Alan G. Konheim

According to our database1, Alan G. Konheim
  • authored at least 34 papers between 1964 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2016
Automated teller machines: their history and authentication protocols.
J. Cryptographic Engineering, 2016

2015
The Impetus to Creativity in Technology.
Cryptologia, 2015

2014
To Let Them Monitor or Not ... Perhaps that Is Not the Real Question [Commentary].
IEEE Technol. Soc. Mag., 2014

1997
Analyzing a Two-Stage Entry Monitor for High-Speed Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Policing and traffic shaping at the user-network-interface (UNI).
Telecommunication Systems, 1996

Corrections to "Descendant Set: An Efficient Approach for the Analysis of Polling Systems".
IEEE Trans. Communications, 1996

The Sticky Buffer Flow Control for the ATM.
Perform. Eval., 1996

1994
Descendant set: an efficient approach for the analysis of polling systems.
IEEE Trans. Communications, 1994

An Analysis of a Class of Telecommunications Models.
Perform. Eval., 1994

1992
Efficient Analysis of Polling Systems.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1987
Padded Lists Revisited.
SIAM J. Comput., 1987

1984
Analysis of Integrated Voice/Data Multiplexing.
IEEE Trans. Communications, 1984

The Organ Pipe Permutation.
SIAM J. Comput., 1984

The Product Form for Sojourn Time Distributions in Cyclic Exponential Queues.
J. ACM, 1984

Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1984

1982
Cryptanalysis of a Kryha Machine.
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982

1981
Approximate Analysis of Exponential Queueing Systems with Blocking.
Acta Inf., 1981

A Sparse Table Implementation of Priority Queues.
Proceedings of the Automata, 1981

One-way Sequence for Transaction Verification.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981

1980
The IPS Cryptographic Programs.
IBM Systems Journal, 1980

1978
Finite Capacity Queuing Systems with Applications in Computer Modeling.
SIAM J. Comput., 1978

1977
Big Buckets Are (Are Not) Better!
J. ACM, 1977

1976
A Queueing Model with Finite Waiting Room and Blocking.
J. ACM, 1976

Queueing Model of a Multiprogrammed Computer System with a Jobqueue and a Fixed Number of Initiators.
Proceedings of the Modelling and Performance Evaluation of Computer Systems, 1976

1975
An Elementary Solution of the Queuing System G/G/1.
SIAM J. Comput., 1975

1974
Waiting Lines and Times in a System with Polling.
J. ACM, 1974

Priority Disciplines in a Loop System.
J. ACM, 1974

1973
Distributions of Queue Lengths and Waiting Times in a Loop with Two-Way Traffic.
J. Comput. Syst. Sci., 1973

A note on growing binary trees.
Discrete Mathematics, 1973

1972
A Note on Merging.
SIAM J. Comput., 1972

Service in a Loop System.
J. ACM, 1972

1971
Two-way traffic in loop service systems.
Networks, 1971

An Accessing Model.
J. ACM, 1971

1964
Linear and Nonlinear Methods in Pattern Classification.
IBM Journal of Research and Development, 1964


  Loading...