The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
1998, volume: 21, number: 2

  1. Bob Sultan
    A switch-router taxonomy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:101-110 [Journal]
  2. Giuseppe Anastasi, Pierfrancesco Foglia, Luciano Lenzini
    MPEG video traffic on a MetaRing network: complexity reduction of a 'worst-case' model for bandwidth allocation analysis. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:111-125 [Journal]
  3. C. P. Ravikumar, Rajneesh Bajpai
    Source-based delay-bounded multicasting in multimedia networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:126-132 [Journal]
  4. David Barrowman, Patrick Martin
    The performance of SQL queries to an X.500 directory system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:133-146 [Journal]
  5. Shree Murthy, J. J. Garcia-Luna-Aceves
    A loop-free routing protocol for large-scale internets using distance vectors. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:147-161 [Journal]
  6. Ok-Ki Lee, Steve Benford
    An explorative approach to federated trading. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:162-170 [Journal]
  7. SuKyoung Lee, JooSeok Song
    A measurement-based admission control algorithm using variable-sized window in ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:171-178 [Journal]
  8. P. T. Kulkarni, R. Gangopadhyay, D. Datta
    Impact of link failures on the performance of multihop lightwave networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:179-185 [Journal]
  9. Sun Hairong, Huang Ke, Li Lemin
    Performance analysis of the constant-bit-rate services in an ATM DQDB MAN. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:186-194 [Journal]
  10. Wei-Bin Lee, Chin-Chen Chang
    Authenticity of public keys in asymmetric cryptosystems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:195-198 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002