Bell Labs Technical Journal, Volume 12 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 12, Number 1, Spring 2007
Research Articles

Kristin F. Kocan:
Achieving the transformation to next-generation networks. 1-4

Thomas W. Anderson, Peter B. Busschbach, Igor Faynberg, Hui-Lan Lu, Dong Sun:
The emerging resource and admission control function standards and their application to the new triple-play services. 5-21

Andre Beck, Robert E. Daugherty, J. Robert Ensor, Jairo O. Esteban, F. Theodore Freuler, Sugato Ganguly, Kristin F. Kocan, William D. Roome:
Blending telephony and IPTV: Building the TV-link service package using the Alcatel-Lucent Service BrokerTM. 23-39

Ganesan Radhakrishnan:
Provisioning in complex networks. 41-55

Christian Hermsmeyer, Enrique J. Hernandez-Valencia, Dieter Stoll, Oliver Tamm:
Ethernet aggregation and core network models for effcient and reliable IPTV services. 57-76

Subramanian Prakash, Abdol Saleh, Salman Shaikh, David Tsay:
Economic analysis of class 5 migration to IMS. 77-93

Ying Hu, Amit Mukhopadhyay, Zulfiquar Sayeed, Carlos Urrutia-Valdés, Mohamed El-Sayed:
IMS service enhancement layer: A quantitative value proposition. 95-114

Wenhua Jiao, Jianfeng Chen, Fang Liu:
Provisioning end-to-end QoS under IMS over a WiMAX architecture. 115-121

Dalton Li, Andrew Guo, Brian Huang:
Generic policy decision function framework. 123-129

Thierry Bessis:
Improving the DNS mechanism in a data center intranet. 131-144

Sheng Chen, Xiangyang Li, Yigang Cai:
IP multimedia subsystem converged call control services. 145-160

Eric S. Fisher, Steven Fortune, Martin K. Gladstein, Suresh Goyal, William B. Lyons
, James H. Mosher Jr., Gordon T. Wilfong:
Economic modeling of global test strategy I: Mathematical models. 161-173

Eric S. Fisher, Steven Fortune, Martin K. Gladstein, Suresh Goyal, William B. Lyons
, James H. Mosher Jr., Gordon T. Wilfong:
Economic modeling of global test strategy II: Software system and examples. 175-186

Jim Borger, Alina M. Ionescu-Graff, Samrat Kulkarni, Narayan Raman:
Economics of ethernet over SONET/SDH. 187-206

Dieter Stoll, Wolfgang Thomas, Martin Belzner:
The role of pseudo-wires for layer 2 services in intelligent transport networks. 207-220

Doh-Suk Kim, Ahmed A. Tarraf:
ANIQUE+: A new American national standard for non-intrusive estimation of narrowband speech quality. 221-236

Michael J. Sheehan:
Secure parallel file distribution through a streaming worm network. 237-246

David C. Ma:
Deterministic-based performance modeling of a cluster of nodes handling subscriber profile query and update in CDMA mobile switching center. 247-261
Volume 12, Number 2, Summer 2007
Research Articles

Lawrence C. Cowsar:
A global research presence. 1-2

Georg Fischer
:
Next-generation base station radio frequency architecture. 3-18

Angeliki Alexiou:
WINNER: Designing a new radio interface for next-generation systems. 19-35

Markus Bauer, Armin Dekorsy
, Peter Schefczik, Michael Söllner:
IP-driven access-independent resource management in converged access networks. 37-61

Shipra Agrawal, C. N. Kanthi, K. V. M. Naidu, Jeyashankher Ramamirtham, Rajeev Rastogi, Scott Satkin, Anand Srinivasan:
Monitoring infrastructure for converged networks and services. 63-77

Erik Meeuwissen, Paul Reinold, Cynthia C. S. Liem
:
Inferring and predicting context of mobile users. 79-86

Supratim Deb, Ankur Jain, Anirban Majumder, K. V. M. Naidu, Jeyashankher Ramamirtham, Rajeev Rastogi, Anand Srinivasan:
Augmenting handset capacity through virtual storage. 87-96

Alexei E. Ashikhmin, Adriaan J. de Lind van Wijngaarden
, Zhao Haibo, Bertrand M. Hochwald, Thomas L. Marzetta, Vinay Purohit, Chen Qinghong, Paul A. Wilford, Sheng-Rong Zhou, Michael A. Zuniga, Edward S. Zuranski:
Design and development of a terrestrial digital video broadcast demodulation core: An international collaborative effort. 97-118

Partha Dutta, Sharad Jaiswal, Rajeev Rastogi:
VillageNet: A low-cost, IEEE 802.11-based mesh network for connecting rural areas. 119-131

Terry S. Cheng, Kenneth W. Del Signore, Frances Lin:
Cost effective treatment of short message service on the paging channel for the CDMA system. 133-141

Bradley D. Shaw:
The use of conduction to cool small form-factor pluggable optical transceivers. 143-146

Michael R. Brenner, Musa R. Unmehopa:
Service-oriented architecture and Web services penetration in next-generation networks. 147-159
Volume 12, Number 3, Autumn (Fall) 2007
Research Articles

Carlos C. Solari:
Designing for security. 1-6

Vijay K. Gurbani, Andrew R. McGee:
An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain. 7-19

Ashok K. Gupta, Uma Chandrashekhar, Suhasini V. Sabnis, Frank A. Bastry:
Building secure products and solutions. 21-38

Andrew R. McGee, Frank A. Bastry, Uma Chandrashekhar, S. Rao Vasireddy, Lori A. Flynn:
Using the Bell Labs security framework to enhance the ISO 17799/27001 information security management system. 39-54

David Ramírez:
Case study: ITU-T recommendation X.805 applied to an enterprise environment - banking. 55-64

Robert S. Hanmer, Donald T. McBride, Veena B. Mendiratta:
Comparing reliability and security: Concepts, requirements, and techniques. 65-78

Daping Wang:
An XML-based testing strategy for probing security vulnerabilities in the diameter protocol. 79-93

Seyong Park, Alexandro Salvarani:
IP-based radio access network implementation cost vs. network security trade-off. 95-99

Dimitrios Stiliadis, Andrea Francini, Sanjay Kamat, Mansoor Alicherry, Adiseshu Hari, Pramod V. Koppol, Ashok K. Gupta, Dor Skuler:
Evros: A service-delivery platform for extending security coverage and IT reach. 101-119

Jorge Hernandez-Herrero, Jon A. Solworth:
The need for a multi-perspective approach to solve the DDos problem. 121-130

Bjoern M. Luettmann, Adam C. Bender:
Man-in-the-middle attacks on auto-updating software. 131-138

Gerald R. Thompson, Lori A. Flynn:
Polymorphic malware detection and identification via context-free grammar homomorphism. 139-147

Lloyd G. Greenwald, Tavaris J. Thomas:
Understanding and preventing network device fingerprinting. 149-166

Ruth S. Gayde, Stinson S. Mathai, Kevin Wang:
Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access. 167-185

Andrew C. Clark, Karen E. Plonty:
Common security management for CDMA2000 1x and 1x EV-DO networks. 187-203
Volume 12, Number 4, Winter 2008

Michael J. Burns:
Deploying, hardening, and benefiting from next-generation networks. 1-4

Qingwang Michael Hao:
Toward a unified service delivery process for next-generation services. 5-20

Anne Lee, Carlos Urrutia-Valdés:
An analysis of capital expenses and performance trade-offs among IMS CSCF deployment options. 21-31

Jean-Philippe Joseph:
IMS network signaling peering: Challenges and proposal. 33-48

Ramana Isukapalli, Steven A. Benno, Candace Park, Peretz Feder:
Advanced IMS client supporting secure signaling. 49-65

Doru Calin, Andrew Mackay, Thomas B. Morawski, Hardy Zhang:
An approach for just-in-time radio access network capacity planning in CDMA networks. 67-82

Bing Leng, Dave P. Weeks, Manoj K. Mahapatra:
Automating network configuration tasks using multi-level modeling. 83-101

Steven H. Richman, Himanshu Pant:
Reliability concerns for next-generation networks. 103-108

Himanshu Pant, Chi-Hung Kelvin Chu, Steven H. Richman, Ahmad M. Jrad, Gerard P. O'Reilly:
Reliability of next-generation networks with a focus on IMS architecture. 109-125

Gerard P. O'Reilly, Chi-Hung Kelvin Chu:
Optimal deployment of power reserves across telecom critical infrastructures. 127-141

Vassilka Kirova, Neil Kirby, Darshak Kothari, Glenda Childress:
Effective requirements traceability: Models, tools, and practices. 143-157

Ramesh Viswanathan, Thomas L. Wood:
Portable Call Agent: A model for rapid development and emulation of network services. 159-172

Hans Peng Liu:
Generic service provisioning and invocation in IMS. 173-178

Jasper Aartse Tuijn, Dennis J. A. Bijwaard
:
Spanning a multimedia session across multiple devices. 179-193

Bilgehan Erman, Elissa P. Matthews:
Analysis and realization of IPTV service quality. 195-212

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







