From formal protocol specification towards automated performance prediction, Harry Rudin
@TechReport{ibm-rz-1233,
  author = 	 "Harry Rudin",
  title = 	 "From formal protocol specification towards automated
		  performance prediction",
  institution =  "IBM Research Division",
  year = 	 1983,
  number =	 "IBM Research Report: RZ 1233",
  note =	 "#44572"
}

Some user views of telecommunicaiton needs: A summary, Harry Rudin
@TechReport{ibm-rz-1251,
  author = 	 "Harry Rudin",
  title = 	 "Some user views of telecommunicaiton needs: A
		  summary",
  institution =  "IBM Research Division",
  year = 	 1983,
  number =	 "IBM Research Report: RZ 1251",
  note =	 "#45248"
}

File servers for network-based distributed systems: Updated version of RZ 1186, Liba Svobodova
@TechReport{ibm-rz-1258,
  author = 	 "Liba Svobodova",
  title = 	 "File servers for network-based distributed systems:
		  Updated version of RZ 1186",
  institution =  "IBM Research Division",
  year = 	 1983,
  number =	 "IBM Research Report: RZ 1258",
  note =	 "#45407"
}

Performance issues in local-area networks, Werner Bux
@TechReport{ibm-rz-1268,
  author = 	 "Werner Bux",
  title = 	 "Performance issues in local-area networks",
  institution =  "IBM Research Division",
  year = 	 1983,
  number =	 "IBM Reserch Report: RZ 1268",
  note =	 "#45715"
}

A stochastic approach to edge detection, Rainer F. Hauser
@TechReport{ibm-rz-1303,
  author = 	 "Rainer F. Hauser",
  title = 	 "A stochastic approach to edge detection",
  institution =  "IBM Research Division",
  year = 	 1984,
  number =	 "IBM Research Report: RZ 1303",
  note =         "47156" 
}

An informal overview of formal protocol specification, Harry Rudin
@TechReport{ibm-rz-1344,
  author = 	 "Harry Rudin",
  title = 	 "An informal overview of formal protocol
		  specification",
  institution =  "IBM Research Division",
  year = 	 1984,
  number =	 "IBM Research Report: RZ 1344",
  note =         "#48732"
}

Time in formal protocol specifications, Harry Rudin
@TechReport{ibm-rz-1349,
  author = 	 "Harry Rudin",
  title = 	 "Time in formal protocol specifications",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1349",
  note =         "#49212"
}

Client/Server model of distributed processing, Liba Svobodova
@TechReport{ibm-rz-1350,
  author = 	 "Liba Svobodova",
  title = 	 "Client/Server model of distributed processing",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1350"
  note =         "#49213"
}

Analysis of ARQ protocols in a multiprocess environment, P. S. Kritzinger
@TechReport{ibm-rz-1367,
  author = 	 "P. S. Kritzinger",
  title = 	 "Analysis of ARQ protocols in a multiprocess
		  environment",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1367",
  note =	 "#50063"
}

Predicting protocol performance from a meta-implementation, Jan R. Engelbrecht, Pieter S. Kritzinger and Harry Rudin
@TechReport{ibm-rz-1381,
  author = 	 "Jan R. Engelbrecht, Pieter S. Kritzinger and Harry
		  Rudin",
  title = 	 "Predicting protocol performance from a
		  meta-implementation",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1381",
  note =	 "#50544"
}

Architecture and usage of a host-coupled workstation, Dieter Gantenbein and Alistair Cockburn
@TechReport{ibm-rz-1382,
  author = 	 "Dieter Gantenbein and Alistair Cockburn",
  title = 	 "Architecture and usage of a host-coupled workstation",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1382",
  note =	 "#50545"
}

Engineering aspects for token-ring design,
@TechReport{ibm-rz-1383,
  author = 	 "H. Keller and H.R. M{\"{u}}ller",
  title = 	 "Engineering aspects for token-ring design",
  institution =  "IBM Research Division",
  year = 	 1985,
  key =		 "H. Keller and H.R. Muller",
  number =	 "IBM Research Report: RZ 1383",
  note =	 "#50547"
}

S/370-based color image acquisition and processing, A.P.J. Engbersen
@TechReport{ibm-rz-1390,
  author = 	 "A.P.J. Engbersen",
  title = 	 "S/370-based color image acquisition and processing",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1390",
  note =	 "#50672"
}

Computer-controlled scanning tunneling microscope, U.H. Bapst, H.R. Schindler, J. Schmid, H. Seitz, and H. Steinauer
@TechReport{ibm-rz-1398,
  author = 	 "U.H. Bapst, H.R. Schindler, J. Schmid, H. Seitz, and
		  H. Steinauer",
  title = 	 "Computer-controlled scanning tunneling microscope",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1398",
  note =	 "#51013"
}

Overlay optical-fiber local-area network,
@TechReport{ibm-rz-1407,
  author = 	 "H. Keller, H.R. M{\"{u}}ller, E.H. Rothauser, E.A.
		  Zurgluh",
  title = 	 "Overlay optical-fiber local-area network",
  institution =  "IBM Research Division",
  year = 	 1985,
  key =		 "H.R. Muller",
  number =	 "IBM Research Report: RZ 1407",
  note =	 "#51183"
}

Communication-system models embedded in the OSI-refference model, a survey, Martin Reser
@TechReport{ibm-rz-1408,
  author = 	 "Martin Reser",
  title = 	 "Communication-system models embedded in the
		  OSI-refference model, a survey",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1408",
  note =	 "#51184"
}

Trends in computer communications, Harry Rudin
@TechReport{ibm-rz-1437,
  author = 	 "Harry Rudin",
  title = 	 "Trends in computer communications",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1437",
  note =	 "#52140"
}

A binary image preprocessor for document quality improvement and data reduction, Friendrich M. Wahl
@TechReport{ibm-rz-1438,
  author = 	 "Friendrich M. Wahl",
  title = 	 "A binary image preprocessor for document quality
		  improvement and data reduction",
  institution =  "IBM Research Division",
  year = 	 1985,
  number =	 "IBM Research Report: RZ 1438",
  note =	 "#52141"
}

A coded-light approach for 3-dimensional (3D) vision, Friedrich M. Wahl
@TechReport{ibm-rz-1452,
  author = 	 "Friedrich M. Wahl",
  title = 	 "A coded-light approach for 3-dimensional (3D) vision",
  institution =  "IBM Research Division",
  year = 	 1984,
  number =	 "IBM Research Report: RZ 1452",
  note =	 "#52546"
}

Understanding hough space for polyhedral scene decomposition, Hans-Peter Biland and Friedrich M. Wahl
@TechReport{ibm-rz-1458,
  author = 	 "Hans-Peter Biland and Friedrich M. Wahl",
  title = 	 "Understanding hough space for polyhedral scene
		  decomposition",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1458",
  note =	 "#52978"
}

Data/voice integration based on the IEEE 802.5 Token-Ring LAN,
@TechReport{ibm-rz-1463,
  author = 	 "P. Zafiropulo, H.R. M{\"{u}}ler and F. Closs",
  title = 	 "Data/voice integration based on the IEEE 802.5
		  Token-Ring LAN",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1463",
  note =	 "#53321"
}

An architecture for optimal 2-D signal processing, A.P.J. Engbersen
@TechReport{ibm-rz-1465,
  author = 	 "A.P.J. Engbersen",
  title = 	 "An architecture for optimal 2-D signal processing",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1465",
  note =	 "#53421"
}

Multiple-motion recognition with general Hough transform, Hans-Peter Biland
@TechReport{ibm-rz-1470,
  author = 	 "Hans-Peter Biland",
  title = 	 "Multiple-motion recognition with general Hough
		  transform",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1470",
  note =	 "#53619"
}

On matrix and parameter computation for geometrical vertex fitting of polyhedral objects in machine vision, Hans-Peter Biland
@TechReport{ibm-rz-1473,
  author = 	 "Hans-Peter Biland",
  title = 	 "On matrix and parameter computation for geometrical
		  vertex fitting of polyhedral objects in machine
		  vision",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1473",
  note =	 "#53723"
}

Polyhedral object recognition using Hough-space features, Jan R. Engelbrecht and Friendrich M. Wahl
@TechReport{ibm-rz-1486,
  author = 	 "Jan R. Engelbrecht and Friendrich M. Wahl",
  title = 	 "Polyhedral object recognition using Hough-space
		  features",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1486",
  note =	 "#54038"
}

Decomposition of polyhedral scenes in Hough space, Friedrich M. Wahl and Hans-Peter Biland
@TechReport{ibm-rz-1492,
  author = 	 "Friedrich M. Wahl and Hans-Peter Biland",
  title = 	 "Decomposition of polyhedral scenes in Hough space",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1492",
  note =	 "#54192"
}

The dimension of time in protocol specification, Harry Rudin
@TechReport{ibm-rz-1496,
  author = 	 "Harry Rudin",
  title = 	 "The dimension of time in protocol specification",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1496",
  note =	 "#54373"
}

Communication support for distributed processing: Design and implementation issues, L. Svobodova
@TechReport{ibm-rz-1501,
  author = 	 "L. Svobodova",
  title = 	 "Communication support for distributed processing:
		  Design and implementation issues",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1501",
  note =	 "#54421"
}

Local-Area Network reliability models, J.D. Spragins
@TechReport{ibm-rz-1518,
  author = 	 "J.D. Spragins",
  title = 	 "Local-Area Network reliability models",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1518",
  note =	 "#54705"
}

OSI communication services in a local area network, L. Svobodova, O. Drobnik
@TechReport{ibm-rz-1522,
  author = 	 "L. Svobodova, O. Drobnik",
  title = 	 "OSI communication services in a local area network",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1522",
  note =	 "#54850"
}

Tools for protocols driven by formal specifications, Harry Rudin
@TechReport{ibm-rz-1525,
  author = 	 "Harry Rudin",
  title = 	 "Tools for protocols driven by formal specifications",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1525",
  note =	 "#54896"
}

A performance study of the ISO transport protocol, Bernd Meister
@TechReport{ibm-rz-1539,
  author = 	 "Bernd Meister",
  title = 	 "A performance study of the ISO transport protocol",
  institution =  "IBM Research Division",
  year = 	 1986,
  number =	 "IBM Research Report: RZ 1539",
  note =	 "#55301"
}

Estimating volumina of polyhedra from single 2D views, Hans-Peter Biland
@TechReport{ibm-rz-1564,
  author = 	 "Hans-Peter Biland",
  title = 	 "Estimating volumina of polyhedra from single 2D
		  views",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1564",
  note =	 "#56542"
}

Tree-forming reversible routes in communication networks, Alistair A.R. Cockburn
@TechReport{ibm-rz-1568,
  author = 	 "Alistair A.R. Cockburn",
  title = 	 "Tree-forming reversible routes in communication
		  networks",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1568",
  note =	 "#56602"
}

Adding transparent internetworking to a LAN application interface, Philippe A. Janson and Alistair R. Cockburn
@TechReport{ibm-rz-1577,
  author = 	 "Philippe A. Janson and Alistair R. Cockburn",
  title = 	 "Adding transparent internetworking to a LAN
		  application interface",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1577",
  note =	 "#57027"
}

OSI internetworking in a heterogeneous LAN and wan envitonment, Dieter Gantenbein, Willi Stoll, Martin Zieher
@TechReport{ibm-rz-1585,
  author = 	 "Dieter Gantenbein, Willi Stoll, Martin Zieher",
  title = 	 "OSI internetworking in a heterogeneous LAN and wan
		  envitonment",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1585",
  note =	 "#57297"
}

An investigation of the FDDI media access control protocol, Doug Dykeman and Werner Bux
@TechReport{ibm-rz-1591,
  author = 	 "Doug Dykeman and Werner Bux",
  title = 	 "An investigation of the FDDI media access control
		  protocol",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1591",
  note =	 "#57526"
}

Efiicient implementation of the OSI transport-protocol checksum slgorithm using 8/16-bit arithmetic, Alistair A.R. Cockburn
@TechReport{ibm-rz-1601,
  author = 	 "Alistair A.R. Cockburn",
  title = 	 "Efiicient implementation of the OSI
		  transport-protocol checksum slgorithm using 8/16-bit
		  arithmetic",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1601",
  note =	 "#57902"
}

SOS - For handling correspondence, Harry Rudin
@TechReport{ibm-rz-1614,
  author = 	 "Harry Rudin",
  title = 	 "SOS - For handling correspondence",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1614",
  note =	 "#58366"
}

Timers in OSI protocols - Specification versus implementation, Eduard Mumprecht, Dieter Gantenbein and Rainer Hauser
@TechReport{ibm-rz-1620,
  author = 	 "Eduard Mumprecht, Dieter Gantenbein and Rainer Hauser",
  title = 	 "Timers in OSI protocols - Specification versus
		  implementation",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1620",
  note =	 "#58597"
}

Stepwise specification of a sliding window protocol by means of process algebra,
@TechReport{ibm-rz-1625,
  author = 	 "G{\"{u}}nter Karjoth",
  title = 	 "Stepwise specification of a sliding window protocol
		  by means of process algebra",
  institution =  "IBM Research Division",
  year = 	 1987,
  key =		 "Gunter Karjoth",
  number =	 "IBM Research Report: RZ 1625",
  note =	 "#58864"
}

Design of a measuement instrument for distributed systems, Marc Abrams
@TechReport{ibm-rz-1639,
  author = 	 "Marc Abrams",
  title = 	 "Design of a measuement instrument for distributed
		  systems",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1639",
  note =	 "#59251"
}

Interconnecting heterogeneous netoworks to OSI with a global naming scheme and gateway address mapping, Stefano Zatti and Philippe Janson
@TechReport{ibm-rz-1651,
  author = 	 "Stefano Zatti and Philippe Janson",
  title = 	 "Interconnecting heterogeneous netoworks to OSI with
		  a global naming scheme and gateway address mapping",
  institution =  "IBM Research Division",
  year = 	 1987,
  number =	 "IBM Research Report: RZ 1651"
}

Internetwork naming, addressing, and directory sytems: Towards a global OSi context, Stefano Zatti, Philippe Janson
@TechReport{ibm-rz-1669,
  author = 	 "Stefano Zatti, Philippe Janson",
  title = 	 "Internetwork naming, addressing, and directory
		  sytems: Towards a global OSi context",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1669",
  note =	 "#60534"
}

OSI-internetworking: Realization and performance analysis, Martin Zieher, Willi Stoll
@TechReport{ibm-rz-1672,
  author = 	 "Martin Zieher, Willi Stoll",
  title = 	 "OSI-internetworking: Realization and performance
		  analysis",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1672",
  note =	 "#60959"
}

Protocol test tools and test methods, Willi Stoll
@TechReport{ibm-rz-1673,
  author = 	 "Willi Stoll",
  title = 	 "Protocol test tools and test methods",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1673",
  note =	 "#60960"
}

OSI communication services in a heterogeneous envitonment, O. Drobnik
@TechReport{ibm-rz-1674,
  author = 	 "O. Drobnik",
  title = 	 "OSI communication services in a heterogeneous
		  envitonment",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1674",
  note =	 "#60961"
}

Automatic configuration of fiber-based local-area networks, E.A. Zurfluh and H.R. Mueller
@TechReport{ibm-rz-1697,
  author = 	 "E.A. Zurfluh and H.R. Mueller",
  title = 	 "Automatic configuration of fiber-based local-area
		  networks",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1697",
  note =	 "#61614"
}

Gbit-s serializer/deserializer subsystem for GaAs large-scale optoelectronic integration, F. R. Gfeller
@TechReport{ibm-rz-1699,
  author = 	 "F. R. Gfeller",
  title = 	 "Gbit-s serializer/deserializer subsystem for GaAs
		  large-scale optoelectronic integration",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1699",
  note =	 "#61616"
}

Implementing OSI systems, Kuba Svobodova
@TechReport{ibm-rz-1715,
  author = 	 "Kuba Svobodova",
  title = 	 "Implementing OSI systems",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1715",
  note =	 "#62131"
}

Token-ring local-area networks and their performance, Werner Bux
@TechReport{ibm-rz-1748,
  author = 	 "Werner Bux",
  title = 	 "Token-ring local-area networks and their performance",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1748",
  note =	 "#63131"
}

LAN/ISDN interconnect via frame relay, Dieter Jaepel and Erich Port
@TechReport{ibm-rz-1755,
  author = 	 "Dieter Jaepel and Erich Port",
  title = 	 "LAN/ISDN interconnect via frame relay",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1755",
  note =	 "#63138"
}

Workstation Support at the IBM Zurich Research Laboratory, Moshe E. Rappoport
@TechReport{ibm-rz-1762,
  author = 	 "Moshe E. Rappoport",
  title = 	 "Workstation Support at the IBM Zurich Research
		  Laboratory",
  institution =  "IBM Research Division",
  year = 	 1988,
  number =	 "IBM Research Report: RZ 1762",
  note =	 "#63653"
}

Contactless high-speed waveform measurements on GaAs integrated circuits with the photoemission sampling technique, H.K. Seitz, A. Blacha, R. Clauberg, H. Beha, J. Feder
@TechReport{ibm-rz-1788,
  author = 	 "H.K. Seitz, A. Blacha, R. Clauberg, H. Beha, J. Feder",
  title = 	 "Contactless high-speed waveform measurements on GaAs
		  integrated circuits with the photoemission sampling
		  technique",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1788",
  note =	 "#64280"
}

A survey of modern high-performance switching techniques, Hamid Ahmadi and Wolfgang E. Denzel
@TechReport{ibm-rz-1795,
  author = 	 "Hamid Ahmadi and Wolfgang E. Denzel",
  title = 	 "A survey of modern high-performance switching
		  techniques",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1795",
  note =	 "#64497"
}

Measured performance of transport service in LANs, Liba Svobodova
@TechReport{ibm-rz-1799,
  author = 	 "Liba Svobodova",
  title = 	 "Measured performance of transport service in LANs",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1799",
  note =	 "#64663"
}

Including a queue in a formal-description-driven protocol performance analysis, Jan Gustafsson and Harry Rudin
@TechReport{ibm-rz-1800,
  author = 	 "Jan Gustafsson and Harry Rudin",
  title = 	 "Including a queue in a formal-description-driven
		  protocol performance analysis",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1800",
  note =	 "#64664"
}

Protocol validation in complex systems, Colin H. West
@TechReport{ibm-rz-1863,
  author = 	 "Colin H. West",
  title = 	 "Protocol validation in complex systems",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1863",
  note =	 "#66415"
}

Efficient and fair multiplexing in Occam, Mathias Kaiserswerth and Jan Pachl
@TechReport{ibm-rz-1867,
  author = 	 "Mathias Kaiserswerth and Jan Pachl",
  title = 	 "Efficient and fair multiplexing in Occam",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1867",
  note =	 "#66609"
}

Priority scheduling in multiaccess communication, Luis F. M. de Moraes
@TechReport{ibm-rz-1886,
  author = 	 "Luis F. M. de Moraes",
  title = 	 "Priority scheduling in multiaccess communication",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1886",
  note =	 "#66919"
}

A two-stage system operating as an M/G/1 queue, Ilias Iliadis
@TechReport{ibm-rz-1889,
  author = 	 "Ilias Iliadis",
  title = 	 "A two-stage system operating as an M/G/1 queue",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1889",
  note =	 "#67922"
}

A generalization of matrix geometric solutions for Markov models, Jean-Yves Le Boudec
@TechReport{ibm-rz-1903,
  author = 	 "Jean-Yves Le Boudec",
  title = 	 "A generalization of matrix geometric solutions for
		  Markov models",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1903",
  note =	 "#67353"
}

Fairness, priority and predictability of the DQDB Mac protocol under heavy load, Harmen R. van As, Pitro Zafiropulo, Johnny W. Wong
@TechReport{ibm-rz-1929,
  author = 	 "Harmen R. van As, Pitro Zafiropulo, Johnny W. Wong",
  title = 	 "Fairness, priority and predictability of the DQDB
		  Mac protocol under heavy load",
  institution =  "IBM Research Division",
  year = 	 1989,
  number =	 "IBM Research Report: RZ 1929",
  note =	 "#68259"
}

On LANs and MANs: an evolution from Mbit/s to Gbit/s, Pitro Zafiropulo
@TechReport{ibm-rz-1968,
  author = 	 "Pitro Zafiropulo",
  title = 	 "On LANs and MANs: an evolution from Mbit/s to Gbit/s",
  institution =  "IBM Research Division",
  year = 	 1990,
  number =	 "IBM Research Report: RZ 1968",
  note =	 "#69550"
}

Specification requirements for computer-Aided system engineering tools, R.P. Luijten
@TechReport{ibm-rz-2026,
  author = 	 "R.P. Luijten",
  title = 	 "Specification  requirements for computer-Aided
		  system engineering tools",
  institution =  "IBM Research Division",
  year = 	 1990,
  number =	 "IBM Research Report: RZ 2026",
  note =	 "#71694"
}

Using symbolic links and name resolution of distributed file systems to improve version management and to optimize access, R.C. Hauser and A. Tanner
@TechReport{ibm-rz-2748,
  author = 	 "R.C. Hauser and A. Tanner",
  title = 	 "Using symbolic links and name resolution of
		  distributed file systems to improve version 
                  management and to optimize access",
  institution =  "IBM Research Division",
  year = 	 1995,
  number =	 "IBM Research Report: RZ 2748",
  note =	 "#88852"
}

Implementing OSI agents for TMN, M. Feridun, L. Heusler and R. Nielsen
@TechReport{ibm-rz-2759,
  author = 	 "M. Feridun, L. Heusler and R. Nielsen",
  title = 	 "Implementing OSI agents for TMN",
  institution =  "IBM Research Division",
  year = 	 1995,
  number =	 "IBM Research Report: RZ 2759",
  note =	 "#89237"
}

Design of a V.34 modem for a real-time multitasking DSP operating system, Fredy D. Neeser, Malcom S. Ware
@TechReport{ibm-rz-2764,
  author = 	 "Fredy D. Neeser, Malcom S. Ware",
  title = 	 "Design of a V.34 modem for a real-time multitasking
		  DSP operating system",
  institution =  "IBM Research Division",
  year = 	 1995,
  number =	 "IBM Research Report: RZ 2764",
  note =	 "#89242"
}

Evaluation of a start-stop protocol for ABR traffic in ATM networks, I. Iliadis, R. Marie
@TechReport{ibm-rz-2771,
  author = 	 "I. Iliadis, R. Marie",
  title = 	 "Evaluation of a start-stop protocol for ABR traffic
		  in ATM networks",
  institution =  "IBM Research Division",
  year = 	 1995,
  number =	 "IBM Research Report: RZ 2771",
  note =	 "#89249"
}

Mobile user devices and security modeules: Design for trustworthiness, Andreas Phitzmann, Birgit Phitzmann, Matthias Schunter, michael Waidner
@TechReport{ibm-rz-2784,
  author = 	 "Andreas Phitzmann, Birgit Phitzmann, Matthias
		  Schunter, michael Waidner",
  title = 	 "Mobile user devices and security modeules: Design
		  for trustworthiness",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2784",
  note =	 "#89262"
}

Surfin' network resources across the Web, Luca Deri
@TechReport{ibm-rz-2786,
  author = 	 "Luca Deri",
  title = 	 "Surfin' network resources across the Web",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2786",
  note =	 "#89264"
}

Abstract factory revisited, Bela Ban, Luca Deri
@TechReport{ibm-rz-2787,
  author = 	 "Bela Ban, Luca Deri",
  title = 	 "Abstract factory revisited",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2787",
  note =	 "#89265"
}

Towards and object-oriented framework for multi-domain management, Bela Ban
@TechReport{ibm-rz-2789,
  author = 	 "Bela Ban",
  title = 	 "Towards and object-oriented framework for
		  multi-domain management",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2789",
  note =	 "#89267"
}

Micro-payments based on iKP, Ralf Hauser, Michael Steiner, and Michael Waidner
@TechReport{ibm-rz-2791,
  author = 	 "Ralf Hauser, Michael Steiner, and Michael Waidner",
  title = 	 "Micro-payments based on iKP",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2791",
  note =	 "#89269"
}

Zurich iKP Prototype (ZIP) : Protocol specification, G. Tsudik
@TechReport{ibm-rz-2792,
  author = 	 "G. Tsudik",
  title = 	 "Zurich iKP Prototype (ZIP) : Protocol specification",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2792",
  note =	 "#89270"
}

Droplets: Breaking monolithic applications apart, L. Deri
@TechReport{ibm-rz-2799,
  author = 	 "L. Deri",
  title = 	 "Droplets: Breaking monolithic applications apart",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2799",
  note =	 "#89277"
}

An extension of the HTTP authentication scheme to support server groups, A. Hutchison, M. Kaiserswerth, P. Trommler
@TechReport{ibm-rz-2811,
  author = 	 "A. Hutchison, M. Kaiserswerth, P. Trommler",
  title = 	 "An extension of the HTTP authentication scheme to
		  support server groups",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2811",
  note =	 "#90114"
}

Secure World Wide Web access to server groups, A. Hutchison, Kaiserswerth, P. Trommler
@TechReport{ibm-rz-2812,
  author = 	 "A. Hutchison, Kaiserswerth, P. Trommler",
  title = 	 "Secure World Wide Web access to server groups",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2812",
  note =	 "#90115"
}

A CORBA-based model for distributed applications management, A. Schade, P. Trommler
@TechReport{ibm-rz-2813,
  author = 	 "A. Schade, P. Trommler",
  title = 	 "A CORBA-based model for distributed applications management",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2813",
  note =	 "#90116"
}

Properties of payment systems: General definition sketch and classification, Birgit Pfitzmann, Michael Waidner
@TechReport{ibm-rz-2823,
  author = 	 "Birgit Pfitzmann, Michael Waidner",
  title = 	 "Properties of payment systems: General definition
		  sketch and classification",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2823",
  note =	 "#90126"
}

Network management for the 90s, Luca Deri
@TechReport{ibm-rz-2825,
  author = 	 "Luca Deri",
  title = 	 "Network management for the 90s",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2825",
  note =	 "#90128"
}

Extending Corba for multi-domain management, Bela Ban
@TechReport{ibm-rz-2827,
  author = 	 "Bela Ban",
  title = 	 "Extending Corba for multi-domain management",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2827",
  note =	 "#90130"
}

Models and tools for quantitative assessment of operational security, M. Dacier, Y. Deswarte and M. Ka\^aniche
@TechReport{ibm-rz-2835,
  author = 	 "M. Dacier, Y. Deswarte and M. Ka{\^{a}}niche",
  title = 	 "Models and tools for quantitative assessment of
		  operational security",
  institution =  "IBM Research Division",
  year = 	 1996,
  key =		 "M. Dacier, Y. Deswarte and M. Kaaniche",
  number =	 "IBM Research Report: RZ 2835",
  note =	 "#90138"
}

A high-speed self-similar ATM traffic generator including traffic parameters, Patrick Droz, Jean-Yves Le Boudec
@TechReport{ibm-rz-2854
  author = 	 "Patrick Droz, Jean-Yves Le Boudec",
  title = 	 "A high-speed self-similar ATM traffic generator
		  including traffic parameters",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2854",
  note =         "#90802"
}

Traffic estimating and bandwidth allocation based on periodical wavelet analyses, Patrick Droz
@TechReport{ibm-rz-2856,
  author = 	 "Patrick Droz",
  title = 	 "Traffic estimating and bandwidth allocation based on
		  periodical wavelet analyses",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2856",
  note =	 "#90804"
}

Asymmetric fingerprinting for larger collusions, Birgit Pfitzmann, Michael Waidner
@TechReport{ibm-rz-2857,
  author = 	 "Birgit Pfitzmann, Michael Waidner",
  title = 	 "Asymmetric fingerprinting for larger collusions",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2857",
  note =	 "#90805"
}

Optimistic protocols for fair exchange, N. Asokan, Matthias Schunter, Michael Waidner
@TechReport{ibm-rz-2858,
  author = 	 "N. Asokan, Matthias Schunter, Michael Waidner",
  title = 	 "Optimistic protocols for fair exchange",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2858",
  note =	 "#90806"
}

Performance of TCP traffic and ATM feedback congestion control mechanisms, Ilias Iliadis
@TechReport{ibm-rz-2860,
  author = 	 "Ilias Iliadis",
  title = 	 "Performance of TCP traffic and ATM feedback
		  congestion control mechanisms",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2860",
  note =	 "#90808"
}

Towards multi-domain integrated network management for ATM and SDH networks, A. Galis, D. Gantenbein, S. Covaci, C. Bianza, F. Karayannis, G. Mykoniatis
@TechReport{ibm-rz-2864,
  author = 	 "A. Galis, D. Gantenbein, S. Covaci, C. Bianza,
		  F. Karayannis, G. Mykoniatis",
  title = 	 "Towards multi-domain integrated network management
		  for ATM and SDH networks",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2864",
  note =	 "#90812"
}

An event framework for CORBA-based monitoring and management systems, A. Schade
@TechReport{ibm-rz-2868,
  author = 	 "A. Schade",
  title = 	 "An event framework for CORBA-based monitoring and
		  management systems",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2868",
  note =	 "#90816"
}

Anonymous fingerprinting, Birgit Pfitzmann, Michael Waidner
@TechReport{ibm-rz-2881,
  author = 	 "Birgit Pfitzmann, Michael Waidner",
  title = 	 "Anonymous fingerprinting",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2881",
  note =	 "#90829"
}

Information-theoretic pseudosignatures and Byzantine agreement for t\b>n/3, Birgit Pfitzmann, Michael Waidner
@TechReport{ibm-rz-2882,
  author = 	 "Birgit Pfitzmann, Michael Waidner",
  title = 	 "Information-theoretic pseudosignatures and Byzantine 
		  agreement for t{\b{>}}n/3",
  institution =  "IBM Research Division",
  year = 	 1996,
  key =          "Information-theoretic pseudosignatures and Byzantine 
		  agreement for t> n/3",
  number =	 "IBM Research Report: RZ 2882",
  note =	 "#90830"
}

File transfers over the GSM network, Dietrich Maiwald and Chahram Zolfaghari
@TechReport{ibm-rz-2883,
  author = 	 "Dietrich Maiwald and Chahram Zolfaghari",
  title = 	 "File transfers over the GSM network",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2883",
  note =	 "#90831"
}

Efficient support structures for distributed computing, E. Rothauser, et. al.
@TechReport{ibm-rz-2887,
  author = 	 "E. Rothauser, et. al.",
  title = 	 "Efficient support structures for distributed
		  computing",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2887",
  note =	 "#90835"
}

Static vs. dynamic CMIP/SNMP network management usign CORBA, L. Deri and B. Ban
@TechReport{ibm-rz-2888,
  author = 	 "L. Deri and B. Ban",
  title = 	 "Static vs. dynamic CMIP/SNMP network management
		  usign CORBA",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2888",
  note =	 "#90836"
}

VRML: adding 3D to network management, L. Deri, D. Manikis
@TechReport{ibm-rz-2889,
  author = 	 "L. Deri, D. Manikis",
  title = 	 "VRML: adding 3D to network management",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2889",
  note =	 "#90837"
}

Electronic payment systems, N. Asokan, Phil Janson, Michael Steiner, Mchael Waidner
@TechReport{ibm-rz-2890,
  author = 	 "N. Asokan, Phil Janson, Michael Steiner, Mchael Waidner",
  title = 	 "Electronic payment systems",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2890",
  note =	 "#91033"
}

Designing a generic payment service, J.L. Abad-Peiro, N. Asokan, Michael Steiner, Michael Waidner
@TechReport{ibm-rz-2891,
  author = 	 "J.L. Abad-Peiro, N. Asokan, Michael Steiner, Michael 
		  Waidner",
  title = 	 "Designing a generic payment service",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2891",
  note =	 "#90839"
}

Optimistic protocols for multi-party fair exchange, N. Asokan, Matthias Schunter, Michael Waidner
@TechReport{ibm-rz-2892,
  author = 	 "N. Asokan, Matthias Schunter, Michael Waidner",
  title = 	 "Optimistic protocols for multi-party fair exchange",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2892",
  note =	 "#90840"
}

Analysis of authorization in CORBA security, G. Karjoth
@TechReport{ibm-rz-2894,
  author = 	 "G. Karjoth",
  title = 	 "Analysis of authorization in CORBA security",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2894",
  note =	 "#90842"
}

Yasmin: a component-based architecture for software applications, L. Deri
@TechReport{ibm-rz-2899,
  author = 	 "L. Deri",
  title = 	 "Yasmin: a component-based architecture for software 
		  applications",
  institution =  "IBM Research Division",
  year = 	 1996,
  number =	 "IBM Research Report: RZ 2899",
  note =	 "#90847"
}

Using interception to create domains in distributed systems, Y. Hoffner, B. Crawford
@TechReport{ibm-rz-2906,
  author = 	 "Y. Hoffner, B. Crawford",
  title = 	 "Using interception to create domains in distributed systems",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2906",
  note =	 "#91501"
}

Automatic generation of bridging code for accessing C++ from Java, A. Schade
@TechReport{ibm-rz-2912,
  author = 	 "A. Schade",
  title = 	 "Automatic generation of bridging code for accessing
		  C++ from Java",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2912",
  note =	 "#91507"
}

Rapid network management application development, L. Deri,
@TechReport{ibm-rz-2915,
  author = 	 "L. Deri,",
  title = 	 "Rapid network management application development",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2915",
  note =	 "#91510"
}

Archiving agents for the World Wide Web,
@TechReport{ibm-rz-2940,
  author = 	 "Christoph Br{\"{a}}ndi and Harry Rudin",
  title = 	 "Archiving agents for the World Wide Web",
  institution =  "IBM Research Division",
  year = 	 1997,
  key =		 "Christoph Brandi",
  number =	 "IBM Research Report: RZ 2940",
  note =	 "#91535"
}

Performance of TCP traffic and ABR congestion control mechanisms, Ilias Iliadis and Daniel Orsatti
@TechReport{ibm-rc-2946,
  author = 	 "Ilias Iliadis and Daniel Orsatti",
  title = 	 "Performance of TCP traffic and ABR congestion
		  control mechanisms",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2946",
  note =	 "#91541"
}

Network access technologies-an overview, Gottfried Ungerboeck
@TechReport{ibm-rz-2954,
  author = 	 "Gottfried Ungerboeck",
  title = 	 "Network access technologies-an overview",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2954",
  note =	 "#93000"
}

Video compression adapted for tranmission on ATM networks, P. Scotton and C. Galand and J. M\'enez
@TechReport{ibm-rz-2958,
  author = 	 "P. Scotton and C. Galand and J. M{\'{e}}nez",
  title = 	 "Video compression adapted for tranmission on ATM networks",
  institution =  "IBM Research Division",
  year = 	 1997,
  key =		 "J. Menez",
  number =	 "IBM Research Report: RZ 2958",
  note =	 "#93004"
}

A generic management model for CORBA, CMIP and SNMP, B. Ban
@TechReport{ibm-rz-2962,
  author = 	 "B. Ban",
  title = 	 "A generic management model for CORBA, CMIP and SNMP",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2962",
  note =	 "#93008"
}

How to break fraud-detectable key recovery, Birgit Pfitzmann and Michael Waidner
@TechReport{ibm-rz-2970,
  author = 	 "Birgit Pfitzmann and Michael Waidner",
  title = 	 "How to break fraud-detectable key recovery",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2970",
  note =	 "#93016"
}

Optimistic fair exchange of digital signatures, N. Asokan and Victor Shoup and Michael Waidner
@TechReport{ibm-rz-2973,
  author = 	 "N. Asokan and Victor Shoup and Michael Waidner",
  title = 	 "Optimistic fair exchange of digital signatures",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2973"
}

Securing threshold cryptosystems against chosen ciphertext attack, V. Shoup and R. Gennaro
@TechReport{ibm-rz-2974,
  author = 	 "V. Shoup and R. Gennaro",
  title = 	 "Securing threshold cryptosystems against chosen
		  ciphertext attack",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2974",
  note =	 "#93020"
}

Agent-based multicast routing,
@TechReport{ibm-rz-2975,
  author = 	 "Stefan G. Hild and J{\"{o}}rg H. Bischof",
  title = 	 "Agent-based multicast routing",
  institution =  "IBM Research Division",
  year = 	 1997,
  key =          "Jorg H. Bischof"
  number =	 "IBM Research Report: RZ 2975",
  note =	 "#93021"
}

Asynchronous protocols for optimistic fair exchange, N. Asokan and Victor Shoup and Michael Waidner
@TechReport{ibm-rz-2976,
  author = 	 "N. Asokan and Victor Shoup and Michael Waidner",
  title = 	 "Asynchronous protocols for optimistic fair exchange",
  institution =  "IBM Research Division",
  year = 	 1997,
  number =	 "IBM Research Report: RZ 2976",
  note =	 "#93022"
}

Analysis framework of complex service performance for electronic commerce, Heiko Ludwig
@TechReport{ibm-rz-3025,
  author = 	 "Heiko Ludwig",
  title = 	 "Analysis framework of complex service performance
		  for electronic commerce",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3025",
  note =	 "#93071"
}

Fairness in electronic commerce, N. Asokan
@TechReport{ibm-rz-3027,
  author = 	 "N. Asokan",
  title = 	 "Fairness in electronic commerce",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3027",
  note =	 "#93073"
}

Impact of VC merging on buffer requirements in ATM networks, Andreas L. Schmid and Ilias Iliadis and Patrick Droz
@TechReport{ibm-rz-3029,
  author = 	 "Andreas L. Schmid and Ilias Iliadis and Patrick Droz",
  title = 	 "Impact of VC merging on buffer requirements in ATM networks",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3029",
  note =	 "#93075"
}

Towards a taxonomy of intrusion-detection systems, Herv\'e Debar and Marc Dacier and Andreas Wespi
@TechReport{ibm-rz-3030,
  author = 	 "Herv{\'{e}} Debar and Marc Dacier and Andreas Wespi",
  title = 	 "Towards a taxonomy of intrusion-detection systems",
  institution =  "IBM Research Division",
  year = 	 1998,
  key =          "Herve Debar",
  number =	 "IBM Research Report: RZ 3030",
  note =	 "#93076"
}

The OpenCard Framework, Reto Hermann and Dirk Husemann and Peter Trommler
@TechReport{ibm-rz-3034,
  author = 	 "Reto Hermann and Dirk Husemann and Peter Trommler",
  title = 	 "The OpenCard Framework",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3034",
  note =	 "#93080"
}

Making electronic commerce easier to use with novel user interfaces, Jos\'e L. Abad-Peiro and Patrick Steiger
@TechReport{ibm-rz-3035,
  author = 	 "Jos{\'{e}} L. Abad-Peiro and Patrick Steiger",
  title = 	 "Making electronic commerce easier to use with novel 
		  user interfaces",
  institution =  "IBM Research Division",
  year = 	 1998,
  key =          "Jose L. Abad-Peiro",
  number =	 "IBM Research Report: RZ 3035",
  note =	 "#93081"
}

Termination handling in inter-organisational workflows - an exception management approach -, H. Ludwig
@TechReport{ibm-rz-3042,
  author = 	 "H. Ludwig",
  title = 	 "Termination  handling in inter-organisational
		  workflows - an exception management approach -",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3042",
  note =	 "#93088"
}

PNNI clustering under node mobility in ATM networks, Ilias Iliadis and Paolo Scotton
@TechReport{ibm-rz-3050,
  author = 	 "Ilias Iliadis and Paolo Scotton",
  title = 	 "PNNI clustering under node mobility in ATM networks",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3050",
  note =	 "#93096"
}

Open issues in secure electronic commerce, Michael Waidner
@TechReport{ibm-rz-3070,
  author = 	 "Michael Waidner",
  title = 	 "Open issues in secure electronic commerce",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3070",
  note =	 "#93116"
}

Why chosen ciphertext security matters, Victor Shoup
@TechReport{ibm-rz-3076,
  author = 	 "Victor Shoup",
  title = 	 "Why chosen ciphertext security matters",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3076",
  note =	 "#93122"
}

Optimistic asynchronous multi-party contract signing, Birgit Baum-Waidner and Michael Waidner
@TechReport{ibm-rz-3078,
  author = 	 "Birgit Baum-Waidner and Michael Waidner",
  title = 	 "Optimistic asynchronous multi-party contract signing",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3078",
  note =	 "#93124"
}

Modeling customer service control using the CoCS approach, Heiko Ludwig
@TechReport{ibm-rz-3081,
  author = 	 "Heiko Ludwig",
  title = 	 "Modeling customer service control using the CoCS approach",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3081",
  note =	 "#93127"
}

Signature schemes based on the strong RSA Assumption, Victor Shoup and Ronald Cramer
@TechReport{ibm-rz-3083,
  author = 	 "Victor Shoup and Ronald Cramer",
  title = 	 "Signature schemes based on the strong RSA Assumption",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3083",
  note =	 "#93129"
}

A single-chip lossless 16x16 switch fabric with 28 Gb/s throughput, Michel Colmant and Ronald P. Luijten
@TechReport{ibm-rz-3087,
  author = 	 "Michel Colmant and Ronald P. Luijten",
  title = 	 "A single-chip lossless 16x16 switch fabric with 28
		  Gb/s throughput",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3087",
  note =	 "#93133"
}

Optimistic synchronous multi-party contract signing, N. Asokan, et. al.
@TechReport{ibm-rz-3089,
  author = 	 "N. Asokan, et. al.",
  title = 	 "Optimistic synchronous multi-party contract signing",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3089",
  note =	 "#93135"
}

Object Lifetimes in Java Card, Marcus Oestreicher and Ksheerabdhi Krishna
@TechReport{ibm-rz-3090,
  author = 	 "Marcus Oestreicher and Ksheerabdhi Krishna",
  title = 	 "Object Lifetimes in Java Card",
  institution =  "IBM Research Division",
  year = 	 1998,
  number =	 "IBM Research Report: RZ 3090",
  note =	 "#93136"
}

Automatic generation of Java stubs for ASN.1, Andreas Schade
@TechReport{ibm-rz-3098,
  author = 	 "Andreas Schade",
  title = 	 "Automatic generation of Java stubs for ASN.1",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3098",
  note =	 "#93144"
}

On the redundancy ratio of irredundant sum-of-product forms, L. O'Connor
@TechReport{ibm-rz-3100,
  author = 	 "L. O'Connor",
  title = 	 "On the redundancy ratio of irredundant
		  sum-of-product forms",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3100",
  note =	 "#93146"
}

Distributed management with mobile components, M. Feridun and W. Kasteleijn and J. Krause
@TechReport{ibm-rz-3102,
  author = 	 "M. Feridun and W. Kasteleijn and J. Krause",
  title = 	 "Distributed management with mobile components",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3102",
  note =	 "#93148"
}

An intrusion-detection system based on the teiresias pattern-discovery algorithm, Andreas Wespi and Marc Dacier and Herv\'e Debar
@TechReport{ibm-rz-3103,
  author = 	 "Andreas Wespi and Marc Dacier and Herv{\'{e}} Debar",
  title = 	 "An intrusion-detection system based on the teiresias 
		  pattern-discovery algorithm",
  institution =  "IBM Research Division",
  year = 	 1999,
  key =          "Herve Debar",
  number =	 "IBM Research Report: RZ 3103",
  note =	 "#93149"
}

VulDa : a Vulnerability database, D. Alessandri and M. Dacier
@TechReport{ibm-rz-3111,
  author = 	 "D. Alessandri and M. Dacier",
  title = 	 "VulDa : a Vulnerability database",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3111",
  note =	 "#93157"
}

E-cash withdrawal using mobile telephony, C. Binding and S. Hild and L. O'Connor
@TechReport{ibm-rz-3113,
  author = 	 "C. Binding and S. Hild and L. O'Connor",
  title = 	 "E-cash withdrawal using mobile telephony",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3113",
  note =	 "#93159"
}

New multi-party authentication services and key agreement protocols, G. Ateniese and M. Steiner and G. Tsudik
@TechReport{ibm-rz-3115,
  author = 	 "G. Ateniese and M. Steiner and G. Tsudik ",
  title = 	 "New multi-party authentication services and key
		  agreement protocols",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3115",
  note =	 "#93161"
}

Openwater white paper, Keith Whittingham
@TechReport{ibm-rz-3116,
  author = 	 "Keith Whittingham",
  title = 	 "Openwater white paper",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3116",
  note =	 "#93162"
}

On formal models for secure key exchange, Victor Shoup
@TechReport{ibm-rz-3120,
  author = 	 "Victor Shoup",
  title = 	 "On formal models for secure key exchange",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3120",
  note =	 "#93166"
}

Practical threshold signatures, Victor Shoup
@TechReport{ibm-rz-3121,
  author = 	 "Victor Shoup",
  title = 	 "Practical threshold signatures",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3121",
  note =	 "#93167"
}

Commitment-based fault-removing MIX cascade,
@TechReport{ibm-rz-3125,
  author = 	 "Ceki G{\"{u}}lc{\"{u}}",
  title = 	 "Commitment-based fault-removing MIX cascade",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3125",
  note =	 "#93171"
}

PLAS-policy language for authorizations, J.L.Abad-Peiro, et. al.
@TechReport{ibm-rz-3126,
  author = 	 "J.L.Abad-Peiro, et. al.",
  title = 	 "PLAS-policy language for authorizations",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3126",
  note =	 "#93172"
}

Design and implementation of a lightweight tool for detecting web server attacks, Magnus Almgren
@TechReport{ibm-rz-3129,
  author = 	 "Magnus Almgren",
  title = 	 "Design and implementation of a lightweight tool for
		  detecting web server attacks",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3129",
  note =	 "#93175"
}

, Stefan G. Hild
@TechReport{ibm-rz-3130,
  author = 	 "Stefan G. Hild",
  title = 	 "Service provisioning for the "Wireless application 
		  protocol"",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3130",
  note =	 "#93176"
}

Efficient private bidding and auctions with an oblivious third party, Christian Cachin
@TechReport{ibm-rz-3131,
  author = 	 "Christian Cachin",
  title = 	 "Efficient private bidding and auctions with an
		  oblivious third party",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3131",
  note =	 "#93177"
}

Design, implementation and deployment of iKP-a secure account-based electronic payment system, Mihir Bellare, et. al.
@TechReport{ibm-rz-3137,
  author = 	 "Mihir Bellare, et. al.",
  title = 	 "Design, implementation and deployment of iKP-a secure 
		  account-based electronic payment system",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3137",
  note =	 "#93183"
}

Using hash functions as a hedge against chosen ciphertext attack, Victor Shoup
@TechReport{ibmk-rz-3139,
  author = 	 "Victor Shoup",
  title = 	 "Using hash functions as a hedge against chosen
		  ciphertext attack",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3139",
  note =	 "#93185"
}

On the difficulty of coalition-resistance in group signature schemes, G. Ateniese and M. Joye and G. Tsudik
@TechReport{ibm-rz-3141,
  author = 	 "G. Ateniese and M. Joye and G. Tsudik",
  title = 	 "On the difficulty of coalition-resistance in group
		  signature schemes",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3141",
  note =	 "#93187"
}

ADK-building mobile agents for network and systems management from reusable components, T. Gschwind and M. Feridun and S. Pleisch
@TechReport{ibm-rz-3142,
  author = 	 "T. Gschwind and M. Feridun and S. Pleisch",
  title = 	 "ADK-building mobile agents for network and systems
		  management from reusable components",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3142",
  note =	 "'#93188"
}

Efficient verifiable encryption (and fair exchange) of digital signatures, Giuseppe Ateniese
@TechReport{ibm-rz-3145,
  author = 	 "Giuseppe Ateniese",
  title = 	 "Efficient verifiable encryption (and fair exchange)
		  of digital signatures",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3145",
  note =	 "#93191"
}

A composition theorem for universal one-way hash functions, Victor Shoup
@TechReport{ibm-rz-3147,
  author = 	 "Victor Shoup",
  title = 	 "A composition theorem for universal one-way hash functions",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3147",
  note =	 "#93193"
}

Service discovery in DEAPspace, Michael Nidd
@TechReport{ibm-rz-3149,
  author = 	 "Michael Nidd",
  title = 	 "Service discovery in DEAPspace",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3149",
  note =	 "#93195"
}

State of the art of mobile agent computing-security, fault tolerance, and transaction support, Stefan Pleisch
@TechReport{ibm-rz-3152,
  author = 	 "Stefan Pleisch",
  title = 	 "State of the art of mobile agent computing-security, 
		  fault tolerance, and transaction support",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3152",
  note =	 "#93198"
}

On string replacement exponentiation, Luke O'Connor
@TechReport{ibm-rz-3153,
  author = 	 "Luke O'Connor",
  title = 	 "On string replacement exponentiation",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3153",
  note =	 "#93199"
}

Automatic VLAN creation based on on-line measurement,
@TechReport{ibm-rz-3154,
  author = 	 "S. Rooney and C. H{\"{o}}rtnagl and J. Krause",
  title = 	 "Automatic VLAN creation based on on-line measurement",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3154",
  note =	 "#93200"
}

Using digital signatures as evidence of authorizations in electronic credit-card payments, Els Van Herreweghen
@TechReport{ibm-rz-3156,
  author = 	 "Els Van Herreweghen",
  title = 	 "Using digital signatures as evidence of
		  authorizations in electronic credit-card payments",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3156",
  note =	 "#93202"
}

Connection handover in wireless mobile ATM networks, Sonja Buchegger
@TechReport{ibm-rz-3159,
  author = 	 "Sonja Buchegger",
  title = 	 "Connection handover in wireless mobile ATM networks",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3159",
  note =	 "#93205"
}

On sliding window exponentiation, L. O'Connor
@TechReport{ibm-rz-3162,
  author = 	 "L. O'Connor",
  title = 	 "On sliding window exponentiation",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3162",
  note =	 "#93208"
}

Intrusion detection using variable-length audit trail patterns, A. Wespi and M. Dacier and H. Debar
@TechReport{ibm-rz-3164,
  author = 	 "A. Wespi and M. Dacier and H. Debar",
  title = 	 "Intrusion detection using variable-length audit
		  trail patterns",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3164",
  note =	 "#93210"
}

On auctions as the negotiation paradigm of electronic markets,
@TechReport{ibm-rz-3166,
  author = 	 "M. Str{\"{o}}bel",
  title = 	 "On auctions as the negotiation paradigm of
		  electronic markets",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3166",
  note =	 "#93212"
}

JetZ (Whitepaper as HTML), M. Baentsch and P. Buhler and T. Eirick
@TechReport{ibm-rz-3169,
  author = 	 "M. Baentsch and P. Buhler and T. Eirick",
  title = 	 "JetZ (Whitepaper as HTML)",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3169",
  note =	 "#93215"
}

The design of a group key agreement API, G. Ateniese, et. al.
@TechReport{ibm-rz-3170,
  author = 	 "G. Ateniese, et. al.",
  title = 	 "The design of a group key agreement API",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3170",
  note =	 "#93216"
}

JavaCard--from hype to reality, Michael Baentsch, et. al.
@TechReport{ibm-rz-3171,
  author = 	 "Michael Baentsch, et. al.",
  title = 	 "JavaCard--from hype to reality",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3171",
  note =	 "#93217"
}

Modelling of customers' interactive control of service processes, Heiko Ludwig
@TechReport{ibm-rz-3173,
  author = 	 "Heiko Ludwig",
  title = 	 "Modelling of customers' interactive control of
		  service processes",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3173",
  note =	 "#93219"
}

A revised taxonomy for intrusion-detection systems, Herv\'e Debar and Marc Dacier and Andreas Wespi
@TechReport{ibm-rz-3176B,
  author = 	 "Herv{\'{e}} Debar and Marc Dacier and Andreas Wespi",
  title = 	 "A revised taxonomy for intrusion-detection systems",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3176",
  note =	 "#93222"
}

Secure group communication in asynchronous networks with failures: integration and experiments, Y. Amir et. al.
@TechReport{ibm-rz-3177,
  author = 	 "Y. Amir et. al.",
  title = 	 "Secure group communication in asynchronous networks
		  with failures: integration and experiments",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3177",
  note =	 "#93223"
}

Advanced dynamic property evaluation for CORBA-based electronic commerce, A. Schade et. al.
@TechReport{ibm-rz-3178,
  author = 	 "A. Schade et. al.",
  title = 	 "Advanced  dynamic property evaluation for
		  CORBA-based electronic commerce",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3178",
  note =	 "#93224"
}

IEEE 802.11 wireless LAN standard a technical tutorial, Reto J. Hermann
@TechReport{ibm-rz-3186,
  author = 	 "Reto J. Hermann",
  title = 	 "IEEE 802.11 wireless LAN standard a technical tutorial",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3186",
  note =	 "#93232"
}

Effects of electronic markets on negotiation processes evaluating protocol suitability,
@TechReport{ibm-rz-3191,
  author = 	 "Michael Str{\"{o}}bel",
  title = 	 "Effects of electronic markets on negotiation
		  processes evaluating protocol suitability",
  institution =  "IBM Research Division",
  year = 	 1999,
  number =	 "IBM Research Report: RZ 3191",
  note =	 "#93237"
}

Confirmer signature schemes secure against adaptive adversaries, Jan Camenisch
@TechReport{ibm-rz-3195,
  author = 	 "Jan Camenisch",
  title = 	 "Confirmer signature schemes secure against adaptive 
		  adversaries",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3195",
  note =	 "#93241"
}

MIERA: a method for inter-enterprise role-based authorization, Heiko Ludwig and Luke O'Connor and Simon Kramer
@TechReport{ibm-rz-3208,
  author = 	 "Heiko Ludwig and Luke O'Connor and Simon Kramer",
  title = 	 "MIERA: a method for inter-enterprise role-based 
		  authorization",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3208",
  note =	 "#93254"
}

Prefix-based parallel packet classification, A.P.J. Engbersen and J. Van Lunteren
@TechReport{ibm-rz-3210,
  author = 	 "A.P.J. Engbersen and J. Van Lunteren",
  title = 	 "Prefix-based parallel packet classification",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3210",
  note =	 "#93256"
}

A control architecture for lightweight virtual networks, Sean Rooney
@TechReport{ibm-rz-3211,
  author = 	 "Sean Rooney",
  title = 	 "A control architecture for lightweight virtual networks",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3211",
  note =	 "#93257"
}

Architecture for cross-organisational business processes, Y. Hoffner et al.
@TechReport{ibm-rz-3212, 
  author = 	 "Y. Hoffner et al.",
  title = 	 "Architecture for cross-organisational business processes",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3212",
  note =	 "#93258"
}

Combining configuration and evaluation mechanisms to support the selection of modular insurance products, Markus Stolze and Simon Field and Pascal Kleijer
@TechReport{ibm-rz-3213,
  author = 	 "Markus Stolze and Simon Field and Pascal Kleijer",
  title = 	 "Combining configuration and evaluation mechanisms to 
		  support the selection of modular insurance products",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3213",
  note =	 "#93259"
}

A new buffer management scheme for IP differentiated services, R. Pletka and P. Droz and R. Haas
@TechReport{ibm-rz-3216,
  author = 	 "R. Pletka and P. Droz and R. Haas",
  title = 	 "A new buffer management scheme for IP differentiated 
		  services",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3216",
  note =	 "#93262"
}

Acess control for PDAs, James Riordan
@TechReport{ibm-rz-3219,
  author = 	 "James Riordan",
  title = 	 "Acess control for PDAs",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3219",
  note =	 "#93265"
}

Secure anonymous signature-based transactions, Els Van Herreweghen
@TechReport{ibm-rz-3220,
  author = 	 "Els Van Herreweghen",
  title = 	 "Secure anonymous signature-based transactions",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3220",
  note =	 "#93266"
}

Advanced dynamic property evaluation for CORBA-based electronic markets, Andreas Schade et al.
@TechReport{ibm-rz-3221,
  author = 	 "Andreas Schade et al.",
  title = 	 "Advanced dynamic property evaluation for CORBA-based 
		  electronic markets",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3221",
  note =	 "#93267"
}

Using rule-based activity descriptions to evaluate intrusion-detection systems, Dominique Alessandri
@TechReport{ibm-rz-3225,
  author = 	 "Dominique Alessandri",
  title = 	 "Using rule-based activity descriptions to evaluate
		  intrusion-detection systems",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3225",
  note =	 "#93271"
}

An operational semantics of Java 2 access control,
@TechReport{ibm-rz-3227,
  author = 	 "G{\"{u}nter Karjoth ",
  title = 	 "An operational semantics of Java 2 access control",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3227",
  note =	 "#93273"
}

Towards a scalable system for per-flow charging in the internet, Gabriel Dermler et al.
@TechReport{ibm-rz-3231,
  author = 	 "Gabriel Dermler et al.",
  title = 	 "Towards a scalable system for per-flow charging in
		  the internet",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3231",
  note =	 "#93277"
}

An architecture for providing advanced telecommunication services, Yann Duponchel and Marcel Graf and Hong Linh Truong
@TechReport{ibm-rz-3239,
  author = 	 "Yann Duponchel and Marcel Graf and Hong Linh Truong",
  title = 	 "An architecture for providing advanced
		  telecommunication services",
  institution =  "IBM Research Division",
  year = 	 2000,
  number =	 "IBM Research Report: RZ 3239",
  note =	 "#93285"
}