Reuven Cohen An efficient scheme for accommodating synchronous traffic in a cable-modem network while avoiding segmentation of asynchronous packets. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:399-410 [Journal]
Chi-Chun Lo, Shing Hong Chen A scheduling-based event correlation scheme for fault identification in communications network. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:432-438 [Journal]
Diane Gan, Sati McKenzie Traffic policing in ATM networks with multimedia traffic: the super leaky bucket. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:439-450 [Journal]
Y. J. Cho Discrete-time analysis of throughput and response time for LAP derivative protocols under Markovian block-error pattern. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:451-462 [Journal]
T.-J. Kim, B.-C. Shin Improving the performance of distributed queue dual bus with slot reuse at overload conditions. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:470-482 [Journal]
Rolf Oppliger D. B. Parker: Fighting computer crimes: a new framework for protecting information. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:491-492 [Journal]
Z. Fan G. N. Higginbottom: Performance evaluation of communication networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:492-0 [Journal]
J. Wechta B. Haverkort: Performance of computer communication systems. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:492-493 [Journal]