The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
1996, volume: 19, number: 9-10

  1. Margaret A. Schaar, Kemal Efe
    Effective queueing strategies for co-scheduling in a pool of processors. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:743-753 [Journal]
  2. Kwok-Yan Lam, Lucas Chi Kwong Hui
    Designing a system infrastructure for distributed programs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:754-762 [Journal]
  3. Theodore A. Tsiligirides
    Queueing analysis of a hybrid CSMA/CD and BTMA protocol with capture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:763-787 [Journal]
  4. Vincenzo Catania, Antonio Puliafito, Salvatore Riccobene, Lorenzo Vita
    Monitoring performance in distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:788-803 [Journal]
  5. Son T. Vuong, Sangho Lee, Myungchul Kim
    TESTVAL, a tool for protocol test validation and the validation of a LAPB test suite as an example. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:804-812 [Journal]
  6. Vijay Varadharajan, Claudio Calvelli
    Key management for a secure LAN-SMDS network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:813-823 [Journal]
  7. Borka Jerman-Blazic
    Security platforms in the telecommunication market: technologies, developments and regulations. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:824-829 [Journal]
  8. Ray Hunt
    Frame relay: protocols, architecture, operation and performance. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:830-847 [Journal]
  9. Gwoboa Horng, C. S. Yang
    Key authentication scheme for cryptosystems based on discrete logarithms. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:848-850 [Journal]
  10. Tzong-Chen Wu, Shu-Lin Chou, Tzong-Sun Wu
    Two ID-based multisignature protocols for sequential and broadcasting architectures. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:851-856 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002