default search action
Computer Networks, Volume 34
Volume 34, Number 1, July 2000
- Demetres D. Kouvatsos:
Performance Modelling and Evaluation of ATM Networks. 1-2 - A. Evangelatos, Th. Rapsomanikis, Nikolas Mitrou, George I. Stassinopoulos:
A burst-level traffic analysis tool. 3-22 - Abdulmohsen A. Alheraish, D. G. Smith:
Cell rate moderation of VBR video under an FEC environment in ATM networks. 23-35 - Christos Stathis, Basil S. Maglaris:
Modelling the self-similar behaviour of network traffic. 37-47 - Francesco Balestrieri, Pantelis L. Panteli, Vasillios Dionissopoulos, Trevor G. Clarkson:
ATM connection admission control using pRAM based artificial neural networks. 49-63 - John Soldatos, Evangelos Vayias, Nikolas Mitrou:
CAC and traffic shaping for performance control in ATM: the two-class paradigm. 65-83 - Monique Becker, André-Luc Beylot:
Performance comparison criteria for ATM switch models. 85-95 - Demetres D. Kouvatsos, Irfan-Ullah Awan, Rod J. Fretwell, George Dimakopoulos:
A cost-effective approximation for SRD traffic in arbitrary multi-buffered networks. 97-113 - Madhu D. K. Bhabuta, Peter G. Harrison:
Optimising bandwidth of ABR sources. 115-128 - Ilhem Lengliz, Farouk Kamoun:
A rate-based flow control method for ABR service in ATM networks. 129-138 - Milan Vojnovic, Nikola Rozic:
An evaluation of the ABR explicit-rate allocation interfering with the guaranteed services traffic. 139-155 - Jan Naudts:
Towards real-time measurement of traffic control parameters. 157-167 - Claudio Casetti, Renato Lo Cigno, Marco Mellia:
Load-balancing solutions for static routing schemes in ATM networks. 169-180 - Ádám Magi, Áron Szentesi, Balázs Szviatovszki:
Analysis of link cost functions for PNNI routing. 181-197 - Tien Van Do, Thong T. Nguyen, Hung Tuan Tran, Gábor Kalvach, Balázs Varga:
Topology optimization of an overlay ATM network in an SDH infrastructure. 199-210 - Dee Denteneer, Verus Pronk, J. M. Griffiths, Laurie G. Cuthbert:
Impact of the resource needed for renegotiating ATM rates. 211-225
Volume 34, Number 2, August 2000
- Sui Meng Poon, Jie Song, Bu-Sung Lee, Chai Kiat Yeo:
Performance of buffer-based request-reply scheme for VoD streams over IP networks. 229-240 - Ren-Hung Hwang, James F. Kurose, Donald F. Towsley:
MDP routing for multi-rate loss networks. 241-261 - Fabrice Guillemin, Olivier Dugeon, Jacqueline Boyer, Christophe Mangin:
Lightweight signaling in ATM networks for high quality transfer of Internet traffic. 263-278 - Shaowen Song:
A credit-based flow control algorithm for broadband access networks. 279-295 - Mahmoud Saleh, Mohammed Atiquzzaman:
Analysis of shared buffer switches under non-uniform traffic pattern and global flow control. 297-315 - Peter Herrmann, Heiko Krumm:
A framework for modeling transfer protocols. 317-337
Volume 34, Number 3, September 2000
- Antonios F. Atlasis, Nikolaos H. Loukas, Athanasios V. Vasilakos:
The use of learning algorithms in ATM networks call admission control problem: a methodology. 341-353 - Mohammad Abdulrahman Al-Fawzan, Fahad Hoymany:
Placement of network servers in a wide-area network. 355-361 - Shatha K. Habra, Ahmed E. Kamal:
An MCR-weighted protocol for multipoint-to-point communication over ABR service. 363-378 - Michael Montgomery, Gustavo de Veciana:
Hierarchical source routing using implied costs. 379-397 - Robert Haas, Patrick Droz, Daniel Bauer:
PNNI Augmented Routing (PAR) and Proxy-PAR. 399-418 - Wei Kuang Lai, Mu-Rung Shiu:
Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes. 419-437 - Keith Mainwaring:
A role for ATM in telephony and IP networks. 439-454 - Larry Hughes, Omid Banyasad, Evan J. Hughes:
Cartesian routing. 455-466 - Yue-Shan Chang, Shyan-Ming Yuan, Winston Lo:
A new multi-search engine for querying data through an Internet search service on CORBA. 467-480 - Yiwei Thomas Hou, Bo Li, Shivendra S. Panwar, Henry H.-Y. Tzeng:
On network bandwidth allocation policies and feedback control algorithms for packet networks. 481-501 - Eerke A. Boiten, Howard Bowman, John Derrick, Peter F. Linington, Maarten Steen:
Viewpoint consistency in ODP. 503-537
Volume 34, Number 4, October 2000
- Deborah A. Frincke, Ming-Yuh Huang:
Recent advances in intrusion detection systems. 541-545 - Eugene H. Spafford, Diego Zamboni:
Intrusion detection using autonomous agents. 547-570 - Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz:
A data mining analysis of RTID alarms. 571-577 - Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:
The 1999 DARPA off-line intrusion detection evaluation. 579-595 - Richard Lippmann, Robert K. Cunningham:
Improving intrusion detection performance using keyword selection and neural networks. 597-603 - Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:
Intrusion detection inter-component adaptive negotiation. 605-621 - Emilie Lundin, Erland Jonsson:
Anomaly-based intrusion detection: privacy concerns and other problems. 623-640 - Peter Mell, Donald G. Marks, Mark McLarnon:
A denial-of-service resistant intrusion detection architecture. 641-658 - Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto:
Towards trapping wily intruders in the large. 659-670 - Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery:
Intrusion-detection for incident-response, using a military battlefield-intelligence process. 671-697
Volume 34, Number 5, November 2000
- Luigi Logrippo, John Visser:
Future wireless networks. 701-703 - Harald Schmidts, John Visser:
Framework for IMT-2000 networks. 705-715 - Jean Claude Samou, Drissa Houatra, Philippe Godlewski, Elie Najm:
IMT-2000 wireless terminal mobility over object-oriented distributed platforms. 717-743 - Alfio Lombardo, Ferdinando Lucidi, Marina Samarotto, Sebastiano Trigila:
Personal mobility aspects in service architectures: extensions to TINA. 745-762 - Brahim Ghribi, Luigi Logrippo:
Understanding GPRS: the GSM packet radio service. 763-779 - Fawzi Daoud:
Hybrid satellite/terrestrial networks integration. 781-797 - Giulio Maggiore, Giulio Brusasco, Marco Vecchiato:
Network integration testing: concepts, test specifications and tools for automatic telecommunication services verification. 799-819
Volume 34, Number 6, December 2000
- Claudio Allocchio:
Guest editorial. 821-822 - Claudia Raibulet, Claudio Demartini:
Mobile agent technology for the management of distributed systems - a case study. 823-830 - Torsten Bissel, Manfred Bogen, Christian Bonkowski, Volker Hadamschek:
Service level management with agent technology. 831-841 - Peter Ørbæk:
An experimental system for distributed classroom education. 843-850 - Pierluigi Bonetti, Stefano Ravaioli, Simone Piergallini:
The Italian academic community's electronic voting system. 851-860 - Gregory Karvounarakis, Sarantos Kapidakis:
Submission and repository management of digital libraries, using WWW. 861-872 - Luca Deri, Stefano Suin:
Practical network security: experiences with ntop. 873-880 - Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi:
Security issues in control, management and routing protocols. 881-894 - Ferdinand Hommes, Eva Pless, Lothar Zier:
Did MPOA achieve its objective? 895-904 - Tiziana Ferrari:
End-to-end performance analysis with traffic aggregation. 905-914 - Volker Sander, Ian T. Foster, Alain J. Roy, Linda Winkler:
A differentiated services implementation for high-performance TCP flows. 915-929 - Thomas Boudier, David M. Shotton:
VIDOS, a system for video editing and format conversion over the Internet. 931-944 - Pantelis Balaouras, Ioannis Stavrakakis, Lazaros F. Merakos:
Potential and limitations of a teleteaching environment based on H.323 audio-visual communication systems. 945-958 - Gertraud Hoffmann:
G-WiN - the Gbit/s infrastructure for the German scientific community. 959-964 - Stanislav Milanovic, Alessandro Maglianella:
ATM over ADSL probe in Telecom Italia environment. 965-980
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.