:facetid:toc:\"db/journals/jhsn/jhsn15.bht\"OK:facetid:toc:db/journals/jhsn/jhsn15.bhtAnwar AlyatamaComputing the equivalent Poisson traffic for the Wavelength Decomposition Method.J. High Speed Networks154399-4142006Journal Articlesclosedjournals/jhsn/Alyatama06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs300https://dblp.org/rec/journals/jhsn/Alyatama06URL#5666637Benjamin AzizSimon N. FoleyJohn HerbertGarret SwartReconfiguring Role Based Access Control policies using risk semantics.J. High Speed Networks153261-2732006Journal Articlesclosedjournals/jhsn/AzizFHS06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs290https://dblp.org/rec/journals/jhsn/AzizFHS06URL#5666638Vijay BhuseAjay Gupta 0001Anomaly intrusion detection in wireless sensor networks.J. High Speed Networks15133-512006Journal Articlesclosedjournals/jhsn/BhuseG06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs276https://dblp.org/rec/journals/jhsn/BhuseG06URL#5666639Girish V. Chowdhary 0002C. Siva Ram MurthyEfficient routing of sub-wavelength multicast sessions in WDM mesh networks.J. High Speed Networks154433-4542006Journal Articlesclosedjournals/jhsn/ChowdharyM06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs302https://dblp.org/rec/journals/jhsn/ChowdharyM06URL#5666640Simon N. FoleyBarry P. MulcahyThomas B. QuillinanMeabh O'ConnorJohn P. MorrisonSupporting heterogeneous middleware security policies in WebCom.J. High Speed Networks153301-3132006Journal Articlesclosedjournals/jhsn/FoleyMQOM06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs293https://dblp.org/rec/journals/jhsn/FoleyMQOM06URL#5666641Mário M. FreireHenrique J. A. da SilvaAssessment of blocking performance in WDM chordal ring networks.J. High Speed Networks154415-4322006Journal Articlesclosedjournals/jhsn/FreireS06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs301https://dblp.org/rec/journals/jhsn/FreireS06URL#5666642Alan GanekAnthony J. NadalinNataraj NagaratnamDinesh VermaAn autonomic approach for managing security and identity management policies in enterprises.J. High Speed Networks153291-3002006Journal Articlesclosedjournals/jhsn/GanekNNV06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs292https://dblp.org/rec/journals/jhsn/GanekNNV06URL#5666643Olga GelbartBhagirath NarahariRahul SimhaSPEE: A Secure Program Execution Environment tool using code integrity checking.J. High Speed Networks15121-322006Journal Articlesclosedjournals/jhsn/GelbartNS06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs275https://dblp.org/rec/journals/jhsn/GelbartNS06URL#5666644Hazem H. HamedEhab Al-ShaerOn autonomic optimization of firewall policy organization.J. High Speed Networks153209-2272006Journal Articlesclosedjournals/jhsn/HamedA06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs287https://dblp.org/rec/journals/jhsn/HamedA06URL#5666645Yih HuangDavid ArsenaultArun SoodSCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates.J. High Speed Networks1515-192006Journal Articlesclosedjournals/jhsn/HuangAS06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs274https://dblp.org/rec/journals/jhsn/HuangAS06URL#5666646Chin-Tser HuangMohamed G. GoudaE. N. ElnozahyConvergence of IPsec in presence of resets.J. High Speed Networks152173-1832006Journal Articlesclosedjournals/jhsn/HuangGE06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs285https://dblp.org/rec/journals/jhsn/HuangGE06URL#5666647Lan KongMaher AliJitender S. DeogunBuilding Redundant Multicast Trees for Preplanned Recovery in WDM optical networks.J. High Speed Networks154379-3982006Journal Articlesclosedjournals/jhsn/KongAD06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs299https://dblp.org/rec/journals/jhsn/KongAD06URL#5666648Romain LabordeFrançois BarrèreAbdelmalek BenzekriNetwork security policy refinement process: Expression and analysis.J. High Speed Networks153247-2602006Journal Articlesclosedjournals/jhsn/LabordeBB06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs289https://dblp.org/rec/journals/jhsn/LabordeBB06URL#5666649Chu-Chuan LeePao-Chi ChangIntegrated traffic modeling and frame skipping for pre-stored streaming videos over cellular networks.J. High Speed Networks154329-3402006Journal Articlesclosedjournals/jhsn/LeeC06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs296https://dblp.org/rec/journals/jhsn/LeeC06URL#5666650Haci A. MantarIbrahim T. OkumusJunseok HwangSteve J. ChapinA scalable intra-domain resource management architecture for DiffServ networks.J. High Speed Networks152185-2052006Journal Articlesclosedjournals/jhsn/MantarOHC06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs286https://dblp.org/rec/journals/jhsn/MantarOHC06URL#5666651Mohammed A. MoharrumRavi MukkamalaMohamed EltoweissyA novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks.J. High Speed Networks15173-922006Journal Articlesclosedjournals/jhsn/MoharrumME06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs278https://dblp.org/rec/journals/jhsn/MoharrumME06URL#5666652Yen Chieh OuyangChing-Wen YangWei Shi LianNeural networks based variable bit rate traffic prediction for traffic control using multiple leaky bucket.J. High Speed Networks152111-1222006Journal Articlesclosedjournals/jhsn/OuyangYL06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs281https://dblp.org/rec/journals/jhsn/OuyangYL06URL#5666653Mingsheng PengSarangapani JagannathanS. R. SubramanyaRate-based end-to-end congestion control of multimedia traffic in packet switched networks.J. High Speed Networks154357-3782006Journal Articlesclosedjournals/jhsn/PengJS06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs298https://dblp.org/rec/journals/jhsn/PengJS06URL#5666654B. Venkata RamanaB. S. Manoj 0001C. Siva Ram MurthyAR-TCP: A Loss-Aware Adaptive Rate based TCP for Ad hoc Wireless Networks.J. High Speed Networks15153-722006Journal Articlesclosedjournals/jhsn/RamanaMM06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs277https://dblp.org/rec/journals/jhsn/RamanaMM06URL#5666655Maria RizziBeniamino CastagnoloModelling and simulation of a large strictly nonblocking fault-tolerant network.J. High Speed Networks154341-3552006Journal Articlesclosedjournals/jhsn/RizziC06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs297https://dblp.org/rec/journals/jhsn/RizziC06URL#5666656Khaled Salah 0001K. El-BadawiThroughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks.J. High Speed Networks152157-1722006Journal Articlesclosedjournals/jhsn/SalahE06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs284https://dblp.org/rec/journals/jhsn/SalahE06URL#5666657Ravi S. SandhuXinwen ZhangKumar RanganathanMichael J. CovingtonClient-side access control enforcement using trusted computing and PEI models.J. High Speed Networks153229-2452006Journal Articlesclosedjournals/jhsn/SandhuZRC06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs288https://dblp.org/rec/journals/jhsn/SandhuZRC06URL#5666658Galia ShabtaiIsrael CidonMoshe SidiTwo priority buffered multistage interconnection networks.J. High Speed Networks152131-1552006Journal Articlesclosedjournals/jhsn/ShabtaiCS06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs283https://dblp.org/rec/journals/jhsn/ShabtaiCS06URL#5666659Suresh Subramaniam 0001Krishna M. SivalingamG. ManimaranSelected papers from Trusted Internet Workshop (TIW) 2004.J. High Speed Networks1511-32006Journal Articlesclosedjournals/jhsn/SubramaniamSM06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs280https://dblp.org/rec/journals/jhsn/SubramaniamSM06URL#5666660Lu'ay A. WahshehJim Alves-FossSpecifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems.J. High Speed Networks153315-3272006Journal Articlesclosedjournals/jhsn/WahshehA06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs294https://dblp.org/rec/journals/jhsn/WahshehA06URL#5666661Managing security policies: Modeling, verification and configuration.J. High Speed Networks153207-2082006Journal Articlesclosedjournals/jhsn/X06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs295https://dblp.org/rec/journals/jhsn/X06URL#5666662Yanyan YangCharles U. MartelZhi (Judy) FuShyhtsun Felix WuIPsec/VPN security policy correctness and assurance.J. High Speed Networks153275-2892006Journal Articlesclosedjournals/jhsn/YangMFW06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs291https://dblp.org/rec/journals/jhsn/YangMFW06URL#5666663Manel Guerrero ZapataKey management and delayed verification for Ad hoc networks.J. High Speed Networks15193-1092006Journal Articlesclosedjournals/jhsn/Zapata06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs279https://dblp.org/rec/journals/jhsn/Zapata06URL#5666664Baoxian ZhangHussein T. MouftahDestination-driven shortest path tree algorithms.J. High Speed Networks152123-1302006Journal Articlesclosedjournals/jhsn/ZhangM06http://content.iospress.com/articles/journal-of-high-speed-networks/jhs282https://dblp.org/rec/journals/jhsn/ZhangM06URL#5666665