Journals in DBLP
Gee-Swee Poo , Andrzej M. Goscinski Performance comparison of sender-based and receiver-based reliable multicast protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:597-605 [Journal ] George T. Kolyvas , Spyros E. Polykalas , Iakovos S. Venieris Performance evaluation of integrated IN/B-ISDN signalling platforms. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:606-623 [Journal ] Lakshmana N. Kumar , Christos Douligeris The dynamic three-tier protocol: an access remedial scheme for DQDB Metropolitan Area Networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:624-643 [Journal ] Jin-Soo Kim , Jae-kyoon Kim Adaptive traffic smoothing for live VBR MPEG video service. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:644-653 [Journal ] Allen Roginsky , Kenneth J. Christensen , Steven Polge Efficient computation of packet CRC from partial CRCs with application to the Cells-In-Frames protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:654-661 [Journal ] Nader Mir-Fakhraei Evaluation of an ATM LAN constructed with a cyclic deflection-routing network. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:662-669 [Journal ] B. C. Soh , S. Young Distributed computing: an experimental investigation of a malicious denial-of-service applet. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:670-674 [Journal ] Pi-Rong Sheu , Charng-Maw Lin An optimal time slot assignment algorithm for CRMA high-speed networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:675-685 [Journal ] Subir Das , P. Dhar Protocol converter validation through deductive inference: a case study. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:7, pp:686-692 [Journal ]