no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
All change for European LANs
|
|
|
1989 |
12 |
3 |
p. 173- 1 p. |
article |
2 |
Calendar
|
|
|
1989 |
12 |
3 |
p. IBC- 1 p. |
article |
3 |
Cosmos: an architecture for a distributed programming environment
|
Nicol, John R |
|
1989 |
12 |
3 |
p. 147-157 11 p. |
article |
4 |
Data communications system for the state of Nordrhein-Westfalen
|
Köhler, W |
|
1989 |
12 |
3 |
p. 167-170 4 p. |
article |
5 |
DEC penetrates workstation market
|
|
|
1989 |
12 |
3 |
p. 178- 1 p. |
article |
6 |
Design and performance evaluation of an optical fibre LAN with double token rings
|
Casale, Salvatore |
|
1989 |
12 |
3 |
p. 158-166 9 p. |
article |
7 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
article |
8 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
article |
9 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
article |
10 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
article |
11 |
Developments
|
|
|
1989 |
12 |
3 |
p. 174- 1 p. |
article |
12 |
Evolution from ISDN to BISDN: a logical step towards ATM
|
De Prycker, Martin |
|
1989 |
12 |
3 |
p. 141-146 6 p. |
article |
13 |
Explosion in LAN sales
|
|
|
1989 |
12 |
3 |
p. 173- 1 p. |
article |
14 |
Gateway designs for internetwork multicast communication
|
Hughes, Larry |
|
1989 |
12 |
3 |
p. 123-130 8 p. |
article |
15 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
article |
16 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
article |
17 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
article |
18 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
article |
19 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
article |
20 |
Implementations
|
|
|
1989 |
12 |
3 |
p. 176- 1 p. |
article |
21 |
International Open Systems '89
|
Thompson, J |
|
1989 |
12 |
3 |
p. 177- 1 p. |
article |
22 |
Key release in codex network strategy
|
|
|
1989 |
12 |
3 |
p. 179- 1 p. |
article |
23 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
24 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
25 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
article |
26 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
27 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
28 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
article |
29 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
30 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
article |
31 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
32 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
33 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182-183 2 p. |
article |
34 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
35 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
36 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
37 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
38 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
article |
39 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
40 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
article |
41 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
42 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
43 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
44 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 184- 1 p. |
article |
45 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
46 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
47 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 183- 1 p. |
article |
48 |
Literature review
|
|
|
1989 |
12 |
3 |
p. 182- 1 p. |
article |
49 |
New products in brief
|
|
|
1989 |
12 |
3 |
p. 180-181 2 p. |
article |
50 |
NSA influences encryption market
|
|
|
1989 |
12 |
3 |
p. 172- 1 p. |
article |
51 |
Research into Networks and Distributed Applications: EUTECO '88
|
Coffield, David |
|
1989 |
12 |
3 |
p. 171- 1 p. |
article |
52 |
Retail welcomes EPoS
|
|
|
1989 |
12 |
3 |
p. 172- 1 p. |
article |
53 |
Security mechanisms for computer networks
|
Piper, Fred |
|
1989 |
12 |
3 |
p. 171- 1 p. |
article |
54 |
Semi-Markov performance model of CSMA/CD networks
|
Akhtar, Shakil |
|
1989 |
12 |
3 |
p. 131-140 10 p. |
article |
55 |
Standards and protocols
|
|
|
1989 |
12 |
3 |
p. 175- 1 p. |
article |
56 |
Standards and protocols
|
|
|
1989 |
12 |
3 |
p. 175- 1 p. |
article |
57 |
VINES opens to customized applications
|
|
|
1989 |
12 |
3 |
p. 179- 1 p. |
article |