The SCEAS System
Navigation Menu

Journals in DBLP

Bell Labs Technical Journal
2004, volume: 9, number: 2

  1. Patricia F. Russo
    Letter from Chairman and CEO, Lucent Technologies. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:- [Journal]
  2. Michael K. Powell
    Letter from Chairman, Federal Communications Commission. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:- [Journal]
  3. William T. O'Shea, Jeffrey M. Jaffe
    Letter from President, Bell Labs, and President, Bell Labs Advanced Technologies. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:- [Journal]

  4. Dedication. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:- [Journal]
  5. Karl F. Rauscher
    Protecting communications infrastructure. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:1-4 [Journal]
  6. Krishna Balachandran, Kenneth C. Budka, Tewfik L. Doumi, Joseph H. Kang
    Third-generation wireless services for homeland security. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:5-21 [Journal]
  7. Michael D. Chambers, Douglas H. Riley
    Implementing wireless priority service for CDMA networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:23-36 [Journal]
  8. Bernard L. Malone III
    Wireless search and rescue: Concepts for improved capabilities. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:37-49 [Journal]
  9. Dheena D. Moongilan
    Distributed RF immunity hardening design approach for telecommunication hardware and installation sites. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:51-58 [Journal]
  10. Joseph F. Lennert, William Retzner, Monica G. Rodgers, Bernard G. Ruel, Srini Sundararajan, Paul D. Wolfson
    The automated backup solution - safeguarding the communications network infrastructure. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:59-84 [Journal]
  11. Anil Macwan
    Approach for identification and analysis of human vulnerabilities in protecting telecommunications infrastructure. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:85-89 [Journal]
  12. Walter E. Beyeler, Stephen H. Conrad, Thomas F. Corbet, Gerard P. O'Reilly, David D. Picklesimer
    Inter-infrastructure modeling - ports and telecommunications. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:91-105 [Journal]
  13. Ahmad M. Jrad, Thomas Morawski, Louise Spergel
    A model for quantifying business continuity preparedness risks for telecommunications networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:107-123 [Journal]
  14. Mark C. Baker, Charles A. Witschorik, Jonathan C. Tuch, Waverly Hagey-Espie, Veena B. Mendiratta
    Architectures and disaster recovery strategies for survivable telecommunications services. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:125-145 [Journal]
  15. Nick De Tura, Susan Marie Reilly, Srilatha Narasimhan, Zhenhua Jack Yin
    Disaster recovery preparedness through continuous process optimization. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:147-162 [Journal]
  16. Richard E. Krock
    Effective quality control during disaster recovery. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:163-171 [Journal]
  17. Donna M. Hlavacek, Karl A. Madsen, Robert M. Reimer
    A vendor and service provider partnership for preparing to manage disaster recovery. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:173-180 [Journal]
  18. Charles L. Goldey, Lisa M. Enaire, Donald Olson, Stacy L. Trottier
    Using remanufactured switching equipment to reduce restoration time in case of a disaster. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:181-188 [Journal]
  19. Chun K. Chan, Uma Chandrashekhar, Steven H. Richman, S. Rao Vasireddy
    The role of SLAs in reducing vulnerabilities and recovering from disasters. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:189-203 [Journal]

  20. Recent Lucent Technologies patents. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:2, pp:205-213 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002