nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
All change for European LANs
|
|
|
1989 |
12 |
3 |
p. 173- 1 p. |
artikel |
2 |
Calendar
|
|
|
1989 |
12 |
3 |
p. IBC- 1 p. |
artikel |
3 |
Cosmos: an architecture for a distributed programming environment
|
Nicol, John R |
|
1989 |
12 |
3 |
p. 147-157 11 p. |
artikel |
4 |
Data communications system for the state of Nordrhein-Westfalen
|
Köhler, W |
|
1989 |
12 |
3 |
p. 167-170 4 p. |
artikel |
5 |
DEC penetrates workstation market
|
|
|
1989 |
12 |
3 |
p. 178- 1 p. |
artikel |
6 |
Design and performance evaluation of an optical fibre LAN with double token rings
|
Casale, Salvatore |
|
1989 |
12 |
3 |
p. 158-166 9 p. |
artikel |
7 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
artikel |
8 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
artikel |
9 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
artikel |
10 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
artikel |
11 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
artikel |
12 |
Evolution from ISDN to BISDN: a logical step towards ATM
|
De Prycker, Martin |
|
1989 |
12 |
3 |
p. 141-146 6 p. |
artikel |
13 |
Explosion in LAN sales
|
|
|
1989 |
12 |
3 |
p. 173- 1 p. |
artikel |
14 |
Gateway designs for internetwork multicast communication
|
Hughes, Larry |
|
1989 |
12 |
3 |
p. 123-130 8 p. |
artikel |
15 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
artikel |
16 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
artikel |
17 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
artikel |
18 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
artikel |
19 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
artikel |
20 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
artikel |
21 |
International Open Systems '89
|
Thompson, J |
|
1989 |
12 |
3 |
p. 177- 1 p. |
artikel |
22 |
Key release in codex network strategy
|
|
|
1989 |
12 |
3 |
p. 179- 1 p. |
artikel |
23 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
24 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
25 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
artikel |
26 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
27 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
28 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
artikel |
29 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
30 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
artikel |
31 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
32 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
33 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182-183 2 p. |
artikel |
34 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
35 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
36 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
37 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
38 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
artikel |
39 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
40 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
artikel |
41 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
42 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
43 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
44 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
artikel |
45 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
46 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
47 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
artikel |
48 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
artikel |
49 |
New products in brief
|
|
|
1989 |
12 |
3 |
p. 180-181 2 p. |
artikel |
50 |
NSA influences encryption market
|
|
|
1989 |
12 |
3 |
p. 172- 1 p. |
artikel |
51 |
Research into Networks and Distributed Applications: EUTECO '88
|
Coffield, David |
|
1989 |
12 |
3 |
p. 171- 1 p. |
artikel |
52 |
Retail welcomes EPoS
|
|
|
1989 |
12 |
3 |
p. 172- 1 p. |
artikel |
53 |
Security mechanisms for computer networks
|
Piper, Fred |
|
1989 |
12 |
3 |
p. 171- 1 p. |
artikel |
54 |
Semi-Markov performance model of CSMA/CD networks
|
Akhtar, Shakil |
|
1989 |
12 |
3 |
p. 131-140 10 p. |
artikel |
55 |
Standards and protocols
|
|
|
1989 |
12 |
3 |
p. 175- 1 p. |
artikel |
56 |
Standards and protocols
|
|
|
1989 |
12 |
3 |
p. 175- 1 p. |
artikel |
57 |
VINES opens to customized applications
|
|
|
1989 |
12 |
3 |
p. 179- 1 p. |
artikel |