Volume 23,
Number 1,
January 2000
- Sherali Zeadally:
Impact of ATM switch architectures on CBR video performance.
1-12
- Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa:
Delta-Causality and -delivery for wide-area group communications.
13-21
- Gee-Swee Poo, J. Tang:
Measuring the performance of OrbixTalk: a reliable multicast messaging system.
22-31
- Rong-Hong Jan, Kuo-Ruey Wu:
A cell-numbering plan for seamless handoff in a wireless ATM network.
32-38
- Ali Elkateeb, Mohammed Elbeshti:
A study using a RISC core for ATM network interfaces design.
39-44
- Yen-Jen Chen, Suh-Yin Lee:
Bounded tag fair queueing for broadband packet switching networks.
45-61
- Girish Chiruvolu, Ravi Sankar, Nagarajan Ranganathan:
VBR video traffic management using a predictor-based architecture.
62-70
- Y. H. Long, T. K. Ho, A. B. Rad:
Fair flow control of ABR service by per-VC virtual queuing.
71-83
- Chin Ching Chiu, Yi-Shiung Yeh, Ruey-Shun Chen:
Reduction of the total execution time to achieve the optimal k-node reliability of distributed computing systems using a novel heuristic algorithm.
84-91
Book Reviews
- Paul Ashley:
Electronic Commerce and Business Communications; Michael Chesher, Rukesh Kaura (Eds.).
92-93
- Nimmagadda Chalamaiah:
Data warehousing and data mining for telecommunication, R. Mattison, Artech.
92
- Nimmagadda Chalamaiah:
Elements of network protocol design, M.G. Gouda, Wiley.
92
Volume 23,
Number 2,
January 2000
- Hiroshi Fujinoki, Kenneth J. Christensen:
A routing algorithm for dynamic multicast trees with end-to-end path length control.
101-114
- Cheng-Ming Weng, Pei-Wei Huang:
Modified group method for mobility management.
115-122
- Tho Le-Ngoc, Sushila N. Subramanian:
A Pareto-modulated Poisson process (PMPP) model for long-range dependent traffic.
123-132
- Liren Zhang, Huirong Fu:
A novel scheme of transporting pre-stored MPEG video to support video-on-demand (VoD) services.
133-148
- Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goyal, Mukul Goyal:
General weighted fairness and its support in explicit rate switch algorithms.
149-161
- Jung-Shian Li:
Measurement and in-service monitoring for QoS violations and spare capacity estimations in ATM network.
162-170
- Li Layuan, Li Chunlin:
A routing protocol for dynamic and large computer networks with clustering topology.
171-176
- Chung-Ming Huang, Jenq-Muh Hsu:
PPP (P3): an Estelle-based probabilistic partial protocol verification system.
177-192
Volume 23,
Number 3,
February 2000
- Interactive Distributed Multimedia Systems and Telecommunication Services.
197-198
- J. Robert Ensor, Gianpaolo U. Carraro, John T. Edmark:
Accommodating performance limitations in distributed virtual reality systems.
199-204
- Edward Y. Chang:
Maximizing QoS for interactive DTV clients.
205-218
- Tone Ingvaldsen, Espen Klovning, Miles Wilkins:
Determining the causes of end-to-end delay in CSCW applications.
219-232
- Werner Geyer, Rüdiger Weis:
The design and the security concept of a collaborative whiteboard.
233-241
- Th. Markousis, D. Tsirikos, Michalis Vazirgiannis, Yannis Stavrakas:
WWW-enabled delivery of interactive multimedia documents.
242-252
- Alberto García-Martínez, Jesús Fernández-Conde, Ángel Viña:
Efficient memory management in video on demand servers.
253-266
- Thomas Plagemann, Vera Goebel, Pål Halvorsen, Otto J. Anshus:
Operating system support for multimedia systems.
267-289
- Martin Karsten, Jens Schmitt, Burkhard Stiller, Lars C. Wolf:
Charging for packet-switched network communication - motivation and overview.
290-302
Volume 23,
Number 4,
February 2000
- Vittorio Trecordi, Giacomo Verticale:
Per-flow delay performance in a FIFO scheduler fed by policed UDP sources.
309-316
- Samuel Pierre, Ronald Beaubrun:
Integrating routing and survivability in fault-tolerant computer network design.
317-327
- V. D. Loi:
Voice and data integration in ATM-based LANs.
328-332
- Yoon-Hwa Choi, Pong-Gyou Lee:
A scalable and reconfigurable priority queue architecture for ATM switches.
333-340
- Francesca Cuomo, Marco Listanti:
Performance analysis of a prototypal multimedia service in an intelligent broadband network.
341-361
- Gang Feng, Tak-Shing Peter Yum:
Bifurcated-M routing for multi-point videoconferencing.
362-370
- Heejune Ahn, Jae-kyoon Kim:
Shifting-level process as a LRD video traffic model and related queuing results.
371-378
- Kaan Bür, Cem Ersoy:
A virtual path routing algorithm for ATM networks based on the equivalent bandwidth concept.
379-394
- N. Swaminathan, S. V. Raghavan:
DIDA: a Distributed, Dynamic and Adaptive VP bandwidth management scheme for ATM networks.
395-402
- Michael S. Borella:
Source models of network game traffic.
403-410
- Jesse S. Jin, Ruth Kurniawati:
Design and analysis of distributed object collection for web indexing.
411-417
- Francis Chi-Moon Lau, Guihai Chen, Hao Huang, Li Xie:
A distance-vector routing protocol for networks with unidirectional links.
418-424
- Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
Date attachable electronic cash.
425-428
Book Review
- Rolf Oppliger:
Instrusion Detection; Network Security Beyond the Firewall: T. Escamilla.
429-
- Chi-Hyuck Jun:
Teletraffic - Theory and Applications: H. Akimaru, K. Kawashima.
430-
Volume 23,
Number 5-6,
March 2000
- Amitava Mukherjee, Debashis Saha, Sajal K. Das, Somprakash Bandyopadhyay:
Recent advances in mobile communication networks.
439-440
- András Gergely Valkó, Andrew T. Campbell:
An efficiency limit of cellular mobile systems.
441-451
- Yongbing Zhang, Sajal K. Das:
An efficient load-balancing algorithm based on a two-threshold cell selection scheme in mobile cellular networks.
452-461
- John G. Markoulidakis, J. E. Dermitzakis, George L. Lyberopoulos, Michael E. Theologou:
Optimal system capacity in handover prioritised schemes in cellular mobile telecommunication systems.
462-475
- Phone Lin, Jason Yi-Bing Lin:
Channel assignment for GSM half-rate and full-rate traffic.
476-482
- Kok Yong Lim, Mohan Kumar, Sajal K. Das:
Message ring-based channel reallocation for cellular wireless networks.
483-498
- Liren Zhang, Xun Cheng, K. R. Subramanian:
The admission control for integrated video-conferencing/voice/data services in broadband CDMA networks.
499-510
- Kuang-Hung Pan, Hsiao-Kuang Wu, Rung-Ji Shang, Feipei Lai:
Performance analysis of broadcast in mobile ad hoc networks with synchronized and non-synchronized reception.
511-524
- Steven Lombardi, Weihua Zhuang:
Soft handoff in a CDMA wireless ATM environment.
525-532
- Alexandros Kaloxylos, Evangelos Zervas, Lazaros F. Merakos:
Location management in wireless ATM customer premises networks.
533-549
- Bong-sue Suh, Jin-seek Choi, Jae-kyoon Kim:
Design and performance analysis of hierarchical location management strategies for wireless mobile communication systems.
550-560
- Govind Krishnamurthi, Stefano Chessa, Arun K. Somani:
Fast recovery from database/link failures in mobile networks.
561-574
- Colin Boyd, Anish Mathuria:
Key establishment protocols for secure mobile communications: a critical survey.
575-587
- Aura Ganz, Se Hyun Park, Zvi Ganz:
Security broker for multimedia wireless LANs.
588-594
- R. Radhakrishna Pillai, Maitreya Rangnath, Rahul Agrawal, Weiguo Wang:
Distributed control of wireless ATM networks using CORBA.
595-604
Volume 23,
Number 7,
March 2000
Book Review
- A. Wong:
Intelligent Software Agents: W. Brenner, R. Zarnekow, H. Wittig.
695-696
- W. Frohberg:
Remote Access Networks and Services: Oliver C. Ibe (Ed.).
695-
- Hartmut Weik:
Networked Futures: W. S. Whyte.
696-
- Runtao Qu:
Charging Communication Networks: D.J. Songhurst.
696-697
- A. Wong:
Mobile Processing in Distributed and Open Environments: P. Sapaty.
696-
Volume 23,
Number 8,
April 2000
- Thomas Magedanz, Ahmed Karmouch:
Mobile Software Agents for Telecommunication Applications.
705-707
- Antonio Puliafito, Orazio Tomarchio:
Using mobile agents to implement flexible network management strategies.
708-719
- Damianos Gavalas, Dominic P. A. Greenwood, Mohammed Ghanbari, Mike O'Mahony:
Advanced network monitoring applications based on mobile/intelligent agent technology.
720-730
- Fotis G. Chatzipapadopoulos, Giovanna De Zen, Thomas Magedanz, Iakovos S. Venieris, Fabrizio Zizza:
Harmonised Internet and PSTN service provisioning.
731-739
- Jinrong Tang, Tony White, Bernard Pagurek, Roch H. Glitho:
Advanced service architecture for H.323 Internet Protocol Telephony.
740-753
- Peyman Farjami, Carmelita Görg, Frank Bell:
Advanced service provisioning based on mobile agents.
754-760
- Nobuo Kawaguchi, Katsuhiko Toyama, Yasuyoshi Inagaki:
MAGNET: ad hoc network system based on mobile agents.
761-768
- Luís Moura Silva, Guilherme Soares, Paulo Martins, Victor Batista, Luís Santos:
Comparing the performance of mobile agent systems: a study of benchmarking.
769-778
Volume 23,
Number 9,
April 2000
Book Review
- Xinjie Chang:
Queueing Networks - Customers, Signals and Product Form Solutions, : X. Chao, M. Miyazawa, M. Pinedo.
871-872
- Hartmut Weik:
Understanding Modern Telecommunications and the Information Superhighway: J.G. Nellist, E.M. Gilbert.
871-
Volume 23,
Number 10,
May 2000
- Zhenyu Tang, Jose Joaquin Garcia-Luna-Aceves:
Hop reservation multiple access for multichannel packet radio networks.
877-886
- Brian Willard, Ophir Frieder:
Autonomous garbage collection: resolving memory leaks in long-running server applications.
887-900
- Kia Makki, J. Broussard, Niki Pissinou:
On optical communications networks and wideband network architecture.
901-911
- Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
A methodology to optimize the design of telecommunication systems.
912-921
- Sohail Sheikh, Suk-Chung Yoon, Ahmed Saeed, E. K. Park:
Multicast routing infrastructure in ATM networks.
922-927
- Michael D. Santos, P. M. Melliar-Smith, Louise E. Moser:
Flow control in the high-speed Thunder and Lightning ATM network.
928-935
- Niki Pissinou, Catalin Dunu, Kia Makki:
A new framework for handling mobile clients in a client-server database system.
936-941
- Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga:
An adaptive approach to manage traffic in CDMA ATM networks.
942-949
- Guohong Cao, Mukesh Singhal:
Efficient distributed channel allocation for cellular networks.
950-961
- Gamze Seckin, Forouzan Golshani:
Real-time transmission of multilayer video over ATM networks.
962-974
- Sam Makki:
Tracking highly mobile users using replicated databases.
975-979
- Baruch Awerbuch, Yi Du, Yuval Shavitt:
The effect of network hierarchy structure on performance of ATM PNNI hierarchical routing.
980-986
- Rodrigo Garcés, Jose Joaquin Garcia-Luna-Aceves, Raphael Rom:
An access etiquette for very-wide wireless bands.
987-997
- W. Melody Moh, Dongming Yao, Kia Makki:
Analyzing the hidden-terminal effects and multimedia support for wireless LAN.
998-1013
Volume 23,
Number 11,
June 2000
- Paul Müller, Bernd Reuther, M. Schneider:
ViAA - a virtual ATM API for arbitrary layer 2 access networks.
1019-1026
- Yong Lee, HyunSook Kim, JooSeok Song:
IN service provision using VLR in IMT-2000 network.
1027-1033
- Andrea Baiocchi, Nicola Blefari-Melazzi, Marco Listanti:
Throughput-complexity trade-off for ABR traffic in an ATM satellite network under cell loss constraints.
1034-1046
- Xinkai Wang, Robert H. Deng, Feng Bao:
Multicast Internet protocol.
1047-1054
- Siew Kei Lam, Thambipillai Srikanthan:
Dynamic multicast routing in VLSI.
1055-1063
- Young-Cheol Bang, Sridhar Radhakrishnan, Nageswara S. V. Rao, Stephen Gordon Batsell:
On update algorithms for quickest paths.
1064-1068
- D. C. Lee, Sangjo Park, Young Joon Song:
Performance analysis of queueing strategies for multiple priority calls in multiservice personal communications services.
1069-1083
Volume 23,
Number 12,
July 2000
- Richard Lai:
Editorial.
1087-1088
- Guy Leduc, François Germeau:
Verification of security protocols using LOTOS-method and application.
1089-1103
- Jean-Pierre Courtiat, C. A. S. Santos, Christophe Lohr, B. Outtaj:
Experience with RT-LOTOS, a temporal extension of the LOTOS formal description technique.
1104-1123
- Maria Törö, Jinsong Zhu, Victor C. M. Leung:
Design of universal personal computing using SDL.
1124-1134
- Daniel Amyot, Luigi Logrippo:
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system.
1135-1157
- Stefan Fischer, Jacek Wytrebowicz, Stanislaw Budkowski:
Tool support for hardware/software co-design of communication protocols.
1158-1168
- J. Jenny Li, Joseph Robert Horgan:
Applying formal description techniques to software architectural design.
1169-1178
- Hartmut König, Peter Langendörfer, Heiko Krumm:
Improving the efficiency of automated protocol implementations using a configurable FDT compiler.
1179-1195
- Mariusz A. Fecko, M. Ümit Uyar, Paul D. Amer, Adarshpal S. Sethi, Theodore Dzik, R. Menell, Michael McMahon:
A success story of formal description techniques: Estelle specification and test generation for MIL-STD 188-220.
1196-1213
Volume 23,
Number 13,
July 2000
- H.-K. Tan, R. Radhakrishna Pillai, Chen-Khong Tham, Lawrence W. C. Wong, Jit Biswas:
Impact of ATM cell delay on multimedia applications.
1215-1222
- C. Vijayanand, M. Shiva Kumar, K. R. Venugopal, P. Sreenivasa Kumar:
Converter placement in all-optical networks using genetic algorithms.
1223-1234
- Yihong Long, T. K. Ho, A. B. Rad:
Weighted fairness with MCR guarantee and a general-purpose explicit rate allocation algorithm for ATM ABR service.
1235-1251
- Gianluca Cena, Adriano Valenzano:
Delay analysis of priority promotion systems.
1252-1262
- Panagiotis Demestichas, N. Georgantas, Evangelia Tzifa, Vasiliki Demesticha, Maria Striki, M. Kilanioti, Michael E. Theologou:
Computationally efficient algorithms for location area planning in future cellular systems.
1263-1280
- Jun-Yao Wang, Wen-Shyang Hwang, Wen-Fong Wang, Ce-Kuen Shieh:
Performance evaluation of multiple-channel slotted ring networks with tunable transmitters and fixed receivers.
1281-1291
- Aaron Striegel, Govindarasu Manimaran:
Best-effort scheduling of (m, k)-firm real-time streams in multihop networks.
1292-1300
- Ruay Shiung Chang, P.-C. Chiou:
Reducing database sizes in implicit deregistration for personal communication networks.
1301-1306
- Ruay Shiung Chang, Kung-Joi Pai, Chin-Ling Chen:
Design of a multiple leaky buckets shaper.
1307-1318
Book Reviews
- Youssef Iraqi:
Mobile Radio Networks: Networking and Protocols: B. Walke.
1319-
- S. Selvakennedy:
Enterprise Networks and Telephony: S. Ghernaouti-Helie and A. Dufour.
1319-1320
- G. Shen:
Photonic Devices for Telecommunications: G. Guekos.
1320-
Volume 23,
Number 14-15,
August 2000
- G. Lu:
Support for multimedia communications over the Internet.
1321-1322
- G. Lu:
Issues and technologies for supporting multimedia communications over the Internet.
1323-1335
- Mohammad F. Alam, Mohammed Atiquzzaman, Mohammad A. Karim:
Traffic shaping for MPEG video transmission over the next generation internet.
1336-1348
- Na Li, Marissa Borrego, San-qi Li:
A rate regulating traffic conditioner for supporting TCP over Diffserv.
1349-1362
- Claudio Casetti, James F. Kurose, Donald F. Towsley:
An adaptive algorithm for measurement-based admission control in integrated services packet networks.
1363-1376
- Tao Wu, Edward W. Knightly:
Enforceable and efficient service provisioning.
1377-1388
- Pi-Chung Wang, Chia-Tai Chan, Yaw-Chung Chen:
An intelligent buffer management approach for GFR services in IP/ATM internetworks.
1389-1399
- Peifang Zhou, Oliver W. W. Yang:
Design and analysis of per-flow queueing switches and VC-merge switches based on per-VC queueing architecture.
1400-1409
- Liren Zhang, Huirong Fu:
Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks.
1410-1424
- Doan B. Hoang, Xiaomei Yu, David Dagan Feng:
Fair intelligent bandwidth allocation for rate-adaptive video traffic.
1425-1436
- Kazumasa Oida, Masatoshi Sekido:
ARS: an efficient agent-based routing system for QoS guarantees.
1437-1447
- Yasser Rasheed, Alberto Leon-Garcia:
Towards a generic real-time transport and adaptation protocol for IP networks.
1448-1458
- Naoki Wakamiya, Masayuki Murata, Hideo Miyahara:
On video coding algorithms with application level QoS guarantees.
1459-1469
- Kevin Q. Brown:
The RTCP gateway: scaling real-time control bandwidth for wireless networks.
1470-1483
- Jana Dospisil, Elizabeth A. Kendall:
Multimedia authoring framework with ILOGTM solver.
1484-1497
Volume 23,
Number 16,
September 2000
- Chin-Ling Chen, Ruay Shiung Chang:
A new dynamic bandwidth allocation scheme for MPEG videos in ATM networks.
1505-1513
- Ahmed El-Sayed Kamal, Abdulazeez S. Boujarwah, Jehad Al-Dallal:
Virtual time scheduling in HFC networks with support for priority implementation.
1514-1523
- Karim Djemame, Mourad Kara, R. S. Banwait:
An agent based congestion control and notification scheme for TCP over ABR.
1524-1536
- Jin-Ru Chen, Yaw-Chung Chen, Chun-Liang Lee:
An end-to-end flow control approach based on round trip time.
1537-1547
- He Jianhua, K. R. Subramanian, Dong Donghua, W. Wei:
Novel methods for the performance analysis of adaptive hybrid selective repeat ARQ.
1548-1557
- A. King, R. Hunt:
Protocols and architecture for managing TCP/IP network infrastructures.
1558-1572
Book Review
- T.-H. Lin:
High Speed Digital Transmission Networking: G. Held.
1573-
Volume 23,
Number 17,
November 2000
- Madjid Merabti, Qi Shi, Rolf Oppliger:
Advanced security techniques for network protection.
1581-1583
- Along Lin, R. Brown:
The application of security policy to role-based access control and the common data security architecture.
1584-1593
- Stephane Doyon, Mourad Debbabi:
On object initialization in the Java bytecode.
1594-1605
- Jianying Zhou:
Further analysis of the Internet key exchange protocol.
1606-1612
- Paul Ashley, Mark Vandenwauver, Frank Siebenlist:
Applying authorization to intranets: architectures, issues and APIs.
1613-1620
- Ross J. Anderson, Jong-Hyeon Lee:
Jikzi - a new framework for security policy, trusted publishing and electronic commerce.
1621-1626
- N. Asokan, Philip Ginzboorg:
Key agreement in ad hoc networks.
1627-1637
- Seong-Min Hong, Seungwon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon:
On the construction of a powerful distributed authentication server without additional key management.
1638-1644
- Maria Felicia Florio, Roberto Gorrieri, Gianluigi Marchetti:
Coping with denial of service due to malicious Java applets.
1645-1654
- Pascal Urien:
Internet card, a smart card as a true Internet node.
1655-1666
- Wayne A. Jansen:
Countermeasures for mobile agent security.
1667-1676
- Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
Randomization enhanced Chaum's blind signature scheme.
1677-1680
- Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal:
Scalable secure one-to-many group communication using dual encryption.
1681-1701
- Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Modeling requests among cooperating intrusion detection systems.
1702-1715
- Denis Trcek:
Security policy conceptual modeling and formalization for networked information systems.
1716-1723
Volume 23,
Number 18,
December 2000
Book Reviews
Copyright © Mon Mar 15 00:55:31 2010
by Michael Ley (ley@uni-trier.de)