The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communication Review
1984, volume: 14, number: 2

  1. Ian M. Leslie, Roger M. Needham, John W. Burren, Graham C. Adams
    The architecture of the universe network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:2-9 [Journal]
  2. Christopher S. Cooper
    Managed file distribution on the universe network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:10-17 [Journal]
  3. A. Gill Waters, Christopher J. Adams
    The satellite transmission protocol of the universe project. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:18-24 [Journal]
  4. John G. Fletcher
    Serial link protocol design: A critique of the X.25 standard, level 2. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:26-33 [Journal]
  5. Richard Chung
    A methodology for protocol design and specification based on an extended state transition model. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:34-41 [Journal]
  6. Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam
    An exercise in constructing multi-phase communication protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:42-49 [Journal]
  7. A. Gill Waters, Christopher J. Adams, Ian M. Leslie, Roger M. Needham
    The use of broadcast techniques on the universe network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:52-57 [Journal]
  8. Lorenzo Aguilar
    Datagram routing for internet multicasting. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:58-63 [Journal]
  9. David R. Cheriton, Willy Zwaenepoel
    One-to-many interprocess communication in the V-system. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:64- [Journal]
  10. Jean-Pierre Courtiat, Jean-Michel Ayache, B. Algayres
    Petri nets are good for protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:66-74 [Journal]
  11. Wolfgang Jürgensen, Son T. Vuong
    Formal specification and validation of ISO transport protocol components, using petri nets. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:75-82 [Journal]
  12. Heiko Krumm, Oswald Drobnik
    Interactive verification of communication software on the basis of CIL. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:92-99 [Journal]
  13. Ana R. Cavalli
    A method of automatic proof for the specification and verification of protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:100-106 [Journal]
  14. Vincenza Carchiolo, Alberto Faro, Giuseppe Scollo
    A temporal ordering specification of some session services. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:107-114 [Journal]
  15. Keith A. Lantz, William I. Nowicki, Marvin Theimer
    Factors affecting the performance of distributed applications. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:116-123 [Journal]
  16. C. Murray Woodside, J. R. Montealegre, Raymond J. A. Buhr
    A performance model for hardware/software issues in computer-aided design of protocol systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:132-139 [Journal]
  17. Jeffrey M. Jaffe, Adrian Segall
    Automatic update of replicated topology data bases. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:142-148 [Journal]
  18. Hasan Ural, Robert L. Probert
    Automated testing of protocol specifications and their implementations. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:149-155 [Journal]
  19. Jean-Pierre Ansart, Omar Rafiq, Richard Castanet, Pascal Guitton
    Some operational tools in a OSI protocols study environment. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:156-161 [Journal]
  20. Niels Nørup Pedersen, Robin Sharp
    Analysis of channel access schemes for high-speed LANs. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:164-171 [Journal]
  21. J.-P. Behr, Ulrich Killat
    Performance analysis of an access method suitable for the integration of voice and data. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:172-177 [Journal]
  22. Ignas G. Niemegeers, Chris A. Vissers
    Twentenet: A LAN with message priorities, design and performance considerations. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:178-185 [Journal]
  23. Radu Popescu-Zeletin
    Some critical considerations on the ISO/OSI RM from a network implementation point of view. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:188-194 [Journal]
  24. M. F. Dolan
    A minimal duplex connection capability in the top three layers of the OSI reference model. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:195-200 [Journal]
  25. Kurt Rothermel
    Communication primitives supporting the execution of atomic actions at remote sites. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:201-208 [Journal]
  26. Rami R. Razouk
    The derivation of performance expressions for communication protocols from timed petri net models. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:210-217 [Journal]
  27. Douglas B. Terry
    An analysis of naming conventions for distributed computer systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:218-224 [Journal]
  28. Alexander Thomasian, Paul F. Bay
    Analytic solution of an integrated performance model of a computer communication network with window flow control. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:225-232 [Journal]
  29. Panos Economopoulos, Mart L. Molle
    On the performance of slotted ALOHA in a spread spectrum environment. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:234-241 [Journal]
  30. D. P. Gerakoulis, Tarek N. Saadawi, Donald L. Schilling
    A class of tree algorithms with variable message length. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:242-247 [Journal]
  31. Stephen William Edge
    An adaptive timeout algorithm for retransmission across a packet switching network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:248-255 [Journal]
  32. Robert P. Blanc
    Protocol testing methdology development at NBS. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:258- [Journal]
  33. Eduard Cerny
    Some issues in protocol implementation testing. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:259-260 [Journal]
  34. E. Douglas Jensen
    Physically dispersing an operating system. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:261- [Journal]
  35. Marvin H. Solomon
    Multiprocessors and computer networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:262-263 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002