallel and distributed computing. 987-988 - Amnon Barak, Ilia Gilderman, Igor Metrik:
Performance of the communication layers of TCP/IP with the Myrinet gigabit LAN. 989-997 - Andrzej M. Goscinski:
Finding, expressing and managing parallelism in programs executed on clusters of workstations. 998-1016 - Micah Beck, Henri Casanova, Jack J. Dongarra, Terry Moore, James S. Plank, Francine Berman, Richard Wolski:
Logistical quality of service in NetSolve. 1034-1044 - Wanlei Zhou:
Detecting and tolerating failures in a loosely integrated heterogeneous database system. 1056-1067 - Wanlei Zhu, Tyng-Yeu Liang, Ce-Kuen Shieh:
A Hopfield neural network based task mapping method. 1068-1079
Volume 22, Number 12, July 1999
- Sonia Fahmy, Raj Jain, Rohit Goyal, Bobby Vandalore, Shivkumar Kalyanaraman:
Design and evaluation of feedback consolidation for ABR point-to-multipoint connections in ATM networks. 1085-1103 - Tomaz Klobucar, Borka Jerman-Blazic:
A formalisation and evaluation of certificate policies. 1104-1110 - Liren Zhang, Kee Way Ng, Chee Hock Ng, K. R. Subramanian:
Incorporating priority scheme in IPv6 over ATM networks. 1111-1122 - N. Swaminathan, Jagannathan Srinivasan, S. V. Raghavan:
Bandwidth-demand prediction in virtual path in ATM networks using genetic algorithms. 1127-1135 - Yihong Long, T. K. Ho, Ahmad B. Rad, Stephen P. S. Lam:
A Sigma GIi/D/1/infinity queue with heterogeneous input/output slot times. 1136-1149 - Ki-Ho Cho, Hyunsoo Yoon:
Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees. 1150-1159 - Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee:
Conference key distribution schemes for portable communication systems. 1160-1164
Volume 22, Number 13, August 1999
- Mohammad Peyravian, Stephen M. Matyas, Nevenko Zunic:
Decentralized group key management for secure multicast communications. 1183-1187 - Ji-Horng Liaw, Cheng-Ming Weng:
Two-dimensional shared memory multicast ATM switching architecture. 1188-1197 - Eduardo Tovar, Francisco Vasques:
Cycle time properties of the PROFIBUS timed-token protocol. 1206-1216