Computer Networks (1976)最新文献

筛选
英文 中文
Concise report on the “first african conference on computer communications” — Africom 84 关于“第一届非洲计算机通信会议”的简要报告-非洲司令部84
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90011-4
A. Danthine
{"title":"Concise report on the “first african conference on computer communications” — Africom 84","authors":"A. Danthine","doi":"10.1016/0376-5075(84)90011-4","DOIUrl":"10.1016/0376-5075(84)90011-4","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Page 489"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90011-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"53791678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New technologies for the information network system 信息网络系统新技术
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90003-5
Nobuo Inoue
{"title":"New technologies for the information network system","authors":"Nobuo Inoue","doi":"10.1016/0376-5075(84)90003-5","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90003-5","url":null,"abstract":"<div><p>Major requirements of a future telecommunications network called INS are outlined and key technologies needed to help meet these requirements described. INS is envisioned as requiring construction of a transmission and switching system, communication and information processing equipment, equipment for use on customer premises and the application of network management and control system technologies supported by such fundamental technologies as LSI and fiber optics. INS technology must include means for composing a telecommunications network and its subsystems, network architecture and network structure.</p><p>This new telecommunications network will make it possible to respond to the diverse requirements for voice and non-voice services through overall utilization of digital technology and enhanced network capabilities.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 393-412"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90003-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91764452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Subject index to volume 8 第8卷主题索引
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90014-X
{"title":"Subject index to volume 8","authors":"","doi":"10.1016/0376-5075(84)90014-X","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90014-X","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 499-500"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90014-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137288452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INS (Information Network System) — Telecommunications for the advanced information society INS(信息网络系统)-先进信息社会的电信
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90002-3
Yasusada Kitahara
{"title":"INS (Information Network System) — Telecommunications for the advanced information society","authors":"Yasusada Kitahara","doi":"10.1016/0376-5075(84)90002-3","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90002-3","url":null,"abstract":"<div><p>An Information Network System (INS) as the basis of a new world information order. Maximum advantage is to be made of the marriage between telecommunications and computer technologies in implementing the information network. A bit rate tariff system is also proposed to make INS feasible on both a national and international scale. As the community of man transforms itself, on the shoulders of INS, into an advanced information society, the human and technical weaknesses inherent in such a society must be addressed. By harmonizing the natural and social sciences with the needs of humanity, the technological and information-oriented innovations accompanying INS are expected to greatly enrich the quality of life.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 383-392"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90002-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91764453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The INS model system INS模型系统
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90004-7
Akira Togawa
{"title":"The INS model system","authors":"Akira Togawa","doi":"10.1016/0376-5075(84)90004-7","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90004-7","url":null,"abstract":"<div><p>The construction of a pilot for “Information Network System” (INS), started recently, is a milestone in INS development. The pilot plant, called a Model System, started its five-year field trial in September, 1982. Through the test, studies will be made on technical feasibility and service requirements. Further, an intensive assessment for the formation of INS will be made from the viewpoints of the social and cultural sciences. With the results obtained from the Model System, comprehension of what INS can be gained, and problems relating to establishment of INS can be solved.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 413-420"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90004-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection and resource control in distributed operating systems 分布式操作系统中的保护和资源控制
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90005-9
Sape J Mullender, Andrew S Tanenbaum
{"title":"Protection and resource control in distributed operating systems","authors":"Sape J Mullender,&nbsp;Andrew S Tanenbaum","doi":"10.1016/0376-5075(84)90005-9","DOIUrl":"10.1016/0376-5075(84)90005-9","url":null,"abstract":"<div><p>Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the user's machine — not the applications programs, not the system kernel, not even the choice of hardware. In this paper we discuss a general method to protect such systems against malicious users without placing any restrictions on the kinds of operating systems that can be constructed. Depending on the details of the hardware, either one-way functions or public key cryptography forms the basis for the protection. As an example of our method, we show how a traditional object-oriented capability system can be implemented on top of the basic protection mechanism, and how a service for accounting and resource control can be constructed.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 421-432"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90005-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83018104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Verification of a multidestination selective repeat procedure 多目的地选择性重复过程的验证
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90008-4
K Sabnani, M Schwartz
{"title":"Verification of a multidestination selective repeat procedure","authors":"K Sabnani,&nbsp;M Schwartz","doi":"10.1016/0376-5075(84)90008-4","DOIUrl":"10.1016/0376-5075(84)90008-4","url":null,"abstract":"<div><p>A multidestination protocol is a data transfer procedure from one transmitter to many rceivers. We specify and verify such a protocol, the <em>Selective Repeat procedure</em>. The communication medium assumed is a satellite broadcast channel shared by using a time division multiplexed technique.</p><p>The <em>Selective Repeat procedure</em> is modeled as a parallel program in a Pascal-like language. Then, we show the correctness of the parallel program model using temporal logic. The correctness requires that the program model have two system properties: the safety and liveness properties. The safety property ensures that each receiver delivers the packets to the user in the same sequence as originally delivered to the transmitter. The liveness property ensures that each receiver delivers an infinite number of packets to the user if an infinite number of packets are waiting to be transmitted at the transmitter.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 463-478"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90008-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83535956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PTC '84 — Pacific Telecommunications Conference PTC '84 -太平洋电信会议
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90009-6
{"title":"PTC '84 — Pacific Telecommunications Conference","authors":"","doi":"10.1016/0376-5075(84)90009-6","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90009-6","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 479-486"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90009-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137350377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security mechanisms in a transport layer protocol 传输层协议中的安全机制
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90006-0
Victor L Voydock, Stephen T Kent
{"title":"Security mechanisms in a transport layer protocol","authors":"Victor L Voydock,&nbsp;Stephen T Kent","doi":"10.1016/0376-5075(84)90006-0","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90006-0","url":null,"abstract":"<div><p>This paper describes how the error detection and recovery mechanisms of the proposed National Bureau of Standards (NBS) transport layer protocol can be easily extended to provide secure transmission of information. The security mechanisms are based on the Data Encryption Standard (DES) of the NBS. Two distinct security architectures are described. In the first, the DES hardware is a peripheral I/O device of the computer in which the transport layer resides. In the other, encryption is performed by a hardware device located in the data path between the transport layer and the network layer. The paper argues that, in the long run, the transport layer should be implemented in a front end computer equipped with a DES peripheral. This isolates it from (possibly untrustworthy) host software, and greatly simplifies the job of certifying its correct behavior.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 433-449"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90006-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91764454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
8th conference on local computer networks 第八届本地计算机网络会议
Computer Networks (1976) Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90010-2
{"title":"8th conference on local computer networks","authors":"","doi":"10.1016/0376-5075(84)90010-2","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90010-2","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 486-488"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90010-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137350376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信