ebook img

Computer Communications 1995: Vol 18 Index PDF

7 Pages·1995·1.8 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computer Communications 1995: Vol 18 Index

computer communications Index to Volume 18 (1995) No 1 (January) pp 1-64 No 5 (May) pp 313-404 No 9 (September) pp 589-692 No 2 (February) pp 65-128 No 6 (June) pp 405-460 No 10 (October) pp 693-788 No 3 (March) pp 129-224 No 7 (July) pp 461-524 No 11 (November) pp 789-868 No 4 (April) pp 225-312 No 8 (August) pp 525-588 No 12 (December) pp 869-1012 Article index The leaky window: a flow and congestion Routing names and addresses in the control technique for international MHS Number 1 HS-WANs A. T. H. van der Voort C. K. Chirchir and A.E. Kamail 103 A. L. Boonstra and F. H.R. de Special Issue: 6th IEEE Workshop on Lo- Fault detection and diagnosis capabilities of Thouars 247 cal and Metropolitan Area Networks test sequence selection methods based Integrated transmission of packetized voice Guest Editors: W Lemppenau and on the FSM model and data on a unidirectional fibre optic R. Popescu-Zeletin, GUD FOKUS T. Ramalingham, A. Das and bus network Germany K. Thulasiraman 113 S. S. Alwakeel and M. Iiyas 252 Progress within UK firms towards inter Performance measurements on the Performance comparison of media access departmental data exchange in the open Heidelberg audio/video distribution protocols for Gbit/s networks in the local system context system: methodology and results area W. D. K. Macrosson and A. Cramer, R. Hofmann and T. Meuser 4 R.L. Wickramasinghe 123 N. Luttenberger 262 Estimating the quality of service of token Recovery approach to the design of passing MAC protocols stabilizing communication protocols R. M. Conti, E. Gregori and Number 3 K. Saleh, |. Ahmad, K. Al-Saqabi and A L.Lenzini 15 Agarwal 276 ATM virtual private network design Special Issue: Multimedia storage Fairness issues in the networking alternatives servers environment P. Crocetti, L. Fratta, G Gallassi Guest Editor: Professor T D C Little, Boston C. Douligeris and L.N. Kumar 288 M. Gerla and S. Fotedar 24 University, MA, USA Performance analysis of SDN-specific error Traffic pattern based mobile routing recovery procedure scheme Multimedia file systems survey: approaches D. Baum and L. Lenzini 300 R. Yuan 32 for continuous media disk scheduling Performance of shared-channel multihop R. Steinmetz 133 lightwave networks Supporting random access on real-time Number 5 M. Kovacevic, M. Gerla and retrieval of digital continuous media Buffer dimensioning for delay- and loss J. Bannister 37 J.C. L. Liu, D. H.C. Du and Cryptanalysis of a password authentication J.A.Schnepf 145 sensitive traffic K. P. Kontovassilis, J. T. Tsiligaridis and scheme using quadratic residues Local storage systems for continuous data G.!/. Stassinopoulos 315 C.-C. Chang, T.-C. Wu and with heterogeneous timing requirements On testing and diagnosis of communication C.-S.Laih 45 T. Pfeifer and A. Blobelt 160 protocols based on the FSM model On ‘Priority promotion DOQDB networks to Pipelining mechanism to minimize the T. Ramalingam, A. Das and improve fairness latency time in hierarchical multimedia |. Bosley, T. Kuchlein storage managers K. Thulasiraman 329 K. Pawlikowski and A. Stewart 48 S. Ghandeharizadeh, A. Dashti and C Delay analysis of DODB networks with siot Correction to ‘Throughput efficiency of an Shahbi 170 preuse and reuse A. R. Pach, S. Palazzo and enhanced link management procedure Allocation strategies of multimedia data on D.Panno 338 C. Ward and T.M. Phillips 50 disk arrays Flow control and routing algorithms in M.SeoandC. Kim 185 WAPSN Algorithms for designing multimedia R. C. Betini, H. Kameda and Number 2 servers H. M. Vin, A. Goyal and K. Shimizu 345 Model for flexible configuration of Hot-spot spanning tree algorithm for a P. Goyal 192 application-oriented communication Multimedia information caching for bridged LAN/MAN services N.-F. Huang, G.-K. Ma and personalized video-on-demand M. Feldhoffer 69 Y.-J.Wu 357 C. Papadimitriou, S. Ramanathan Share-based congestion control scheme for P Venkat Rangan and S Application of a cross decomposition systems of interconnected networks SampathKumar 204 algorithm to a location and allocation L. Orozco-Barbosa and probiem in distributed systems N. Hirzaila 79 C.Y.Lee 367 The BERKOM multimedia-mail teleservice Design of hierarchical communication Number 4 E. Moeller, S.M anandhar, networks under node/link failure L. Neumann, J. Rickert, Inside a trader in global trading constraints G. Schirmann and S. Thomas 89 K.-y. Poon 227 D. Saha and A. Mukherjee 378 0140-3664/95/$09.50 « 1995-Elsevier Science B.V. All rights reserved computer communications volume 18 number 12 december 1995 1007 Verifying the progress properties of a allocation over ATM: a neural network Number 11 heterogeneous protocol system in an approach internetworking environment W. M. Moh, M.-J. Chen, N.-M. Chu and C.- Special issue: Beyond intelligent systems Guest Editor: Dr P. Schoo, GMD D. Saha 384 D. Liao 563 FOKUS, Berlin, Germany Internal communications in a Bandwidth management for high speed multiprocessor ISDN PBX LANs using wavelength division C. Hirsch and L. Rojas 392 multiplexing Evolution of intelligent network concepts B.Li 572 A. Hansson 793 Market requirements and the functionality of intelligent networks Number 6 Number 9 A. Fricke 802 Special Issue: Electronic document Future (data) communication networks - the delivery Adaptive priority timer control of the SAE challenge to (public) service providers Guest Editor: Lillian Cuthbert, Infinity Soft- LTPB for fair prioritization in military K. Jakobs 807 ware, NY, USA avionics networks IN and beyond: two approaches to the T. Burrage and S. Ward 591 evolution of INs A model for document management Modelling network profiles R. Gutiérrez, J. Norgaard and H. Kilov and L. Cuthbert 408 J. Lambert and B. Stéphan 600 K.Randsted 816 Project ELVYN: implementing an electronic Improving the UlOv-method for protocol Software architecture for the future journal conformance testing information market J. Knight and C. McKnight 418 W.-H. Chen, C. Y. Tang and M. Chapman, H. Berndt and From paper to CD-ROM documentation S.T. Vuong 609 N. Gatti 825 C. Green 423 Scalable approaches to load sharing in the Service architectures and service creation Secure distribution of electronic documents presence of multicasting for integrated broadband in a hostile environment C. E. Wills andD . Finkel 620 communications A.D. Rubin 429 MS4 - a high performance output buffering S. Triglia, A. Mullery, The benefits of using electronic document ATM switch M. Campolargo and J. Hunt 838 software R. Y. Awdeh and H.T. Mouftah 631 Open distributed processing: an K.L.Wandryck 435 Secure and minimal protocols for architectural basis for information The TREAT laboratory: comparing an authenticated key distribution networks electronic commerce experiment at P. Janson and G. Tsudik 645 J.-B. Stefani 849 Curtin and Monash universities Group commitment protocol based on zero C. M. Parker and knowledge proofs P.M.C.Swatman 447 T.-C. Wu and T.-S.Wu 654 Number 12 Bandwidth allocation in wide-band Real-time applications in a CRMA network communication networks under two a performance analysis Number 7 types of priorities G. Anastasi, M. Conti, E.G regori and L C. Katsinis and A. Constant 657 image transmission on the DQDB network Link enhancement using constrained range Lenzini 871 S.-k. Kao and B. Mukherjee 463 and reduced candidate set searches: a Asynchronous reservation protocol for ObjeH.c t K.m oWdaenlg faorn dh yJp.e-rL.mCe diWau ap4p7l5i cations rR.e-vyi.s iLoni nandC. Yang 663 bvaarsieadb lel-ocsailz edn etmweosrks ages in a WOM- Traffic control at terminal equipment in ATM HTPNET: a high performance transport J.H. Lee andC.K.Un 880 networks using cryptographic techniques protocol ODA implementation for multimedia J.-S. Wu, F.-J. Kuo and T. S. Chang and !. Gorton 669 teleservices J.-F.Chang 486 Comments on ‘Analysis of 1-ROR networks’ R. Baier, E. Moeller and Analysis and representation of test cases A. De and N. Prithviraj 682 A. Scheller 889 generated from LOTOS Access protection solution for heavy load P. Tripathy and B. Sarikaya 493 unfairness in DODB Computational analysis of an optimal Number 10 L. N. Kumar and routing strategy in a hierarchical A.D. Bovopoulos 896 computer communication network Special Issue: System support for Construction of checking sequences based D. Saha and A. Mukherjee 507 multimedia computing on characterization sets Client/server approach versus distributed Guest Editor: Professor K. Jeffay, A. Rezaki and H. Ural 911 object-oriented computing on top of OSF University of North Carolina, NC, USA Formal language for security services base DCE modelling and analysis A. B. Schill and M. U. Mock 512 Membership protocols for distributed D. Tréek and B. J. Blazié 921 conference control Modular multicast ATM switching B. Rajagopalan 695 architecture Critical bandwidth allocation for the delivery J.-H. Liaw and C.-M.Weng 929 Number 8 of compressed video Remote scheme for password Special Issue: Bandwidth management on W.-c. Feng and S. Sechrest 709 authentication based on theory of high speed networks Continuous framing mechanism for quadratic residues Guest Editor: Professor N.-F. Huang, Na- congestion control in broadband C.-C. Chang, S.-M. Tsu and tional Tsing Hua University, Taiwan, ROC networks C.-Y.Chen 936 J.-H. Huang and P.-C. Tsao 718 Network access protocol for hard real-time Bandwidth allocation in fair distributed Models and performance of real-time disk communication systems queue (FDQ) networks access policies O. Ulusoy 943 M. Kabatepe and K.S. Vastola 527 J.C. Yee and P. Varaiya 725 Stability and throughput optimization of Call admission control and bandwidth Enforcing application-level QoS by frame- multichannel siotted non-persistent allocation in a multiservice DODB induced packet discarding in video CSMA protocol network communications |. E. Pountourakis, E. D. Sykas and E.N R. Bolla and F. Davoli 537 S. Ramanathan, P. Venkat Rangan, H. M Protonotarios 949 Bandwidth allocation for isochronous Vin and S.S.Kumar 742 Remote login authentication scheme based connections in DOQDB using the PA Routing and admission control algorithms on a geometric approach scheme for multimedia traffic T.-C Wu 959 S.-T. Tsai, T.-H. Lin and S. Rampal and D.S. Reeves 755 Formal description of distributed C. Qiao 545 Providing end-to-end performance multimedia systems: an assessment of The Paralie! D-Net guarantees using non-work-conserving potential techniques O. Sharon and A. Segall 552 disciplines H. Bowman, G. S. Blair, L. Blair and A. G. Traffic prediction and dynamic bandwidth H. Zhang 769 Chetwynd 964 1008 computer communications volume 18 number 12 december 1995 On the security of Wu and Yeh's conference Gorton, |. 669 Prithviraj,N. 682 key distribution system Goyal, A. 192 Protonotarios,E.N. 949 T. Hwang, N.-Y. Lee, C.-H. Wang and M.- Goyal, P. 192 Y.Ko 978 Green, C. 423 Qiao,C. 545 Performance of PRMA in a mobile radio Gregori,E. 15, 871 channel Gutiérrez,R. 816 Rajagopalan, B. 695 K. C. Chua, W. M. Tan and Ramalingam, T. 113 K.M.Lye 982 Hansson, A. 793 Ramanathan, S. 204 Replay tolerance of authentication protocols Hirsch, C. 392 Rampal,S. 755 K.-Y.Lam 988 Hirzalla,N. 79 Randsted, K. 816 ID-based non-interactive zero-knowledge Hofmann, R. 262 Reeves,D.S. 755 proof system based on one-out-of-two Huang, J.-H. 718 Rezaki,A. 911 non-interactive oblivious transfer Huang, N.-F. 357 Rojas,l. 392 Y.-H. Chen and T. Hwang 993 Hunt, J. 838 Rubin, A.D. 429 Hwang, T. 993, 978 Rickert, J. 89 llyas,M. 252 Saha,D. 378, 384 Author index Saleh, K. 276 Jakobs, K. 807 SampathKumar,S. 204 Ahmad,!. 276 Janson, P. 645 Sarikaya,B. 493 Agarwal, A. 276 Scheller,A. 889 Al-Saqabi, K. 276 Kabatepe,M. 527 Schill, A.B. 512 Alwakeel,S.S. 252 Kamal, A.E. 103 Schnepf,.J.A. 145 Anastasi,G. 871 Kameda, H. 345 Schirmann, G. 89 Awdeh, R. Y. 631 Kao, S.-k. 463 Sechrest,S. 709 Segall, A. 552 Katsinis,C. 657 Seo,M. 185 Baier.R. 889 Kilov, H. 408 Bannister, J. 37 Kim, C. 185 Shahbi, C 170 Baum, D. 300 Knight, J. 418 Sharon,O. 552 Berndt, H. 825 Ko, M.-Y. 978 Shimizu, K. 345 Stassinopoulos, G. | 315 Betini, R.C. 345 Kontovassilis, K. P Biair,G.S. 964 Kovacevic, M. 37 Stefani, J.-B. 849 Biair,L 964 Kuchiein, T. 48 Steinmetz, R. 133 Biazi¢é, B. J. 921 Kumar,l.N. 288 Stéphan, B. 600 Biobelt,A. 160 Kumar,S.S. 742 Stewart,A. 48 Bolla, R. 537 Kuo, F.-J. 486 Swatman,P.M.C. 447 Boonstra,A.L. 247 Sykas,E.D. 949 Bosley, !. 48 Laih,C.-S. 45 Bovopoulos, A.D. 896 Lam, K.-Y. 988 TTaann,g , W.C.M Y Bowman, H. 964 Lambert, J. 600 Thomas, S Burrage, T. 591 Lee,C.Y. 367 Lee, J.H. 880 Thulasiraman, K Campolargo,M. 838 Lee,N.-Y. 978 Tréek,D. 921 Triglia, S. 838 Chang,C.-C. 45, 936 Lenzini,L. 15, 300 871 Chang, J.-F. 486 Li,B. 572 Tripathy, P. 493 Tsai, S.-T. 545 Chang, T.S. 669 Liao,C.-D. 563 Chapman, M. 825 Liaw, J.-H. 929 TTssialoi,gPa.ri-dCi.s , 71J8.T . 315 Chen, C.-Y. 936 Lin, R.-y. 663 Chen, M.-J. 563 Lin, T.-H. 545 TTssuu,d ikS,.-GM.. 964356 Chen, W.-H. 609 Liu, J.C.L. 145 Chen, Y.-H. 993 Luttenberger,N. 262 Ulusoy,O. 943 Chetwynd, A.G. 964 Lye, K.M. 982 Un, C.K. 880 Chirchir, C.K. 103 Ural, H. 911 Chu, N.-M. 563 Ma, G.-K. 357 Chua, K.C. 982 Macrosson, W. D. K van der Voort, A. T. H 247 Constant, A. 657 Manandhar,S. 89 Varaiya,P. 725 Conti,R.M. 15, 871 McKnight, C Vastola,K.S. 527 Cramer,A. 262 Mock, M. U Venkat Rangan,P. 204 742 Crocetti,P. 24 Moeller, E Vin, H.M 192 742 Cuthbert,L. 408 Vuong, S.T. 609 Mouftah, H. T Das,A. 113, 329 Mukherjee, A Wandryck, K.L. 435 Dashti, A. 170 Mukherjee, B. 463 Wang, C.-H. 978 Davoli,F. 537 Mullery, A. 838 Wang, H.K. 475 De, A. 682 Ward,C. 50 de Thouars, F.R.H. 247 Neumann, Ll. 89 Ward, S. 591 Douligeris,C. 288 Norgaard, J. 816 Weng, C.-M. 929 Du,D.H.C. 145 Wickramasinghe, R. L 123 Orozco-Barbosa,L. 79 Feldhoffer,M. 69 Wu Feng, W.-c. 709 Pach, A.R. 338 Wu Finkel,D. 620 Palazzo,S. 338 Wu Fotedar,S. 24 Panno,D. 338 Fratta,L. 24 Papadimitriou, C. 204 Fricke, A. 802 Parker,C.M. 447 Pawlikowski, K. 48 Gallassi,G. 24 Pfeifer, T. 160 Gatti,N. 825 Phillips, T. M. 50 Gerla,M. 24, 37 Poon, K.-y. 227 Ghandeharizadeh,S. 170 Pountourakis,!.E. 949 Zhang, H computer communications volume 18 number 12 december 1995 Keyword index Checkpointing Disk scheduling Communicating finite state machine Multimedia file system, Continuous Abstract data types Communication protocol 276 media 133 Conformance testing, Dependence Client/server Disk scheduling algorithm graph 493 Distributed processing, Object Multimedia servers, Admission control Admission control algorithm orientation 227 algorithm 192 Multimedia servers, Disk scheduling OSF DCE, Distributed workflow 512 Distributed computing algorithm 192 Communicating finite state machine Communication services, Application- Application layer service Checkpointing, Communication oriented 69 Usability, Multimedia applications 807 protocol 276 Distributed multimedia systems Application-oriented Communication protocol Real-time constraints, Formal Distributed computing, Communication Checkpointing, Communicating finite description techniques 964 services 69 state machine 276 Distributed processing Asynchronous reservation protocol Protocol conformance testing, UlOv- Client/server, Object orientation 227 Optical communication, WOM method 609 Distributed systems networks 880 Communication services ISDN PBX, Multiprocessor ATM Distributed computing, Application- communication 392 Bandwidth allocation, Neural oriented 69 Load sharing, Multicasting 620 network 563 Computer communication Distributed workflow Traffic control, UPC 486 Network security, Authentication OSF DCE, Client/server 512 Virtual private networks, Congestion protocols 988 Document management control 24 Computer communication networks Customized document delivery 408 ATM switching Hierarchical design, Routing 507 Document application profiles Deflection-routing, Multistage in- Computer network systems Document processing model, Multimedia terconnection networks 631 Lagrangean relaxation, Benders teleservices 889 Authentication decomposition 367 Document processing model Cryptography, Security 45 Conference control Document application profiles Network security, Network Multimedia teleconferencing, Group Multimedia teleservices 889 protocols 645 communication 695 DQDB Authentication protocols Conference key distribution system Bandwidth allocation, Call admission Computer communication, Network Cross-product, ID-based 978 control 537 security 988 Conformance testing Metropolitan area networks Abstract data types, Dependence IEEE 802.6 338 Bandwidth allocation graph 493 PA scheme, Harmonic periods 545 ATM, Neural network 563 Congestion control Traffic control, Unfairness 896 Call admission control, DQDB 537 Broadband networks, Framing 718 High speed networks, Fair distributed Flow control, Traffic throughput 103 EDI queue 527 Interconnected networks, LAN-MAN Electronic information, TREAT 447 Priority control, Modelling 657 interconnectivity 79 Effective bandwidth Real-time applications, Quality of Virtual private networks, ATM 24 Fractional Brownian motion, Large service 871 Constrained range search deviations 600 Video-on-demand, MPEG 709 Candidate set search, Variable Electronic document delivery Bandwidth management dominance 663 Electronic journal, ELVYN 418 High speed LANs, Wavelength division Continuous media Security, Certificate design 429 multiplexing 572 Multimedia file system, Disk Software, Survey 435 Benders decomposition scheduling 133 Electronic information Computer network systems, Lagrangean Cross product EDI, TREAT 447 relaxation 367 Conference key distribution system Electronic journal Binding ID-based 978 Electronic document delivery Open distributed processing, information Zero knowledge proofs, Group ELVYN 418 networks 849 commitment protocol 654 Electronic mail BLAN Cryptographic protocols Message handling system, Routing 247 Bridges, Hot-spot 357 Oblivious transfer, User ELVYN Bridges authentication 993 Electronic document delivery, Electronic BLAN, Hot-spot 357 Cryptography journal 418 Broadband networks Authentication, Security 45 End-to-end performance Congestion control, Framing 718 CSMA Non-work-conserving disciplines Buffer dimensioning Protocols, Throughput Integrated services networks 769 Delay/loss-sensitive traffic, Loss optimization 949 Error control schemes requirements 315 Customized document delivery Go-Back-N, European Space Data Buffering scheme Document management 408 Network 300 Multimedia, Disk placement 145 European Space Data Network Error control schemes, Go-Back-N 300 Call admission control Deflection-routing Bandwidth allocation, DODB 537 ATM switching, Multistage Fair distributed queue Candidate set search interconnection networks 631 Bandwidth allocation, High speed Constrained range search, Variable Delay/loss-sensitive traffic networks 527 dominance 663 Buffer dimensioning, Loss Fairness Capability Set 1 requirements 315 Internetworking, Optimizing Intelligent network, Object Dependence graph scheme 288 orientation 816 Abstract data types, Conformance Prioritization, Performance control 591 Carrier sense multiple access testing 493 Fault detection Real-time communication systems Disk allocation Finite state machine, Checking Network access protocol 943 Multimedia data, Disk array 185 sequence 911 CD-ROM 423 Disk access Test sequence selection, FSM 113 Certificate design Multimedia, Real-time 725 Fault diagnosis Electronic document delivery, Disk array Test sequence selection, FSM mode! 329 Security 429 Multimedia data, Disk allocation 185 File systems Checking sequence Disk placement Storage systems, Intelligent peripheral Finite state machine, Fault detection 911 Multimedia, Buffering scheme 145 devices 160 1010 computer communications volume 18 number 12 december 1995 Finite state machine inter-departmental electronic data Multimedia storage Fault detection, Checking sequence 911 exchange Pipelining, Latency time 170 Fiow control Open systems 123 Multimedia teleconferencing Congestion control, Traffic internetworking : Conference control, Group throughput 103 Fairness, Optimizing scheme 288 communication 695 Routing, Performance evaluation 345 Gateways, Protocol mismatch 384 Multimedia teleservices Folded bus ISDN PBX Document application profiles, Document Passive bus, MAC protocols 552 Distributed systems, Multiprocessor processing model 889 Formal description techniques communication 392 Multimedia electronic mail, X.400 89 Distributed multimedia systems, Real- Multimedia terminals and systems time constraints 964 Lagrangean relaxation Video communications, Multimedia Fractional Brownian motion Computer network systems, Benders protocols 742 Effective bandwidth, Large decomposition 367 Multimedia traffic deviations 600 LAN—-MAN interconnectivity Admission control, Routing 755 Framing Congestion control, Interconnected Multiprocessor communication Broadband networks, Congestion networks 79 ISDN PBX, Distributed systems 392 control 718 Large deviations Multistage interconnection networks FSM Fractional Brownian motion, Effective ATM switching, Deflection-routing 631 Fault detection, Test sequence bandwidth 600 selection 113 Latency time FSM model Multimedia storage, Pipelining 170 Network access protocol Real-time communication systems Fault diagnosis, Test sequence Lightwave networks selection 329 Performance, TDMA 37 NetCwaorrrki er prsoetnoscoel s multiple access 943 Login request Gateways Remote password authentication Network security, Authentication 645 Internetworking, Protocol mismatch 384 Quadratic residues 936 Network security Gbit/s networks Load sharing Computer communication Authentication protocols 988 Performance, Media access protocols 4 Multicasting, Distributed systems Go-Back-N Loss requirements Network protocols, Authentication 645 Networks Error control schemes, European Space Buffer dimensioning, Delay/loss- Node/link failure, Hierarchical Data Network 300 sensitive traffic 315 design 378 Group commitment protocol Zero knowledge proofs, Cross MAC protocols Neural network Bandwidth allocation, ATM 563 product 654 Passive bus, Folded bus 552 Node/link failure Group communication Quality of service, Token passing Multimedia teleconferencing Market requirements Networks, Node/link failure 378 Conference control 695 Intelligent networks, Subscriber Non-work-conserving disciplines End-to-end performance, integrated needs 802 Harmonic periods Media access protocols services networks 769 Object orientation DQDB, PA scheme 545 Performance, Gbit/s networks Distributed processing, Client Hierarchical design Message handling system Computer communication networks Routing, Electronic mail 247 server 227 Routing 507 Metropolitan area networks intelligent network, Capability Networks, Node/link failure 378 DQDB, !EEE 8026 338 Set 1 816 Object-oriented High speed LANs Mobile computing Hypermedia, Petri net 475 Bandwidth management, Wavelength Wireless networking, Routing Oblivious transfer division multiplexing 572 Modelling High speed networks Bandwidth allocation, Priority Cryptographic protocols, User Bandwidth allocation, Fair distributed control 657 authentication 993 One-way function queue 527 Monitoring Remote login, Password Transport protocols, Transputers 669 Multimedia, Performance 262 authentication 959 Hot-spot MPEG Open distributed processing BLAN, Bridges 357 Video-on-demand, Bandwidth Information networks, Binding 849 Hypermedia allocation 709 Open systems Object-oriented, Petri net 475 Multicast Switch architecture, Packet inter-departmental electronic data exchange 123 ID-based switching 929 Open systems security Conference key distribution system Multicasting Cross-product 978 Load sharing, Distributed systems 620 Security services base, Security architectures 921 1EEE 802.6 Multimedia Optical communication Metropolitan area networks, DQDB 338 Buffering scheme, Disk placement 145 Information networks Performance, Monitoring 262 WDM networks, Asynchronous Open distributed processing, Real-time, Disk access 725 Optriemsiezrivnagt iosnc heprmoet ocol 880 Binding 849 Multimedia applications Fairness, internetworking 288 Integrated services networks Usability, Application layer OSF DEC End-to-end performance, Non-work- services 807 conserving disciplines 769 Multimedia data Client/server, Distributed workflow 512 Intelligent networks Disk array, Disk allocation 185 Capability Set 1, object Multimedia electronic mail PA scheme orientation 816 X.400, Multimedia teleservices 89 DQDB, Harmonic periods 545 Market requirements, Subscriber Multimedia file systems Packet switching needs 802 Continuous media, Disk scheduling 133 Switch architecture, Multicast 929 RACE, Service architectures 838 Multimedia information caching Passive bus Service interactions, Three stage Personalized video-on-demand 204 Folded bus, MAC protocols 552 method 793 Multimedia protocols Password authentication intelligent peripheral devices Multimedia terminals and systems Remote login, One-way function 959 Storage systems, File systems 160 Video communications 742 Performance Interconnected networks Multimedia servers Lightwave networks, TDMA 37 Congestion control, LAN—MAN inter- Admission control algorithm, Disk Media access protocols, Gbit/s connectivity 79 scheduling algorithm 192 networks 4 computer communications volume 18 number 12 december 1995 1011 Multimedia, Monitoring 262 Message handling system, Electronic Transport protocols Protocol, DQDB 463 mail 247 High-speed networks, Transputers 669 Protocol, Transmission 252 Multimedia traffic, Admission Transputers Performance control control 755 Transport protocols, High-speed Prioritization, Fairness 591 Wireless networking, Mobile networks 669 Performance evaluation computing 32 TREAT Flow control, Routing 345 Electronic information, EDI 447 Personalized video-on-demand Security Multimedia information caching 204 Cryptography, Authentication 45 UlOv-method Petri net Electronic document delivery, Certificate Communication protocol, Protocol Hypermedia, Object-oriented 475 design 429 conformance testing 609 Pipelining Security architectures Unfairness Multimedia storage, Latency time 170 Open systems security, Security services Traffic control, DODB 896 Performance, Transmission 252 base 921 UPC Prioritization Security services base Traffic control, ATM 486 Fairness, Performance control 591 Open systems security, Security Usability Priority control architectures 921 Multimedia applications, Application Bandwidth allocation, Modelling 657 Service architectures layer service 807 PRMA Intelligent networks, RACE 838 User authentication Protocol performance, Simulation 982 Service interactions Cryptographic protocols, Oblivious Protocol conformance testing intelligent networks, Three stage transfer 993 Communication protocol, UlOv- method 793 Variable dominance method 609 Simulation Candidate set search, Constrained range Protocol mismatch Protocol performance, PRMA 982 search 663 Internetworking, Gateways 284 Software Video communications Protocol performance Electronic document delivery, Multimedia terminals and systems, Simulation, PRMA 982 Survey 435 Multimedia protocols 742 Protocols Software architecture Video-on-demand CSMA, Throughput optimization 949 TINA-C, Standards 825 Bandwidth allocation, MPEG 709 DQDB, image transmission 463 Standards Virtual private networks TINA-C, Software architecture 825 ATM, Congestion control 24 Storage systems Quadratic residues File systems, Intelligent peripheral Wavelength division multiplexing Remote password authentication, Login devices 160 Bandwidth management, High speed request 936 Subscriber needs LANs 572 Quality of service Intelligent network, Market WDM networks Bandwidth allocation, Real-time requirements 802 Optical communication, Asynchronous applications 871 Survey reservation protocol 880 MAC protocols, Token passing 15 Electronic document delivery, Wireless networking Software 435 Mobile computing, Routing 32 Switch architecture RACE Packet switching, Multicast 929 x.400 Intelligent networks, Service Multimedia electronic mail, Multimedia architectures 838 Test sequence selection teleservices 89 Real-time Fault detection, FSM 113 Bandwidth allocation, Quality of Fault diagnosis, FSM model 329 Zero knowledge proofs service 871 Three stage method Group commitment protocol, Cross Multimedia, Disk access 725 Intelligent networks, Service product 654 Real-time communication systems interactions 793 Network access protocol, Carrier sense Throughput optimization multiple access 943 Protocols, CSMA 949 Book reviews Real-time constraints TINA-C Distributed multimedia systems, Formal Software architecture, Standards 825 54, 221, 521, 687 description techniques 964 Traffic control Remote login UPC, ATM 486 Password authentication, One-way Token passing Calendar function 959 Quality of service, MAC protocols 15 Remote password authentication Traffic control 63, 224, 400, 459, 523, 585, 690, 785, 865 Quadratic residues, Login request 936 Unfairness, DODB 896 1003 Routing Traffic throughput Computer communication networks, Congestion control, Flow contro! 103 Hierarchical design 507 Transmission Editorial Flow control, Performance Protoco!,DQDB 463 evaluation 345 Protocol, Performance 252 3, 66, 131, 407, 526, 791 1012 computer communications volume 18 number 12 december 1995

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.