Multiple-access protocols and time-constrained communication
ACM Computing Surveys (CSUR)
A distributed alternative to finite-state-machine specifications
ACM Transactions on Programming Languages and Systems (TOPLAS)
Distributed Recovery in Fault-Tolerant Multiprocessor Networks
IEEE Transactions on Computers
Synthesis of two-party error-recoverable protocols
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
Modeling and simulation of medium-access-protocols in local area networks
ACM SIGSIM Simulation Digest
A model of organizational communications
ACM SIGMIS Database
Star Local Area Networks: A Performance Study
IEEE Transactions on Computers
Deadlock-Free Message Routing in Multiprocessor Interconnection Networks
IEEE Transactions on Computers
Design of a Functionally Distributed, Multiprocessor Database Machine Using Data Flow Analysis
IEEE Transactions on Computers
Distributed Nodes Organization Algorithm for Channel Access in a Multihop Dynamic Radio Network
IEEE Transactions on Computers
OSI service specification with CCITT-SDL
ACM SIGCOMM Computer Communication Review
Optimal Assignments in Broadcast Networks
IEEE Transactions on Computers
Teaching computer networks as a writing intensive course
ACM SIGCSE Bulletin
Test Scheduling and Control for VLSI Built-in Self-Test
IEEE Transactions on Computers
A reliable and efficient multicast for broadband broadcast networks
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
An Ethernet compatible low cost/high performance communication solution
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
Design and Analysis of Arbitration Protocols
IEEE Transactions on Computers
Hypercube experiments with Joyce
ACM SIGPLAN Notices
Efficient CSMA/CD-Based Protocols for Multiple Priority Classes
IEEE Transactions on Computers
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
The intractability of bounded protocols for non-FIFO channels
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
An Optimal Shortest-Path Routing Policy for Network Computers with Regular Mesh-Connected Topologies
IEEE Transactions on Computers
GAMMON: A Load Balancing Strategy for Local Computer Systems with Multiaccess Networks
IEEE Transactions on Computers
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
All-to-All Broadcast by Flooding in Communications Networks
IEEE Transactions on Computers
Utilizing Bandwidth Sharing in the Slotted Ring
IEEE Transactions on Computers
Performance Analysis of k-ary n-cube Interconnection Networks
IEEE Transactions on Computers
The role of workstations in the information utility: a model for user-oriented information systems
SIGSMALL '90 Proceedings of the 1990 ACM SIGSMALL/PC symposium on Small systems
A Window Protocol for Transmission of Time-Constrained Messages
IEEE Transactions on Computers
Ring-connected ring (RCR) topology for high-speed networking: analysis and implementation
ACM SIGCOMM Computer Communication Review
Network locality at the scale of processes
ACM Transactions on Computer Systems (TOCS)
A queuing model for multi-user teleprocessing system line speed decisions
CSC '92 Proceedings of the 1992 ACM annual conference on Communications
A common compiler for LOTOS and SDL specifications
IBM Systems Journal
Data Transfers in Broadcast Networks
IEEE Transactions on Computers
Enterprise Systems Connection (ESCON) Architecture: system overview
IBM Journal of Research and Development
NPSNET: constructing a 3D virtual world
I3D '92 Proceedings of the 1992 symposium on Interactive 3D graphics
Compiling Real-Time Specifications into Extended Automata
IEEE Transactions on Software Engineering - Special issue: specification and analysis of real-time systems
Open commit protocols tolerating commission failures
ACM Transactions on Database Systems (TODS)
Simulation of communications architecture specifications using Prolog
ACM SIGAPP Applied Computing Review
Closure and Convergence: A Foundation of Fault-Tolerant Computing
IEEE Transactions on Software Engineering - Special issue on software reliability
Design features of high level layers in LAHNOS, a local area heterogeneous network operating system
ACM SIGOPS Operating Systems Review
Optimal Polling in Communication Networks
IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
Statistical Real-Time Channels on Multiaccess Bus Networks
IEEE Transactions on Parallel and Distributed Systems
The scalability of spatial reuse based serial storage interfaces
Proceedings of the fifth workshop on I/O in parallel and distributed systems
Performance Optimization of Checkpointing Schemes with Task Duplication
IEEE Transactions on Computers
A Fully Adaptive Routing Algorithm for Dynamically Injured Hypercubes, Meshes, and Tori
IEEE Transactions on Parallel and Distributed Systems
Extending Statecharts with Temporal Logic
IEEE Transactions on Software Engineering
Validation with guided search of the state space
DAC '98 Proceedings of the 35th annual Design Automation Conference
Self-stabilizing algorithms for synchronous unidirectional rings
Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms
Transient anlaysis of a store-and-forward computer-communications network
WSC '86 Proceedings of the 18th conference on Winter simulation
State transition times for limited contention multiple access schemes
CSC '85 Proceedings of the 1985 ACM thirteenth annual conference on Computer Science
Locality in distributed computations
CSC '88 Proceedings of the 1988 ACM sixteenth annual conference on Computer science
SIGCSE '85 Proceedings of the sixteenth SIGCSE technical symposium on Computer science education
Distributed functions allocation for reliability and delay optimization
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
Checkpointing and rollback-recovery for distributed systems
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers
IEEE Transactions on Parallel and Distributed Systems
Integrated network computing models, programming modes and software tools
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
An unslotted multichannel channel-access protocol for distributed direct-sequence networks
Mobile Networks and Applications
Query Optimization in Database Systems
ACM Computing Surveys (CSUR)
A two-phase combined QoS-based handoff scheme in a wireless ATM network
International Journal of Network Management
Selection diversity forwarding in a multihop packet radio network with fading channel and capture
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
A Discrete Event Systems Approach for Protocol Conversion
Discrete Event Dynamic Systems
Nearest Neighbor Queries in Shared-Nothing Environments
Geoinformatica
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Algorithms for multicast connection under multi-path routing model
Information Processing Letters
Location-Independent Access in Mobile Systems
Wireless Personal Communications: An International Journal
Hypermeshes: implementation and performance
Journal of Systems Architecture: the EUROMICRO Journal
Beyond RPC: The Virtual Network
IEEE Parallel & Distributed Technology: Systems & Technology
Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs
IEEE Transactions on Computers
An Implementation of F-Channels
IEEE Transactions on Parallel and Distributed Systems
Performance of Barrier Synchronization Methods in a Multiaccess Network
IEEE Transactions on Parallel and Distributed Systems
A taxonomy of scheduling in general-purpose distributed computing systems
IEEE Transactions on Software Engineering
Entity Structure Based Design Methodology: A LAN Protocol Example
IEEE Transactions on Software Engineering
Discrete time generative-reactive probabilistic processes with different advancing speeds
Theoretical Computer Science
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
A Survey on Safety-Critical Multicast Networking
SAFECOMP '00 Proceedings of the 19th International Conference on Computer Safety, Reliability and Security
Securing Internet Electronic Mail
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
A dynamic lab approach to reinforcing computing concepts
Journal of Computing Sciences in Colleges
A fully dynamic algorithm for distributed shortest paths
Theoretical Computer Science - Latin American theoretical informatics
The computer networks course: will it all fit?
Journal of Computing Sciences in Colleges
Model checking the composition of hypermedia design components
CASCON '00 Proceedings of the 2000 conference of the Centre for Advanced Studies on Collaborative research
Incorporation of multiaccess links into a routing protocol
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
Theoretical performance analysis of sliding window link level flow control for a local area network
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
A VLSI architecture for cellular automata based parallel data compression
VLSID '96 Proceedings of the 9th International Conference on VLSI Design: VLSI in Mobile Communication
ACM SIGCOMM Computer Communication Review - Workshop on data communication in Latin America and the Caribbean
SODA: a simplified operating system for distributed applications
ACM SIGOPS Operating Systems Review
Coverage testing software architectural design in SDL
Computer Networks: The International Journal of Computer and Telecommunications Networking - ITU-T system design languages (SDL)
Advances toward optical subwavelength switching
IP Over WDM
Crossroads
Asynchronous Scheduling of Redundant Disk Arrays
IEEE Transactions on Computers
Nameservers in a campus domain
ACM SIGCUE Outlook
CASCON '03 Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative research
Branching time and orthogonal bisimulation equivalence
Theoretical Computer Science
Remote access internetworking laboratory
Proceedings of the 35th SIGCSE technical symposium on Computer science education
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Improving resource utilization for MPEG decoding in embedded end-devices
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
On the current state of transport layer protocols in mobile ad hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
A mixed branch-and-bound and neural network approach for the broadcast scheduling problem
Design and application of hybrid intelligent systems
Low-Latency Virtual-Channel Routers for On-Chip Networks
Proceedings of the 31st annual international symposium on Computer architecture
QoS Guarantees in heterogeneous systems consisting of IP core networks with satellite access
Mobile Networks and Applications
Located actions in process algebra with timing
Fundamenta Informaticae
Analysis of routing table update activity after resource failure in a distributed computer network
SIGCOMM '83 Proceedings of the symposium on Communications Architectures & Protocols
Randomized naming using wait-free shared variables
Distributed Computing
A simulation of bus architectures for multiprocessor systems
WSC '82 Proceedings of the 14th conference on Winter Simulation - Volume 1
Virtual fab: an enabling framework and dynamic manufacturing service provision mechanism
Information and Management
An incremental specification of the sliding-window protocol
Distributed Computing
A network interface unit simulation using micro PASSIM
ACM SIGSIM Simulation Digest
Structuring contention-based channel access in wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Optimizing the Length of Checking Sequences
IEEE Transactions on Computers
An Efficient Dynamic Algorithm for Maintaining All-Pairs Shortest Paths in Stochastic Networks
IEEE Transactions on Computers
On the k-path cover problem for cacti
Theoretical Computer Science
Modelling layer 2 and layer 3 device bandwidths using B-node theory
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
SYN-MAC: a distributed medium access control protocol for synchronized wireless networks
Mobile Networks and Applications
Presence: Teleoperators and Virtual Environments
WF2Q-M: Worst-case fair weighted fair queueing with maximum rate control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Supporting Action-at-a-distance in Situated Cellular Agents
Fundamenta Informaticae
IT support for healthcare processes - premises, challenges, perspectives
Data & Knowledge Engineering
The capacity of an implicit prioritized access protocol in wireless sensor networks
Journal of Embedded Computing - Real-Time Systems (Euromicro RTS-03)
Multi-agent radio resource allocation
Mobile Networks and Applications
The development of the Emerald programming language
Proceedings of the third ACM SIGPLAN conference on History of programming languages
Stabilizing inter-domain routing in the Internet
Journal of High Speed Networks - Self-Stabilizing Systems, Part 1
The effects of network delays on group work in real-time groupware
ECSCW'01 Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work
Congestion-controlled best-effort communication for networks-on-chip
Proceedings of the conference on Design, automation and test in Europe
Transformer tunnels: a framework for providing route-specific adaptations
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Performance evaluation of multicast ad hoc on-demand distance vector protocol
Computer Communications
Wireless sensor networks: performance analysis in indoor scenarios
EURASIP Journal on Wireless Communications and Networking
RTTES: Real-time search in dynamic environments
Applied Intelligence
Finding a minimum path cover of a distance-hereditary graph in polynomial time
Discrete Applied Mathematics
Speedup and scalability analysis of Master--Slave applications on large heterogeneous clusters
Journal of Parallel and Distributed Computing
Network-Supported Layered Multicast Transport Control for Streaming Media
IEEE Transactions on Parallel and Distributed Systems
QoS and energy efficiency in network wide broadcasting: A MAC layer perspective
Computer Communications
Distributed time-optimal scheduling for convergecast in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information and network system security
DNCOCO'07 Proceedings of the 9th WSEAS International Conference on Data Networks, Communications, Computers
International Journal of High Performance Computing and Networking
Performance evaluation of a scalable media access control protocol for single hop WDM networks
International Journal of High Performance Computing and Networking
Traffic driven multiple constraint-optimisation for QoS routing
International Journal of Internet Protocol Technology
Load aware traffic engineering for mesh networks
Computer Communications
Formalising TCP's Data Transfer Service Language: A Symbolic Automaton and its Properties
Fundamenta Informaticae - Half a Century of Inspirational Research: Honoring the Scientific Influence of Antoni Mazurkiewicz
A language for advanced protocol analysis in automotive networks
Proceedings of the 30th international conference on Software engineering
Maximizing transfer opportunities in bluetooth DTNs
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Techniques for pipelined broadcast on ethernet switched clusters
Journal of Parallel and Distributed Computing
A novel lossless data compression scheme based on the error correcting Hamming codes
Computers & Mathematics with Applications
RT oblivious erasure correcting
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 22nd annual international conference on Supercomputing
Reliability improvement for an RFID-based psychiatric patient localization system
Computer Communications
Link scheduling in wireless sensor networks: Distributed edge-coloring revisited
Journal of Parallel and Distributed Computing
A security-centric ring-based software architecture
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
A robot in every classroom: robots and functional programming across the curriculum
Proceedings of the 2008 international workshop on Functional and declarative programming in education
Towards low-complexity Internet traffic engineering: The Adaptive Multi-Path algorithm
Computer Networks: The International Journal of Computer and Telecommunications Networking
A pioneer compression technique for database
MATH'08 Proceedings of the American Conference on Applied Mathematics
A distributed speaker authentication system
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
An investigation of credit-based flow control protocols
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Reducing Transaction Abort Rates with Prioritized Atomic Multicast Protocols
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Intra-Domain Delay-Based Quality of Service Using Differentiated Routing
MMNS '08 Proceedings of the 11th IFIP/IEEE international conference on Management of Multimedia and Mobile Networks and Services: Management of Converged Multimedia Networks and Services
Speaker recognition techniques for remote authentication of users in computer networks
WSEAS TRANSACTIONS on SYSTEMS
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Supporting indirect collaborative design with integrated knowledge-based design environments
Human-Computer Interaction
On the synthesis of adaptive tests for nondeterministic finite state machines
Programming and Computing Software
A Multi-Core Solver for Parity Games
Electronic Notes in Theoretical Computer Science (ENTCS)
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
AEE'07 Proceedings of the 6th conference on Applications of electrical engineering
Evaluating performance of different multicast routing algorithms
AIC'08 Proceedings of the 8th conference on Applied informatics and communications
Control system for cogenerative power plants
AIC'08 Proceedings of the 8th conference on Applied informatics and communications
Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Distributed global ID assignment for wireless sensor networks
Ad Hoc Networks
Load transformation of Markovian arrival processes: methods and tool support
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
System-on-Chip Test Architectures: Nanometer Design for Testability
System-on-Chip Test Architectures: Nanometer Design for Testability
Secured Information System for Concurrent Engineering Applications
Proceedings of the 2006 conference on Leading the Web in Concurrent Engineering: Next Generation Concurrent Engineering
Vehicular communication: protocol design, testbed implementation and performance analysis
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Mapping standards for home networking
Computer Standards & Interfaces
Process Algebra: An Algebraic Theory of Concurrency
CAI '09 Proceedings of the 3rd International Conference on Algebraic Informatics
Confidence based dual reinforcement Q-routing: an adaptive online network routing algorithm
IJCAI'99 Proceedings of the 16th international joint conference on Artificial intelligence - Volume 2
Estimation of efficiency of multimedia system
ECC'09 Proceedings of the 3rd international conference on European computing conference
OLSR performance measurement in a military mobile ad hoc network
Ad Hoc Networks
Jitter regulation for multiple streams
ACM Transactions on Algorithms (TALG)
Technical challenges of network anonymity
Computer Communications
Capacity requirements of traffic handling schemes in multi-service networks
Computer Communications
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improved server assisted signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security considerations for personal computers
IBM Systems Journal
An overview of computer security
IBM Systems Journal
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
LQG control over lossy TCP-like networks with probabilistic packet acknowledgements
International Journal of Systems, Control and Communications
Partially dynamic efficient algorithms for distributed shortest paths
Theoretical Computer Science
A unique beamforming-based equilibrium in multi-user random access SIMO networks
IEEE Communications Letters
Self-stabilizing group communication in directed networks
SSS'03 Proceedings of the 6th international conference on Self-stabilizing systems
Networks of hybrid systems: connections faults modelling and detection
HSCC'07 Proceedings of the 10th international conference on Hybrid systems: computation and control
Bug hunting with false negatives
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Demand bound server: generalized resource reservation for hard real-time systems
EMSOFT '11 Proceedings of the ninth ACM international conference on Embedded software
Value-passing CCS with noisy channels
Theoretical Computer Science
A taxonomy of multicast protocols for Internet applications
Computer Communications
Research: Performance evaluation of hierarchical SRMA-ALOHA and SRMA-Poll protocols
Computer Communications
Mutually independent hamiltonian cycles of binary wrapped butterfly graphs
Mathematical and Computer Modelling: An International Journal
Located Actions in Process Algebra with Timing
Fundamenta Informaticae
Hi-index | 0.07 |
From the Book:This book is now in its third edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in 1996, computer networks, especially the worldwide Internet, had become a daily reality for millions of people. Furthermore, the networking hardware and software have completely changed since the second edition appeared In 1988, nearly all networks were based on copper wire. Now, many are based on fiber optics or wireless communication. Proprietary networks, such as SNA have become far less important than public networks, especially the Internet. The OSI protocols have quietly vanished,, and the TCP/IP protocol suite has become dominant. In fact, so much has changed, the book has almost been rewritten from scratch. Although Chap. 1 has the same introductory function as it did in the second edition, the contents have been completely revised and brought up to date. For example, instead of basing the hook on the seven-layer OSI model. a five-layer hybrid model (shown in Fig. 1-21) is now used and introduced in Chap. 1. While not exactly identical to the TCP/IP model, it is much closer to the TCP/IP model in spirit than it is to the OSI model used in the second edition. Also, the new running examples used throughout the book - the Internet and Al M networks are introduced here, along with some gigabit networks and other popular networks. In Chap. 2, the focus has moved from copper wire to fiber optics and wireless communication,since these arc the technologies of the future. The telephone system has become almost entirely digital in the past decade, so the material on it has been largely rewritten, with new material on broadband ISDN added. The material on cellular radio has been greatly expanded, and new material on low-orbit satellites has been added to the chapter. The order of discussion of the data link layer and the MAC sublayer has been reversed, since experience with students shows that they understand the MAC sublayer better after they have studied the data link layer. The example protocols there have been kept, as they have proven very popular, but they have been rewritten in C. New material on the Internet and ATM data link layers has been added. The MAC sublayer principles of Chap. 4. have been revised to reflect new protocols, including wavelength division multiplexing, wireless LANs, and digital radio. The discussion of bridges has been revised, and new material has been added on high-speed LANs. Most of the routing algorithms of Chap. 5 have been replaced by more modern ones, including distance vector and link state routing. The sections on congestion control have been completely redone, and material on the running examples, the Internet and ATM is all new. Chap. 6 is still about the transport layer, but here, too, major changes have occurred, primarily, the addition of a large amount of new material about the Internet, ATM, and network performance. Chap. 7, on the application layer, is now the longest chapter in the book. The material on network security has been doubled in length, and new material has been added on DNS, SNMP, email, USENET, the World Wide Web, HTML, Java, multimedia, video on demand, and the MBone. Of the 395 figures in the third edition, 276 (70 percent) are completely new and some of the others have been revised. Of the 371 references to the literature, 282 (76 percent) are to books and papers that have appeared since the second edition was published. Of these, over 100 are to works published in 1995 and 1996 alone. All in all, probably 75 percent of the entire book is brand new, and parts of the remaining 25 percent have been heavily revised. Since this is effectively a new book, the cover was redesigned to avoid confusion with the second edition. Computer books are full of acronyms. This one is no exception. By the time you are finished reading this one, all of the following should ring a bell: AAL, AMPS, ARP, ASN, ATM, BGP, CDMA, CDPD, CSMA, DQDB, DNS, FAQ, FDM, FTP, FTTC, FTTH, GSM, HDLC, HEC, HlPPl, TAB, lCMP, IDEA, IETF, 1Pv6, ISO, ITU, LATA, MAC, MACA, MAN, MIB, MIME, NAP, NNTP, NSA, NSAP, OSI, OSPF, PCM, PCN, PCS, PEM, PGP, PPP, PSTN, PTT, PVC, QAM, RARP, RFC, RSA, SABME, SAP, SAR, SDH, SDLC, SHA, SMI, SNA, SNMP, SNRME, SPX, TCP, UDP, VHF, VLF, VSAT, WARC, WDM, WWV, and WWW. But don't worry. Each one will be carefully defined before it is used. To help instructors using this book as a text for course, the author has prepared three teaching aids: A problem solutions manual. PostScript files containing all the figures (for making overhead sheets). A simulator (written in C) for the example protocols of Chap. 3. The solutions manual is available from Prentice Hall (but only to instructors). The file with the figures and the simulator are available via the World Wide Web. To get them, please see the author's home page: http://www.cs.vu.nl/~ast/. The book was typeset in Times Roman using Troff, which, after all these years, is still the only way to go. While Troff is not as trendy as WYSIWYG systems, the reader is invited to compare the typesetting quality of this book with books produced by WYSIWYG systems. My only concession to PCs and desktop publishing is that for the first time, the art was produced using Adobe Illustrator, instead of being drawn on paper. Also for the first time, the book was produced entirely electronically. The PostScript output from Troff was sent over the Internet to the printer, where the film for making the offset plates was produced. No intermediate paper copy was printed and photographed, as is normally done. Andrew S. Tanenbaum