The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communication Review
1987, volume: 17, number: 3

  1. M. Witt
    A comment on current source routing techniques. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1987, v:17, n:3, pp:4-6 [Journal]
  2. Kai Jakobs
    OSI addressing strategies. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1987, v:17, n:3, pp:7-12 [Journal]
  3. Alistair Cockburn
    Efficient implementation of the OSI protocol checksum algorithm using 8/16-bit arithmetic. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1987, v:17, n:3, pp:13-20 [Journal]
  4. S. Thomas
    Netbios for ISO networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1987, v:17, n:3, pp:21-29 [Journal]
  5. A. R. Prieto, J. G. Tomas
    A model to order the encryption algorithms according to their quality. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1987, v:17, n:3, pp:30-47 [Journal]
  6. G. P. Parr
    Address resolution for an intelligent filtering bridge running on a subnetted ethernet system. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1987, v:17, n:3, pp:48-70 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002