Alan G. Konheim
According to our database^{1},
Alan G. Konheim
authored at least 35 papers
between 1964 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:

at id.loc.gov

at dnb.info
On csauthors.net:
Bibliography
2019
Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology.
J. Cryptographic Engineering, 2019
2016
Automated teller machines: their history and authentication protocols.
J. Cryptographic Engineering, 2016
2015
The Impetus to Creativity in Technology.
Cryptologia, 2015
2014
To Let Them Monitor or Not ... Perhaps that Is Not the Real Question [Commentary].
IEEE Technol. Soc. Mag., 2014
1997
Analyzing a TwoStage Entry Monitor for HighSpeed Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
1996
Policing and traffic shaping at the usernetworkinterface (UNI).
Telecommunication Systems, 1996
Corrections to "Descendant Set: An Efficient Approach for the Analysis of Polling Systems".
IEEE Trans. Communications, 1996
The Sticky Buffer Flow Control for the ATM.
Perform. Eval., 1996
1994
Descendant set: an efficient approach for the analysis of polling systems.
IEEE Trans. Communications, 1994
An Analysis of a Class of Telecommunications Models.
Perform. Eval., 1994
1992
Efficient Analysis of Polling Systems.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992
1987
Padded Lists Revisited.
SIAM J. Comput., 1987
1984
Analysis of Integrated Voice/Data Multiplexing.
IEEE Trans. Communications, 1984
The Organ Pipe Permutation.
SIAM J. Comput., 1984
The Product Form for Sojourn Time Distributions in Cyclic Exponential Queues.
J. ACM, 1984
Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1984
1982
Cryptanalysis of a Kryha Machine.
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982
1981
Approximate Analysis of Exponential Queueing Systems with Blocking.
Acta Inf., 1981
A Sparse Table Implementation of Priority Queues.
Proceedings of the Automata, 1981
Oneway Sequence for Transaction Verification.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1980
The IPS Cryptographic Programs.
IBM Systems Journal, 1980
1978
Finite Capacity Queuing Systems with Applications in Computer Modeling.
SIAM J. Comput., 1978
1977
Big Buckets Are (Are Not) Better!
J. ACM, 1977
1976
A Queueing Model with Finite Waiting Room and Blocking.
J. ACM, 1976
Queueing Model of a Multiprogrammed Computer System with a Jobqueue and a Fixed Number of Initiators.
Proceedings of the Modelling and Performance Evaluation of Computer Systems, 1976
1975
An Elementary Solution of the Queuing System G/G/1.
SIAM J. Comput., 1975
1974
Waiting Lines and Times in a System with Polling.
J. ACM, 1974
Priority Disciplines in a Loop System.
J. ACM, 1974
1973
Distributions of Queue Lengths and Waiting Times in a Loop with TwoWay Traffic.
J. Comput. Syst. Sci., 1973
A note on growing binary trees.
Discrete Mathematics, 1973
1972
A Note on Merging.
SIAM J. Comput., 1972
Service in a Loop System.
J. ACM, 1972
1971
Twoway traffic in loop service systems.
Networks, 1971
An Accessing Model.
J. ACM, 1971
1964
Linear and Nonlinear Methods in Pattern Classification.
IBM Journal of Research and Development, 1964