default search action
Simon S. Lam
Person information
- unicode name: 林善成
- affiliation: University of Texas at Austin, USA
- award (2004): SIGCOMM Award
- award (2004): ACM Software System Award
- award (2004): W. Wallace McDowell Award
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j69]Huazhe Wang, Chen Qian, Ye Yu, Hongkun Yang, Simon S. Lam:
Practical Network-Wide Packet Behavior Identification by AP Classifier. IEEE/ACM Trans. Netw. 25(5): 2886-2899 (2017) - [j68]Hongkun Yang, Simon S. Lam:
Scalable Verification of Networks With Packet Transformers Using Atomic Predicates. IEEE/ACM Trans. Netw. 25(5): 2900-2915 (2017) - 2016
- [j67]Chen Qian, Simon S. Lam:
A Scalable and Resilient Layer-2 Network With Ethernet Compatibility. IEEE/ACM Trans. Netw. 24(1): 231-244 (2016) - [j66]Hongkun Yang, Simon S. Lam:
Real-Time Verification of Network Properties Using Atomic Predicates. IEEE/ACM Trans. Netw. 24(2): 887-900 (2016) - [j65]Chen Qian, Simon S. Lam:
Greedy Routing by Network Distance Embedding. IEEE/ACM Trans. Netw. 24(4): 2100-2113 (2016) - 2015
- [c72]Huazhe Wang, Chen Qian, Ye Yu, Hongkun Yang, Simon S. Lam:
Practical network-wide packet behavior identification by AP classifier. CoNEXT 2015: 10:1-10:13 - 2014
- [c71]Hongkun Yang, Simon S. Lam:
Collaborative Verification of Forward and Reverse Reachability in the Internet Data Plane. ICNP 2014: 320-331 - 2013
- [j64]Simon S. Lam, Chen Qian:
Geographic Routing in d -Dimensional Spaces With Guaranteed Delivery and Low Stretch. IEEE/ACM Trans. Netw. 21(2): 663-677 (2013) - [c70]Hongkun Yang, Simon S. Lam:
Real-time verification of network properties using Atomic Predicates. ICNP 2013: 1-11 - 2012
- [c69]Chen Qian, Simon S. Lam:
ROME: Routing on metropolitan-scale Ethernet. ICNP 2012: 1-10 - 2011
- [c68]Chen Qian, Simon S. Lam:
Greedy Distance Vector Routing. ICDCS 2011: 857-868 - [c67]Simon S. Lam, Chen Qian:
Geographic routing in d-dimensional spaces with guaranteed delivery and low stretch. SIGMETRICS 2011: 257-268
2000 – 2009
- 2009
- [c66]Chen Qian, Simon S. Lam, Vinod Venkataraman:
A wireless routing protocol in d-dimensional spaces. SenSys 2009: 389-390 - 2008
- [j63]Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers:
A wavelet-based approach to detect shared congestion. IEEE/ACM Trans. Netw. 16(4): 763-776 (2008) - [c65]Dong-Young Lee, Eui Kyung Chung, Simon S. Lam:
A Radius Geocast Routing Protocol. HPCC 2008: 447-455 - [c64]Dong-Young Lee, Simon S. Lam:
Efficient and accurate protocols for distributed delaunay triangulation under churn. ICNP 2008: 124-136 - 2007
- [j62]Feng Wang, Lili Qiu, Simon S. Lam:
Probabilistic region-based localization for wireless networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(1): 3-14 (2007) - [c63]Dong-Young Lee, Simon S. Lam:
Protocol Design for Dynamic Delaunay Triangulation. ICDCS 2007: 26 - [c62]Yi Li, Yin Zhang, Lili Qiu, Simon S. Lam:
SmartTunnel: Achieving Reliability in the Internet. INFOCOM 2007: 830-838 - [c61]Yun Mao, Feng Wang, Lili Qiu, Simon S. Lam, Jonathan M. Smith:
S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks. NSDI 2007 - 2006
- [j61]Simon S. Lam, Huaiyu Liu:
Failure recovery for structured p2p networks: Protocol design and performance under churn. Comput. Networks 50(16): 3083-3104 (2006) - [c60]Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers:
Scalable Clustering of Internet Paths by Shared Congestion. INFOCOM 2006 - 2005
- [j60]Nishanth Ramakrishna Sastry, Simon S. Lam:
CYRF: a theory of window-based unicast congestion control. IEEE/ACM Trans. Netw. 13(2): 330-342 (2005) - [c59]X. Brian Zhang, Simon S. Lam, Huaiyu Liu:
Efficient Group Rekeying Using Application-Layer Multicast. ICDCS 2005: 303-313 - [c58]Min Sik Kim, Yi Li, Simon S. Lam:
Eliminating Bottlenecks in Overlay Multicast. NETWORKING 2005: 893-905 - 2004
- [j59]Simon S. Lam:
Back to the future part 4: the internet. Comput. Commun. Rev. 35(1): 3-12 (2004) - [j58]X. Brian Zhang, Simon S. Lam, Dong-Young Lee:
Group rekeying with limited unicast recovery. Comput. Networks 44(6): 855-870 (2004) - [c57]Huaiyu Liu, Simon S. Lam:
Consistency-Preserving Neighbor Table Optimization for P2P Networks. ICPADS 2004: 7-16 - [c56]Taekhyun Kim, YongJune Shin, Edward J. Powers, Min Sik Kim, Simon S. Lam:
Application of wavelet denoising to the detection of shared congestion in overlay multimedia networks. MMSP 2004: 474-477 - [c55]Simon S. Lam:
Back to the future part 4: the internet. SIGCOMM 2004: 1-2 - [c54]Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers:
A wavelet-based approach to detect shared congestion. SIGCOMM 2004: 293-306 - [c53]Simon S. Lam, Huaiyu Liu:
Failure recovery for structured P2P networks: protocol design and performance evaluation. SIGMETRICS 2004: 199-210 - 2003
- [j57]Yang Richard Yang, Min Sik Kim, Simon S. Lam:
Transient behaviors of TCP-friendly congestion control protocols. Comput. Networks 41(2): 193-210 (2003) - [j56]X. Brian Zhang, Simon S. Lam, Dong-Young Lee, Yang Richard Yang:
Protocol design for scalable and reliable group rekeying. IEEE/ACM Trans. Netw. 11(6): 908-922 (2003) - [c52]X. Brian Zhang, Simon S. Lam, Dong-Young Lee:
Group rekeying with limited unicast recovery. ICC 2003: 707-714 - [c51]Min Sik Kim, Simon S. Lam, Dong-Young Lee:
Optimal Distribution Tree for Internet Streaming Media. ICDCS 2003: 116-125 - [c50]Huaiyu Liu, Simon S. Lam:
Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network. ICDCS 2003: 509- - 2002
- [c49]Nishanth Ramakrishna Sastry, Simon S. Lam:
A Theory of Window-Based Unicast Congestion Control. ICNP 2002: 144-154 - 2001
- [c48]Yang Richard Yang, Min Sik Kim, Simon S. Lam:
Transient Behaviors of TCP-friendly Congestion Control Protocols. INFOCOM 2001: 1716-1725 - [c47]Yang Richard Yang, Xiaozhou (Steve) Li, X. Brian Zhang, Simon S. Lam:
Reliable group rekeying: a performance analysis. SIGCOMM 2001: 27-38 - [c46]Yang Richard Yang, Xiaozhou (Steve) Li, Simon S. Lam, Xincheng Zhang:
Towards scalable and reliable group key management. SIGMETRICS/Performance 2001: 314-315 - [c45]Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam:
Batch rekeying for secure group communications. WWW 2001: 525-534 - 2000
- [j55]Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam:
Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1): 16-30 (2000) - [c44]Yang Richard Yang, Min Sik Kim, Simon S. Lam:
Optimal Partitioning of Multicast Receivers. ICNP 2000: 129-140 - [c43]Yang Richard Yang, Simon S. Lam:
General AIMD Congestion Control. ICNP 2000: 187-198
1990 – 1999
- 1999
- [j54]Chung Kei Wong, Simon S. Lam:
Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4): 502-513 (1999) - 1998
- [j53]David K. Y. Yau, Simon S. Lam:
Operating system support for distributed multimedia. Int. J. Intell. Syst. 13(12): 1175-1200 (1998) - [j52]Geoffrey G. Xie, Simon S. Lam:
Real-time block transfer under a link-sharing hierarchy. IEEE/ACM Trans. Netw. 6(1): 30-41 (1998) - [j51]David K. Y. Yau, Simon S. Lam:
Migrating sockets-end system support for networking with quality of service guarantees. IEEE/ACM Trans. Netw. 6(6): 700-716 (1998) - [c42]Chung Kei Wong, Simon S. Lam:
Digital Signatures for Flows and Multicasts. ICNP 1998: 198-209 - [c41]Thomas Y. C. Woo, Simon S. Lam:
Designing a Distributed Authorization Service. INFOCOM 1998: 419-429 - [c40]Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam:
Secure Group Communications Using Key Graphs. SIGCOMM 1998: 68-79 - 1997
- [j50]Geoffrey G. Xie, Simon S. Lam:
An efficient network architecture motivated by application-level QoS. J. High Speed Networks 6(3): 163-179 (1997) - [j49]Pawan Goyal, Simon S. Lam, Harrick M. Vin:
Determining End-to-End Delay Bounds in Heterogeneous Networks. Multim. Syst. 5(3): 157-163 (1997) - [j48]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling Networks. Perform. Evaluation 31(1-2): 133-157 (1997) - [j47]Simon S. Lam, Geoffrey G. Xie:
Group priority scheduling. IEEE/ACM Trans. Netw. 5(2): 205-218 (1997) - [j46]David K. Y. Yau, Simon S. Lam:
Adaptive rate-controlled scheduling for multimedia applications. IEEE/ACM Trans. Netw. 5(4): 475-488 (1997) - [c39]David K. Y. Yau, Simon S. Lam:
Migrating Sockets for networking with quality of service guarantees. ICNP 1997: 73- - [c38]Geoffrey G. Xie, Simon S. Lam:
Admission Control and Loss Management for an Application-Level Statistical Service. ICNP 1997: 142-151 - [c37]Geoffrey G. Xie, Simon S. Lam:
Real-Time Block Transfer under a Link Sharing Hierarchy. INFOCOM 1997: 388-397 - 1996
- [j45]Simon S. Lam:
Genetic Algorithm with Pigeon-Hole Coding Scheme for Solving Sequencing Problems. Appl. Artif. Intell. 10(3): 239-256 (1996) - [j44]Simon S. Lam, Simon Chow, David K. Y. Yau:
A lossless smoothing algorithm for compressed video. IEEE/ACM Trans. Netw. 4(5): 697-708 (1996) - [c36]Geoffrey G. Xie, Simon S. Lam:
An Efficient Adaptive Search Algorithm for Scheduling Real-Time Traffic. ICNP 1996: 14-22 - [c35]Simon S. Lam, Geoffrey G. Xie:
Group Priority Scheduling. INFOCOM 1996: 1346-1356 - [c34]David K. Y. Yau, Simon S. Lam:
Adaptive Rate-Controlled Scheduling for Multimedia Applications. ACM Multimedia 1996: 129-140 - 1995
- [j43]Geoffrey G. Xie, Simon S. Lam:
Delay guarantee of virtual clock server. IEEE/ACM Trans. Netw. 3(6): 683-689 (1995) - [c33]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling: Architecture and Algorithm for Switching Packet Video. INFOCOM 1995: 940-950 - [c32]Pawan Goyal, Simon S. Lam, Harrick M. Vin:
Determining End-to-End Delay Bounds in Heterogeneous Networks. NOSSDAV 1995: 273-284 - [c31]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling Networks: Flow Specification and Performance Guarantees. NOSSDAV 1995: 289-292 - 1994
- [j42]Thomas Y. C. Woo, Simon S. Lam:
A Lesson on Authentication Protocol Design. ACM SIGOPS Oper. Syst. Rev. 28(3): 24-37 (1994) - [j41]Simon S. Lam, A. Udaya Shankar:
A Theory of Interfaces and Modules I-Composition Theorem. IEEE Trans. Software Eng. 20(1): 55-71 (1994) - [c30]Thomas Y. C. Woo, Simon S. Lam:
Design, verification and implementation of an authentication protocol. ICNP 1994: 81-90 - [c29]Simon S. Lam, Simon Chow, David K. Y. Yau:
An Algorithm for Lossless Smoothing of MPEG Video. SIGCOMM 1994: 281-293 - [c28]Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su, Simon S. Lam:
SNP: An Interface for Secure Network Programming. USENIX Summer 1994: 45-58 - 1993
- [j40]Thomas Y. C. Woo, Simon S. Lam:
Authorizations in Distributed Systems: A New Approach. J. Comput. Secur. 2(2-3): 107-136 (1993) - [c27]Thomas Y. C. Woo, Simon S. Lam:
A Framework for Distributed Authorization. CCS 1993: 112-118 - [c26]Thomas Y. C. Woo, Simon S. Lam:
Verifying authentication protocols: methodology and example. ICNP 1993: 36-45 - [c25]Thomas Y. C. Woo, Simon S. Lam:
A semantic model for authentication protocols. S&P 1993: 178-194 - 1992
- [j39]Thomas Y. C. Woo, Simon S. Lam:
Authentification for Distributed Systems. Computer 25(1): 39-52 (1992) - [j38]Simon S. Lam, A. Udaya Shankar:
Specifying Modules to Satisfy Interfaces: A State Transition System Approach. Distributed Comput. 6(1): 39-63 (1992) - [j37]A. Udaya Shankar, Simon S. Lam:
A Stepwise Refinement Heuristic for Protocol Construction. ACM Trans. Program. Lang. Syst. 14(3): 417-461 (1992) - [c24]Thomas Y. C. Woo, Simon S. Lam:
Authorization in distributed systems: a formal approach. S&P 1992: 33-50 - 1991
- [j36]Pradeep Jain, Simon S. Lam:
Specification of Real-Time Broadcast Networks. IEEE Trans. Computers 40(4): 404-422 (1991) - [c23]Simon S. Lam, A. Udaya Shankar:
Understanding Interfaces. FORTE 1991: 165-184 - [c22]Simon S. Lam, A. Udaya Shankar:
A Composition Theorem for Layered Systems. PSTV 1991: 93-108 - [c21]Simon S. Lam, A. Udaya Shankar, Thomas Y. C. Woo:
Applying a Theory of Modules and Interfaces to Security Verification. S&P 1991: 136-155 - 1990
- [j35]Kenneth L. Calvert, Simon S. Lam:
Formal Methods for Protocol Conversion. IEEE J. Sel. Areas Commun. 8(1): 127-142 (1990) - [j34]Simon S. Lam, A. Udaya Shankar:
A Relational Notation for State Transition Systems. IEEE Trans. Software Eng. 16(7): 755-775 (1990) - [c20]Kenneth L. Calvert, Simon S. Lam:
Adaptors for Protocol Conversion. INFOCOM 1990: 552-560
1980 – 1989
- 1989
- [j33]Ching-Tarng Hsieh, Simon S. Lam:
PAM - A Noniterative Approximate Solution Method for Closed Multichain Queueing Networks. Perform. Evaluation 9(2): 119-133 (1989) - [c19]Simon S. Lam, A. Udaya Shankar:
Refinement and Projection of Relational Specifications. REX Workshop 1989: 454-486 - [c18]A. Udaya Shankar, Simon S. Lam:
Construction of Network Protocols by Stepwise Refinement. REX Workshop 1989: 669-695 - [c17]Kenneth L. Calvert, Simon S. Lam:
Deriving a Protocol Converter: A Top-Down Method. SIGCOMM 1989: 247-258 - 1988
- [j32]Ching-Hua Chow, Simon S. Lam:
PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols. IEEE Trans. Software Eng. 14(3): 327-338 (1988) - [j31]Simon S. Lam:
Protocol Conversion. IEEE Trans. Software Eng. 14(3): 353-362 (1988) - [j30]Simon S. Lam:
Correction to "Protocol Conversion". IEEE Trans. Software Eng. 14(9): 1376 (1988) - [c16]Pradeep Jain, Simon S. Lam:
Specification and verification of collusion-free broadcast networks. SIGCOMM 1988: 282-291 - [c15]Ching-Tarng Hsieh, Simon S. Lam:
PAM - A Noniterative Approximate Solution Method for Closed Multichain Queueing Networks. SIGMETRICS 1988: 261-269 - 1987
- [j29]Kenneth L. Calvert, Simon S. Lam:
An exercise in deriving a protocol conversion. Comput. Commun. Rev. 17(5): 151-160 (1987) - [j28]Simon S. Lam, Ching-Tarng Hsieh:
Modeling, analysis, and optimal routing of flow-controlled communication networks. Comput. Commun. Rev. 17(5): 162-172 (1987) - [j27]A. Udaya Shankar, Simon S. Lam:
Time-Dependent Distributed Systems: Proving Safety, Liveness and Real-Time Properties. Distributed Comput. 2(2): 61-79 (1987) - [j26]Ching-Tarng Hsieh, Simon S. Lam:
Two Classes of Performance Bounds for Closed Queueing Networks. Perform. Evaluation 7(1): 3-30 (1987) - [j25]Pradeep Jain, Simon S. Lam:
Modeling and Verification of Real-Time Protocols for Broadcast Networks. IEEE Trans. Software Eng. 13(8): 924-937 (1987) - 1986
- [c14]Simon S. Lam:
Protocol conversion - correctness problems. SIGCOMM 1986: 19-29 - 1985
- [j24]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
A Discipline for Constructing Multiphase Communication Protocols. ACM Trans. Comput. Syst. 3(4): 315-343 (1985) - 1984
- [j23]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
An exercise in constructing multi-phase communication protocols. Comput. Commun. Rev. 14(2): 42-49 (1984) - [j22]Simon S. Lam, A. Udaya Shankar:
Protocol Verification via Projections. IEEE Trans. Software Eng. 10(4): 325-342 (1984) - [c13]Mohamed G. Gouda, Ching-Hua Chow, Simon S. Lam:
On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines. PSTV 1984: 47-56 - [c12]Ching-Hua Chow, Mohamed G. Gouda, Simon S. Lam:
On Constructing Multi-Phase Communication Protocols. PSTV 1984: 57-68 - [c11]A. Udaya Shankar, Simon S. Lam:
Specification and Verification of Time-Dependant Communication Protocols. PSTV 1984: 215-226 - 1983
- [j21]Simon S. Lam, Luke Yeong-Chang Lien:
A Tree Convolution Algorithm for the Solution of Queueing Networks. Commun. ACM 26(3): 203-215 (1983) - [j20]Simon S. Lam:
A Simple Derivation of the MVA and LBANC Algorithms from the Convolution Algorithm. IEEE Trans. Computers 32(11): 1062-1064 (1983) - [j19]A. Udaya Shankar, Simon S. Lam:
An HDLC Protocol Specification and Its Verification Using Image Protocols. ACM Trans. Comput. Syst. 1(4): 331-368 (1983) - [c10]A. Udaya Shankar, Simon S. Lam:
Specification and verification of an HDLC protocol with arm connection management and full-duplex data transfer. SIGCOMM 1983: 38-48 - [e1]David C. Wood, Simon S. Lam:
Proceedings of the symposium on Communications Architectures & Protocols, SIGCOMM 1983, Austin, Texas, USA, March 8-9, 1983. ACM 1983, ISBN 978-0-89791-089-7 [contents] - 1982
- [j18]Simon S. Lam:
Dynamic Scaling and Growth Behavior of Queuing Network Normalization Constants. J. ACM 29(2): 492-513 (1982) - [j17]Johnny W. Wong, Simon S. Lam:
Queuing network models of packet switching networks part 1: Open networks. Perform. Evaluation 2(1): 9-21 (1982) - [j16]Simon S. Lam, Johnny W. Wong:
Queueing network models of packet switching networks part 2: Networks with population size constraints. Perform. Evaluation 2(3): 161-180 (1982) - [c9]A. Udaya Shankar, Simon S. Lam:
On Time-Dependent Communication Protocols and Their Projections. PSTV 1982: 215-235 - [c8]Simon S. Lam, A. Udaya Shankar:
An Illustration of Protocol Projections. PSTV 1982: 343-360 - [c7]Simon S. Lam, Luke Yeong-Chang Lien:
Optimal Routing in Networks With Flow-Controlled Virtual Channels. SIGMETRICS 1982: 38-46 - 1981
- [j15]Simon S. Lam, A. Udaya Shankar:
A derivation of response time distributions for a multi-class feedback queueing systems. Perform. Evaluation 1(1): 48-61 (1981) - [j14]Simon S. Lam:
Behavior of the normalization constant and a scaling technique for product-form queueing networks. Perform. Evaluation 1(1): 96 (1981) - [j13]Simon S. Lam, Luke Yeong-Chang Lien:
Congestion Control of Packet Communication Networks by Input Buffer Limits - A Simulation Study. IEEE Trans. Computers 30(10): 733-742 (1981) - [c6]Simon S. Lam, Luke Yeong-Chang Lien:
Modeling and analysis of flow controlled packet switching networks. SIGCOMM 1981: 98-107 - 1980
- [j12]Simon S. Lam:
A Carrier Sense Multiple Access Protocol for Local Networks. Comput. Networks 4: 21-32 (1980) - [j11]Simon S. Lam:
Packet Broadcast Networks - A Performance Analysis of the R-ALOHA Protocol. IEEE Trans. Computers 29(7): 596-603 (1980) - [c5]Simon S. Lam, A. Udaya Shankar:
Response time distributions for a multi-class queue with feedback. Performance 1980: 225-234
1970 – 1979
- 1979
- [j10]Simon S. Lam, Martin Reiser:
Congestion Control of Store-and-Forward Networks by Input Buffer Limits-An Analysis. IEEE Trans. Commun. 27(1): 127-134 (1979) - [j9]Simon S. Lam:
Satellite Packet Communication-Multiple Access Protocols and Performance. IEEE Trans. Commun. 27(10): 1456-1466 (1979) - [c4]Simon S. Lam:
A Study of the CSMA Protocol in Local Networks. Berkeley Workshop 1979: 141- - 1978
- [j8]Simon S. Lam:
A New Measure for Charcterizing Data Traffic. IEEE Trans. Commun. 26(1): 137-140 (1978) - 1977
- [j7]Simon S. Lam:
Queuing Networks with Population Size Constraints. IBM J. Res. Dev. 21(4): 370-378 (1977) - [j6]Simon S. Lam:
An Extension of Moore's Result for Closed Queuing Networks. IBM J. Res. Dev. 21(4): 384-387 (1977) - [j5]Simon S. Lam:
Delay Analysis of a Time Division Multiple Access (TDMA) Channel. IEEE Trans. Commun. 25(12): 1489-1494 (1977) - 1976
- [j4]Paul J. Schweitzer, Simon S. Lam:
Buffer Overflow in a Store-and-Forward Network Node. IBM J. Res. Dev. 20(6): 542-550 (1976) - [j3]Simon S. Lam:
Store-and-Forward Buffer Requirements in a Packet Switching Network. IEEE Trans. Commun. 24(4): 394-403 (1976) - 1975
- [j2]Leonard Kleinrock, Simon S. Lam:
Packet Switching in a Multiaccess Broadcast Channel: Performance Evaluation. IEEE Trans. Commun. 23(4): 410-423 (1975) - [j1]Simon S. Lam, Leonard Kleinrock:
Packet Switching in a Multiaccess Broadcast Channel: Dynamic Control Procedures. IEEE Trans. Commun. 23(9): 891-904 (1975) - [c3]Simon S. Lam, Leonard Kleinrock:
Dynamic control schemes for a packet switched multi-access broadcast channel. AFIPS National Computer Conference 1975: 143-153 - 1973
- [c2]Simon S. Lam:
Computer data communication: Packet switching in a slotted satellite channel. ACM Annual Conference 1973 - [c1]Leonard Kleinrock, Simon S. Lam:
Packet-switching in a slotted satellite channel. AFIPS National Computer Conference 1973: 703-710
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint