


default search action
Bell Labs Technical Journal, Volume 12
Volume 12, Number 1, Spring 2007
- Kristin F. Kocan:

Achieving the transformation to next-generation networks. 1-4 - Thomas W. Anderson, Peter B. Busschbach, Igor Faynberg, Hui-Lan Lu, Dong Sun:

The emerging resource and admission control function standards and their application to the new triple-play services. 5-21 - Andre Beck, Robert E. Daugherty, J. Robert Ensor, Jairo O. Esteban, F. Theodore Freuler, Sugato Ganguly, Kristin F. Kocan, William D. Roome:

Blending telephony and IPTV: Building the TV-link service package using the Alcatel-Lucent Service BrokerTM. 23-39 - Ganesan Radhakrishnan:

Provisioning in complex networks. 41-55 - Christian Hermsmeyer, Enrique J. Hernandez-Valencia, Dieter Stoll, Oliver Tamm:

Ethernet aggregation and core network models for effcient and reliable IPTV services. 57-76 - Subramanian Prakash, Abdol Saleh, Salman Shaikh, David Tsay:

Economic analysis of class 5 migration to IMS. 77-93 - Ying Hu, Amit Mukhopadhyay, Zulfiquar Sayeed, Carlos Urrutia-Valdés, Mohamed El-Sayed:

IMS service enhancement layer: A quantitative value proposition. 95-114 - Wenhua Jiao, Jianfeng Chen, Fang Liu:

Provisioning end-to-end QoS under IMS over a WiMAX architecture. 115-121 - Dalton Li, Andrew Guo, Brian Huang:

Generic policy decision function framework. 123-129 - Thierry Bessis:

Improving the DNS mechanism in a data center intranet. 131-144 - Sheng Chen, Xiangyang Li, Yigang Cai:

IP multimedia subsystem converged call control services. 145-160 - Eric S. Fisher, Steven Fortune, Martin K. Gladstein, Suresh Goyal, William B. Lyons

, James H. Mosher Jr., Gordon T. Wilfong:
Economic modeling of global test strategy I: Mathematical models. 161-173 - Eric S. Fisher, Steven Fortune, Martin K. Gladstein, Suresh Goyal, William B. Lyons

, James H. Mosher Jr., Gordon T. Wilfong:
Economic modeling of global test strategy II: Software system and examples. 175-186 - Jim Borger, Alina M. Ionescu-Graff, Samrat Kulkarni, Narayan Raman:

Economics of ethernet over SONET/SDH. 187-206 - Dieter Stoll, Wolfgang Thomas, Martin Belzner:

The role of pseudo-wires for layer 2 services in intelligent transport networks. 207-220 - Doh-Suk Kim, Ahmed A. Tarraf:

ANIQUE+: A new American national standard for non-intrusive estimation of narrowband speech quality. 221-236 - Michael J. Sheehan:

Secure parallel file distribution through a streaming worm network. 237-246 - David C. Ma:

Deterministic-based performance modeling of a cluster of nodes handling subscriber profile query and update in CDMA mobile switching center. 247-261
Volume 12, Number 2, Summer 2007
- Lawrence C. Cowsar:

A global research presence. 1-2 - Georg Fischer

:
Next-generation base station radio frequency architecture. 3-18 - Angeliki Alexiou:

WINNER: Designing a new radio interface for next-generation systems. 19-35 - Markus Bauer, Armin Dekorsy

, Peter Schefczik, Michael Söllner:
IP-driven access-independent resource management in converged access networks. 37-61 - Shipra Agrawal, C. N. Kanthi, K. V. M. Naidu, Jeyashankher Ramamirtham, Rajeev Rastogi, Scott Satkin, Anand Srinivasan:

Monitoring infrastructure for converged networks and services. 63-77 - Erik Meeuwissen, Paul Reinold, Cynthia C. S. Liem

:
Inferring and predicting context of mobile users. 79-86 - Supratim Deb, Ankur Jain, Anirban Majumder, K. V. M. Naidu, Jeyashankher Ramamirtham, Rajeev Rastogi, Anand Srinivasan:

Augmenting handset capacity through virtual storage. 87-96 - Alexei E. Ashikhmin, Adriaan J. de Lind van Wijngaarden

, Zhao Haibo, Bertrand M. Hochwald, Thomas L. Marzetta, Vinay Purohit, Chen Qinghong, Paul A. Wilford, Sheng-Rong Zhou, Michael A. Zuniga, Edward S. Zuranski:
Design and development of a terrestrial digital video broadcast demodulation core: An international collaborative effort. 97-118 - Partha Dutta, Sharad Jaiswal, Rajeev Rastogi:

VillageNet: A low-cost, IEEE 802.11-based mesh network for connecting rural areas. 119-131 - Terry S. Cheng, Kenneth W. Del Signore, Frances Lin:

Cost effective treatment of short message service on the paging channel for the CDMA system. 133-141 - Bradley D. Shaw:

The use of conduction to cool small form-factor pluggable optical transceivers. 143-146 - Michael R. Brenner, Musa R. Unmehopa:

Service-oriented architecture and Web services penetration in next-generation networks. 147-159
Volume 12, Number 3, Autumn (Fall) 2007
- Carlos C. Solari:

Designing for security. 1-6 - Vijay K. Gurbani, Andrew R. McGee:

An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain. 7-19 - Ashok K. Gupta, Uma Chandrashekhar, Suhasini V. Sabnis, Frank A. Bastry:

Building secure products and solutions. 21-38 - Andrew R. McGee, Frank A. Bastry, Uma Chandrashekhar, S. Rao Vasireddy, Lori A. Flynn:

Using the Bell Labs security framework to enhance the ISO 17799/27001 information security management system. 39-54 - David Ramírez:

Case study: ITU-T recommendation X.805 applied to an enterprise environment - banking. 55-64 - Robert S. Hanmer, Donald T. McBride, Veena B. Mendiratta:

Comparing reliability and security: Concepts, requirements, and techniques. 65-78 - Daping Wang:

An XML-based testing strategy for probing security vulnerabilities in the diameter protocol. 79-93 - Seyong Park, Alexandro Salvarani:

IP-based radio access network implementation cost vs. network security trade-off. 95-99 - Dimitrios Stiliadis, Andrea Francini, Sanjay Kamat, Mansoor Alicherry, Adiseshu Hari, Pramod V. Koppol, Ashok K. Gupta, Dor Skuler:

Evros: A service-delivery platform for extending security coverage and IT reach. 101-119 - Jorge Hernandez-Herrero, Jon A. Solworth:

The need for a multi-perspective approach to solve the DDos problem. 121-130 - Bjoern M. Luettmann, Adam C. Bender:

Man-in-the-middle attacks on auto-updating software. 131-138 - Gerald R. Thompson, Lori A. Flynn:

Polymorphic malware detection and identification via context-free grammar homomorphism. 139-147 - Lloyd G. Greenwald, Tavaris J. Thomas:

Understanding and preventing network device fingerprinting. 149-166 - Ruth S. Gayde, Stinson S. Mathai, Kevin Wang:

Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access. 167-185 - Andrew C. Clark, Karen E. Plonty:

Common security management for CDMA2000 1x and 1x EV-DO networks. 187-203
Volume 12, Number 4, Winter 2008
- Michael J. Burns:

Deploying, hardening, and benefiting from next-generation networks. 1-4 - Qingwang Michael Hao:

Toward a unified service delivery process for next-generation services. 5-20 - Anne Lee, Carlos Urrutia-Valdés:

An analysis of capital expenses and performance trade-offs among IMS CSCF deployment options. 21-31 - Jean-Philippe Joseph:

IMS network signaling peering: Challenges and proposal. 33-48 - Ramana Isukapalli, Steven A. Benno, Candace Park, Peretz Feder:

Advanced IMS client supporting secure signaling. 49-65 - Doru Calin, Andrew Mackay, Thomas B. Morawski, Hardy Zhang:

An approach for just-in-time radio access network capacity planning in CDMA networks. 67-82 - Bing Leng, Dave P. Weeks, Manoj K. Mahapatra:

Automating network configuration tasks using multi-level modeling. 83-101 - Steven H. Richman, Himanshu Pant:

Reliability concerns for next-generation networks. 103-108 - Himanshu Pant, Chi-Hung Kelvin Chu, Steven H. Richman, Ahmad M. Jrad, Gerard P. O'Reilly:

Reliability of next-generation networks with a focus on IMS architecture. 109-125 - Gerard P. O'Reilly, Chi-Hung Kelvin Chu:

Optimal deployment of power reserves across telecom critical infrastructures. 127-141 - Vassilka Kirova, Neil Kirby, Darshak Kothari, Glenda Childress:

Effective requirements traceability: Models, tools, and practices. 143-157 - Ramesh Viswanathan, Thomas L. Wood:

Portable Call Agent: A model for rapid development and emulation of network services. 159-172 - Hans Peng Liu:

Generic service provisioning and invocation in IMS. 173-178 - Jasper Aartse Tuijn, Dennis J. A. Bijwaard

:
Spanning a multimedia session across multiple devices. 179-193 - Bilgehan Erman, Elissa P. Matthews:

Analysis and realization of IPTV service quality. 195-212

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














