|
Journals in DBLP
- Bradley R. Smith, J. J. Garcia-Luna-Aceves
Efficient security mechanisms for the border gateway routing protocol. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:203-210 [Journal]
- Dionisis X. Adamopoulos, George Haramis, Constantine A. Papandreou
Rapid prototyping of new telecommunications services: a procedural approach. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:211-219 [Journal]
- Juha Heinanen, Kalevi Kilkki
A fair buffer allocation scheme. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:220-226 [Journal]
- Lewis Barnett
The space division multiple access protocol: asynchronous implementation and performance. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:227-242 [Journal]
- Maria C. Yuang, Yieh R. Haung
Bandwidth assignment paradigms for broadband integrated voice/data networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:243-253 [Journal]
- Siu Cheung Hui, Schubert Foo
A dynamic IP addressing system for Internet telephony applications. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:254-266 [Journal]
- Chih-Ping Chu, Chi-Jen Tzeng
On the code development paradigm of RPC and CORBA applications. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:267-278 [Journal]
- Hung-Min Sun, Shiuh-Pyng Shieh
Secure broadcasting in large networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:279-283 [Journal]
- Wei-Bin Lee, Chin-Chen Chang
Using RSA with low exponent in a public network. [Citation Graph (0, 0)][DBLP] Computer Communications, 1998, v:21, n:3, pp:284-286 [Journal]
|