By Topic

Proceedings of Phoenix Conference on Computers and Communications

23-26 March 1993

Filter Results

Displaying Results 1 - 25 of 87
  • Proceedings of Phoenix Conference on Computers and Communications

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Approaches to secure delegation in distributed systems

    Publication Year: 1993, Page(s):188 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The authors present two delegation schemes and a revocation scheme for distributed systems based on adaptation and extensions of the recent Csig cryptosystem of Zheng and Seberry (1992). The first delegation scheme is general in the sense that the originator of the delegation only specifies one delegate. The originator has no control over who finally executes the delegated task... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an authorization mechanism for user-role based security in an object-oriented design model

    Publication Year: 1993, Page(s):195 - 202
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    User-role based security (URBS) is a technique for characterizing database security that takes the responsibilities of individuals into consideration when determining the security requirements of an application. In previous work, the authors developed a set of techniques for defining and analyzing URBS for an application. They extend this work by considering an actual individual's authorized acces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Renovation of complex objects in the temporal object system

    Publication Year: 1993, Page(s):203 - 209
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    In many engineering applications, changes to the state and/or structure of an object needs to be maintained over a period of time. The authors discuss the temporal object system (TOS) which maintains changes in both the structure and the state of an object. An object in a TOS is reffered to as a temporal object which evolves over time. Changes to both the structure and the state of the object are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal analysis for hard real-time scheduling

    Publication Year: 1993, Page(s):538 - 544
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The authors present an analysis technique for time driven scheduling based on the timing requirements of tasks. The analysis results in the establishment of a set of temporal relations between pairs of tasks based on a nonpreemptive scheduling model. The relationships can be used effectively to reduce the average complexity of scheduling these tasks. They also serve as a basis for selective preemp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change management in object-oriented databases

    Publication Year: 1993, Page(s):238 - 244
    Cited by:  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The author addresses two of the key issues of change management in advanced application databases that are reuse of objects in a changed environment and change propagation. Changes usually propagate along certain relationships between object in many advanced application databases. A database model is proposed called an active h-graph object model (AHOM), to address change management in object-orie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A resource allocation model for BISDN/ATM

    Publication Year: 1993, Page(s):282 - 288
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The authors outline a call control algorithm for high speed broadband networks using the burstiness associated with traffic sources in a heterogeneous asynchronous transfer mode (ATM) environment where calls are to be statistically multiplexed, and a bandwidth allocation strategy is required. An algorithm that accommodates the bursty nature of traffic is proposed for the dynamic assignment of band... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented approach for implementing algorithm-based fault tolerance

    Publication Year: 1993, Page(s):210 - 216
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    The authors demonstrate the practical use of an object-oriented system to incorporate fault tolerance and reliability into data objects. The object-based fault tolerance scheme uses abstraction to conceal algorithm-based fault tolerance layers. The scheme allows a layer of fault tolerance to be added to data objects without affecting or altering the use of the data objects. It is shown that the C+... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheme for improved multicast efficiency in a ring network

    Publication Year: 1993, Page(s):332 - 338
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The authors deal with the multicasting of a file to a number of stations in a ring network. A protocol is presented which is very effective in reducing the overall transmission time when the links are subject to errors. The scheme relies on giving extra error protection to acknowledgements. Simulations and comparisons are made with two other schemes. These comparisons show the potential of substan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking in Baltic countries: Current developments

    Publication Year: 1993, Page(s):461 - 467
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    The state-of-the-art of information technologies as well as networking in Estonia, Latvia and Lithuania are a direct inheritance from dependence on the ex-USSR. The authors deal with networking. The existing technological background is described. The networking activity in the Soviet period and during the last few years are reviewed starting from ACADEMNET and till FIDOnet, Internet-UUCP, EARN/BIT... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A qualitative simulation-based learning environment: how to enhance causal understanding of complex phenomena in large-scale plants

    Publication Year: 1993, Page(s):531 - 537
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The authors describe a framework of a qualitative simulation-based learning environment that focuses on causal understanding of complex phenomena in large-scale plants. Training styles such as study with manuals and exercise with a numerical simulator have been developed. However, besides such training styles, a learning environment should provide the functions that enable operators to achieve dee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable test sequences with operational coverage for LOTOS specifications

    Publication Year: 1993, Page(s):245 - 253
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    LOTOS the language for temporal ordering specifications is a formal language standardization by ISO for specifying distributed systems. The authors present a new approach to selectively generating executable test sequences which cover designated operations of a LOTOS specification. An operational coverage criterion is proposed, in which each operation is covered by a mandatory set of action sequen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic bandwidth allocation scheme for ATM networks

    Publication Year: 1993, Page(s):289 - 295
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    A multiple link and multiple traffic type asynchronous transfer mode (ATM) network environment is considered. To efficiently utilize the network resource at low network mangement cost, the authors propose a dynamic bandwidth allocation scheme using call admissible regions as a control basis. The allocated bandwidth for a traffic stream belonging to a virtual path is set to be an integer multiple o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable buses with shift switching-architectures and applications

    Publication Year: 1993, Page(s):23 - 29
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The authors introduce shift switching as a promising new technique for the design of several processor array architectures. The proposed technique can considerably improve the performance of reconfigurable bus systems. The purpose is to show that a reconfigurable bus system equipped with the shift switching capability can significantly reduce the cost to run a number of fundamental parallel algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First class functions and dynamic binding of methods to classes

    Publication Year: 1993, Page(s):217 - 223
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The implementation of the object-oriented paradigm adopted by Oberon, Oberon-2 and Modula-3 is analyzed and compared with a new technique proposed. The design principles adopted in the method are orthogonality with respect to the role of first-class procedures, minimality of extension, and generality of application. The constructs used are record type extensions and first-class procedures. The new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connection oriented data service in DQDB simulation studies of the guaranteed bandwidth protocol

    Publication Year: 1993, Page(s):339 - 345
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    The distributed queue dual bus (DQDB) standard accepted by the IEEE Standards Board in 1990 is incomplete in the sense that it does not specify details of isochronous service and connection oriented data service. The authors discuss the performance of a protocol which has been studied in all meetings of IEEE 802.6 since 1991. The guaranteed bandwidth (GBW) protocol for connection oriented data ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional descriptions of network management

    Publication Year: 1993, Page(s):454 - 460
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The author gives an insight into the work of the European community collaborative program, RACE. The focus is on the problems of developing network management solutions for the future Pan-European broadband network. This is explored by presenting the results of the RACE NETMAN project in conjunction with the work of associated telecommunications management networks (TMN) technology projects. As no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network traffic workload classification methods for workstation GUI applications

    Publication Year: 1993, Page(s):105 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    The authors attempt to provide a set of benchmarks for GUI (graphical user interface) applications developed under the X Window System, by proposing a method of classifying the GUI characteristics into classes based on a measure of graphical complexity. They conducted data gathering experiments on sample X applications from each GUI class measuring resource usage. The data were compiled, and the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic touring in a hypertext system

    Publication Year: 1993, Page(s):524 - 530
    Cited by:  Papers (2)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    A hypertext system connects information into a graph structure were related nodes of information are connected by links. The user browses through this network of links to gain knowledge. The authors propose an autonomous information gathering process which monitors the user's progress through the network, and a data structure for storing information about the user's activities in a form that can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnostic tests for communicating finite state machines

    Publication Year: 1993, Page(s):254 - 260
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The authors propose a diagnostic algorithm for the case where a protocol specification is given in the form of communicating finite state machines (CFSMs). Such an algorithm localizes the faulty transition in the protocol implementation once the fault has been detected. It generates, if necessary, additional diagnostic tests, which depend on the observed symptoms and which permit the location of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Xpress Transfer Protocol over the BERKOM B-ISDN network: Implementation and performance comparison with TCP/IP

    Publication Year: 1993, Page(s):296 - 302
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    The Xpress Transfer Protocol (XTP) is a typical example of a protocol with new mechanisms and functionality specifically designed for new high-speed network environments and applications. XTP can provide the full range of services needed to support distributed processing systems. A software implementation of XTP has been completed to run over the BERKOM broadband ISDN. The software architecture of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully phase transparent multidimensional trellis-coded MPSK

    Publication Year: 1993, Page(s):435 - 440
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A multidimensional trellis-code multiple shift keying (MPSK) system based on the coset code is proposed. The new configuration employs natural construction to design fully rotational invariant code. Codes of consistent structure are developed to enable the computer search of good multidimensional codes as well as the investigation of the sufficient conditions for set partitioning applied to the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing on reconfigurable buses

    Publication Year: 1993, Page(s):30 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The authors demonstrate novel uses for buses in a multiprocessor reconfigurable architecture both as topological descriptors and as powerful computational devices. This paradigm results in fast algorithms to solve a number of problems in computer arithmetic, image processing, and computer vision. An O(1) time algorithm is proposed to compute the sum and difference of two N-bit numbers usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible system interface ASIC for FDDI adapter

    Publication Year: 1993, Page(s):127 - 133
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The author presents a flexible system interface (FlexSi) application specific IC (ASIC) architecture to address the system bus bandwidth utilization and bus latency issues in fiber distributed data interface (FDDI) adapter design. The proposed ASIC is intended to be used in conjunction with National's FDDE chip set BSI-2 or MACSI. A learning model in the ASIC architecture understands the parameter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDOL: a declarative platform for developing OODB applications

    Publication Year: 1993, Page(s):224 - 230
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    The authors present a rule-based database language known as CDOL (comprehensive declarative object language). CDOL provides sublanguages for the expression of derived data, constraints, updates, and integrity rules. The basic rule language provides an expressive approach to extending the stored database with virtual attributes and classes. The constraint sublanguage of CDOL allows explicit declara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.