Bell Labs Technical Journal

Cover image for Bell Labs Technical Journal

Special Issue: Homeland Security

Summer 2004

Volume 9, Issue 2

Pages fmi–fmvii, 1–213

  1. Prefatory Letters

    1. Top of page
    2. Prefatory Letters
    3. Dedication
    4. Editorial
    5. Research Article
    6. New Technology
    1. Letter from Chairman, Federal Communications Commission (page fmi)

      Michael K. Powell

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20017

    2. Letter from Chairman and CEO, Lucent Technologies (page fmiii)

      Patricia F. Russo

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20018

    3. Letter from President, Bell Labs, and President, Bell Labs Advanced Technologies (pages fmv–fmvi)

      William T. O'Shea and Jeffrey M. Jaffe

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20019

  2. Dedication

    1. Top of page
    2. Prefatory Letters
    3. Dedication
    4. Editorial
    5. Research Article
    6. New Technology
    1. Dedication (page fmvii)

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20020

  3. Editorial

    1. Top of page
    2. Prefatory Letters
    3. Dedication
    4. Editorial
    5. Research Article
    6. New Technology
    1. Protecting communications infrastructure (pages 1–4)

      Karl F. Rauscher

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20021

  4. Research Article

    1. Top of page
    2. Prefatory Letters
    3. Dedication
    4. Editorial
    5. Research Article
    6. New Technology
    1. Third-generation wireless services for homeland security (pages 5–21)

      Krishna Balachandran, Kenneth C. Budka, Tewfik L. Doumi and Joseph H. Kang

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20022

    2. Implementing wireless priority service for CDMA networks (pages 23–36)

      Michael D. Chambers and Douglas H. Riley

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20023

    3. Wireless search and rescue: Concepts for improved capabilities (pages 37–49)

      Bernard L. Malone III

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20024

    4. The automated backup solution—safeguarding the communications network infrastructure (pages 59–84)

      Joseph F. Lennert, William Retzner, Monica G. Rodgers, Bernard G. Ruel, Srini Sundararajan and Paul D. Wolfson

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20026

    5. Inter-infrastructure modeling—ports and telecommunications (pages 91–105)

      Walter E. Beyeler, Stephen H. Conrad, Thomas F. Corbet, Gerard P. O'Reilly and David D. Picklesimer

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20028

    6. A model for quantifying business continuity preparedness risks for telecommunications networks (pages 107–123)

      Ahmad Jrad, Thomas Morawski and Louise Spergel

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20029

    7. Architectures and disaster recovery strategies for survivable telecommunications services (pages 125–145)

      Mark C. Baker, Charles A. Witschorik, Jonathan C. Tuch, Waverly Hagey-Espie and Veena B. Mendiratta

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20030

    8. Disaster recovery preparedness through continuous process optimization (pages 147–162)

      Nick De Tura, Susan Marie Reilly, Srilatha Narasimhan and Zhenhua Jack Yin

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20031

    9. Effective quality control during disaster recovery (pages 163–171)

      Richard E. Krock

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20032

    10. A vendor and service provider partnership for preparing to manage disaster recovery (pages 173–180)

      Donna M. Hlavacek, Karl A. Madsen and Robert M. Reimer

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20033

    11. Using remanufactured switching equipment to reduce restoration time in case of a disaster (pages 181–188)

      Charles L. Goldey, Lisa M. Enaire, Donald Olson and Stacy L. Trottier

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20034

    12. The role of SLAs in reducing vulnerabilities and recovering from disasters (pages 189–203)

      Chun K. Chan, Uma Chandrashekhar, Steven H. Richman and S. Rao Vasireddy

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20035

  5. New Technology

    1. Top of page
    2. Prefatory Letters
    3. Dedication
    4. Editorial
    5. Research Article
    6. New Technology
    1. Recent Lucent Technologies patents (pages 205–213)

      Version of Record online: 7 JUL 2004 | DOI: 10.1002/bltj.20036

SEARCH

SEARCH BY CITATION