


default search action
Computer Networks, Volume 6
Volume 6, Number 1, February 1982
- G. Michael Schneider, Mary N. Zastrow:

An Algorithm for the Design of Multilevel Concentrator Networks. 1-11 - Gordon S. Blair:

A Performance Study of the Cambridge Ring. 13-20 - Chris J. Bennett:

The Overheads of Transnetwork Fragmentation. 21-36 - Werner Bux, Karl Kümmerle, Hong Linh Truong:

Data Link-Control Performance: Results Comparing HDLC Operational Modes. 37-51
Volume 6, Number 2, May 1982
- J. Rubin, Colin H. West:

An Improved Protocol Validation Technique. 65-73 - Milena Didic, Bernd E. Wolfinger:

Simulation of a Local Computer Network Architecture Applying a Unified Modeling System. 75-91 - V. Carl Hamacher, Gerald S. Shedler:

Access Response on a Collision-Free Local Bus. 93-103 - Gordon S. Blair, Doug Shepherd:

A Performance Comparsion of Ethernet and the Cambridge Digital Communication Ring. 105-113
Volume 6, Number 3, July 1982
- Marvin H. Solomon, Lawrence H. Landweber, Donald Neuhengen:

The CSNET Name Server. 161-172 - Bernd Walter:

A Robust and Efficient Protocol for Checking the Availability of Remote Sites. 173-188 - Liang Li, Herman D. Hughes, Lewis H. Greenberg:

Performance Analysis of a Shortest-Delay Protocol. 189-200 - Thomas P. Blumer, Richard L. Tenney:

A Formal Specification Technique and Implementation Method for Protocols. 201-217
Volume 6, Number 4, September 1982
- Vernon Coleman:

Siliconizing the Local Area Network. 245-254 - Alastair Grant, David Hutchison:

X25 Protocols and Local Area Networks. 255-262 - Brian W. Unger, Don S. Bidulock:

The Design and Simulation of a Multi-Computer Network Message Processor. 263-277 - Wai Sum Lai:

An Analysis of Piggybacking in Packet Networks. 279-290
Volume 6, Number 5, November 1982
- S. Sitharama Iyengar

, Wendy Chih-Chun Liu:
Performance Statistics of a Time-Sharing Computer Network. 303-317 - J. A. Melici:

The BX.25 Certfication Facility. 319-329 - Charles W. Bachman, Ronald G. Ross:

Toward a More Complete Reference Model of Computer-Based Information Systems. 331-343 - Stefano Ceri, Giancarlo Martella, Giuseppe Pelagatti:

Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem. 345-357
Volume 6, Number 6, December 1982
- Carl A. Sunshine:

Protocol Specification, Testing and Verification - Guest Editorial. 375-376 - Yechiam Yemini, James F. Kurose:

Can Current Protocol Verification Techniques Guarantee Correctness? 377-381 - David Rayner:

A System for Testing Protocol Implementations. 383-395 - Thomas F. Piatkowski, Lap-Kin Ip, Dayun He:

State Architecture Notation and Simulation: A Formal Technique for the Specification and Testing of Protocol Systems. 397-418 - Michel Diaz:

Modeling and Analysis of Communication and Cooperation Protocols Using Petri Net Based Models. 419-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














