Journals in DBLP
Marco Ajmone Marsan , Giorgio Taricco , G. Roncarolo , G. Tagliente Simulation of three MAC protocols for intelligent highway packet radio networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:943-953 [Journal ] Dimitris Gritzalis , Sokratis K. Katsikas Towards a formal system-to-system authentication protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:954-961 [Journal ] Gerd Keiser , Carrie Carter , David Freeman Test traffic generation equipment and algorithms for evaluating ATM networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:962-971 [Journal ] Young Sik Youn , Chong Kwan Un Performance of dilated banyan network with back-pressure mechanism. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:972-981 [Journal ] Nils Harald Berge , Jon Ølnes Firewalls in an OSI-environment. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:982-989 [Journal ] Richard Lai , M. C. Wong The ISO virtual terminal protocol: a semi-automatic implementation. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:990-1000 [Journal ] Sethuraman Panchanathan , N. Gamaz , A. Jain JPEG based scalable image compression. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:1001-1013 [Journal ] Kwok-Yan Lam , Lucas Chi Kwong Hui Efficient nearer-ancestor algorithm for network routing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:1014-1019 [Journal ]