# Alan G. Konheim

According to our database

^{1}, Alan G. Konheim## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### Homepage:

#### On csauthors.net:

## Bibliography

2016

Automated teller machines: their history and authentication protocols.

J. Cryptographic Engineering, 2016

2015

The Impetus to Creativity in Technology.

Cryptologia, 2015

2014

To Let Them Monitor or Not ... Perhaps that Is Not the Real Question [Commentary].

IEEE Technol. Soc. Mag., 2014

1997

Analyzing a Two-Stage Entry Monitor for High-Speed Networks.

Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996

Policing and traffic shaping at the user-network-interface (UNI).

Telecommunication Systems, 1996

Corrections to "Descendant Set: An Efficient Approach for the Analysis of Polling Systems".

IEEE Trans. Communications, 1996

The Sticky Buffer Flow Control for the ATM.

Perform. Eval., 1996

1994

Descendant set: an efficient approach for the analysis of polling systems.

IEEE Trans. Communications, 1994

An Analysis of a Class of Telecommunications Models.

Perform. Eval., 1994

1992

Efficient Analysis of Polling Systems.

Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1987

Padded Lists Revisited.

SIAM J. Comput., 1987

1984

Analysis of Integrated Voice/Data Multiplexing.

IEEE Trans. Communications, 1984

The Organ Pipe Permutation.

SIAM J. Comput., 1984

The Product Form for Sojourn Time Distributions in Cyclic Exponential Queues.

J. ACM, 1984

Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract).

Proceedings of the Advances in Cryptology, 1984

1982

Cryptanalysis of a Kryha Machine.

Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982

1981

Approximate Analysis of Exponential Queueing Systems with Blocking.

Acta Inf., 1981

A Sparse Table Implementation of Priority Queues.

Proceedings of the Automata, 1981

One-way Sequence for Transaction Verification.

Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981

1980

The IPS Cryptographic Programs.

IBM Systems Journal, 1980

1978

Finite Capacity Queuing Systems with Applications in Computer Modeling.

SIAM J. Comput., 1978

1977

Big Buckets Are (Are Not) Better!

J. ACM, 1977

1976

A Queueing Model with Finite Waiting Room and Blocking.

J. ACM, 1976

Queueing Model of a Multiprogrammed Computer System with a Jobqueue and a Fixed Number of Initiators.

Proceedings of the Modelling and Performance Evaluation of Computer Systems, 1976

1975

An Elementary Solution of the Queuing System G/G/1.

SIAM J. Comput., 1975

1974

Waiting Lines and Times in a System with Polling.

J. ACM, 1974

Priority Disciplines in a Loop System.

J. ACM, 1974

1973

Distributions of Queue Lengths and Waiting Times in a Loop with Two-Way Traffic.

J. Comput. Syst. Sci., 1973

A note on growing binary trees.

Discrete Mathematics, 1973

1972

A Note on Merging.

SIAM J. Comput., 1972

Service in a Loop System.

J. ACM, 1972

1971

Two-way traffic in loop service systems.

Networks, 1971

An Accessing Model.

J. ACM, 1971

1964

Linear and Nonlinear Methods in Pattern Classification.

IBM Journal of Research and Development, 1964