Seventh Annual International Phoenix Conference on Computers an Communications. 1988 Conference Proceedings

16-18 March 1998

Filter Results

Displaying Results 1 - 25 of 85
  • Seventh Annual International Phoenix Conference on Computers and Communications. 1988 Conference Proceedings (Cat. No.TH0188-3)

    Publication Year: 1988
    Request permission for commercial reuse | |PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • A survey of the impact of current linguistic research on computer applications

    Publication Year: 1988, Page(s):440 - 444
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (429 KB)

    Special logics for representing the semantics of domains peculiar to human language have been developed, and formal syntax research has been enriched by a substantial number of linguistically sound, formally specified grammatical theories that reflect a declarative rather than procedural approach to grammar and which embody the flexibility of information location afforded by unification. These the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive algorithm to ensure differential service in a token ring network

    Publication Year: 1988, Page(s):330 - 334
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (340 KB)

    A distributed and adaptive token-passing algorithm which can be used to maintain the mean waiting times at the hosts of a token-ring network at a prescribed ratio is presented. The algorithm is simple to implement, and simulation results indicate that it performs well. The algorithm can also be easily modified for other purposes; in this study the authors demonstrate its use in controlling the thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rendezvous type protocols without acknowledged packets

    Publication Year: 1988, Page(s):308 - 312
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (376 KB)

    An algorithm is proposed to make broadcast reliable; the authors subsequently use the reliable broadcast to support reliable, unacknowledged packet transfers in connectionless protocols. The ack-per-packet protocols are shown to have poor recovery characteristics, with built-in positive feedback loops. The proposed protocol addresses the issues of an efficient recovery from node-wide problems whil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol rate detectability of filtered OQPSK by a delay and multiply receiver

    Publication Year: 1988, Page(s):174 - 178
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB)

    The detectability of the symbol rate of an offset quadrature-modulated signal by a delay and multiply receiver is investigated. Signal pulses considered are filtered rectangular pulses. The signal-to-noise ratio (SNR) at the receiver output is used as the measure of detectability. The effects of timing error, amplitude balance and filter order are studied. Also, analytical results are compared wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert system tool for broadband cable plant design

    Publication Year: 1988, Page(s):464 - 468
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (344 KB)

    A formulation of the cable plant design problem using artificial intelligence and expert system techniques is described. The knowledge of the design engineer is captured in an interactive expert system. Such an expert system has been designed and implemented to provide the network designer with a tool to design the broadband cable plant. The design includes the knowledge representation for the cab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An O(log n) VLSI implementation of a parallel sorting algorithm

    Publication Year: 1988, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (368 KB)

    A parallel algorithm for sorting is developed which has a time complexity of O(log n) and requires n2/log n processors. The algorithm can be readily mapped onto an SIMD mesh-connected array of processors which has all the features of efficient VLSI implementation. The corresponding hardware algorithm maintains the O(log n) execution time and has a low... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Petri net models of queueing systems

    Publication Year: 1988, Page(s):324 - 329
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (472 KB)

    It is shown that for timed Petri nets with exponentially distributed firing times (M-timed Petri nets), the state space can be generated directly from net specifications, and then the stationary probabilities of states can be obtained by standard methods, developed for analysis of (continuous-time) Markov chains. Numerous performance measures can be derived from stationary probabilities of states.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of switching program by object oriented simulator

    Publication Year: 1988, Page(s):296 - 300
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (364 KB)

    An object-oriented switching program verification system is presented, focusing on the basic concept and implementation of the system. The system consists of three basic functions: a model of the switching system, a simulation-control mechanism and a verification mechanism. The object-oriented approach makes the model valid and flexible. A simulation algorithm is based on reachability analysis. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unbounded protocol for point to multipoint communication

    Publication Year: 1988, Page(s):391 - 396
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (476 KB)

    The design and analysis of a protocol with an unbounded sequence space that ensures reliable point-to-multipoint communication over local area networks is considered. Analytical models are used to obtain throughput and delay characteristics. Simulation is used to provide an assessment of the analytical results. Salient features of the authors' approach are: (i) the responsibility of ensuring relia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri FYI-an intelligent user-extensible system specification tool

    Publication Year: 1988, Page(s):208 - 212
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (376 KB)

    A description is given of Petri FYI, a systems specification tool based on the Petri-net model of computation, and suitable for design of concurrent systems. It allows the user to specify, manipulate and reason about systems as would an expert developer, using episodic and program-slice models. Petri FYI was implemented using PROLOG, which allowed rapid prototyping with predicate calculus as an ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A relaxational approach to the Hough transform

    Publication Year: 1988, Page(s):485 - 489
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (380 KB)

    A cooperative Hough transform (CHT) that is similar to the relaxation process is suggested to reduce the amount of storage needed for the parameter space. The parameter space in the CHT is represented as a set of one-dimensional arrays that are designated by projection arrays. The votes in this space are computed in a many-to-one fashion. They are accumulated on the projection arrays with some wei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of a new data type to a high-level language to improve accuracy of computation

    Publication Year: 1988, Page(s):126 - 130
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB)

    It is proposed that a novel type, called a rational type, be added to the set of existent types in high-level languages to enhance the accuracy of computation. Most fractions cannot be represented exactly in the real type or floating-point type that are currently available in high-level languages. In the proposed type, a real number is expressed as a ratio of two integers. It has already been esta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the implementation of an optical token-ring LAN

    Publication Year: 1988, Page(s):166 - 172
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    A description is given of an MAC (medium access control) and physical layer implementation of DAFNE, a multiservice optical local area network using the token ring access method. The nodes' hardware structure and the technologies chosen for their implementation are described. The implementation of the layers and their interface with the optical ring are investigated. The optical components used ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change management for very large software systems

    Publication Year: 1988, Page(s):280 - 285
    Cited by:  Papers (7)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (428 KB)

    The INFUSE change-management facility's methodology is briefly explained and its use of a hierarchy of experimental databases for controlling and coordinating changes is described. The authors then present the algorithm which INFUSE uses to automatically build and maintain this hierarchy. Some results of the application of INFUSE are given; one presented hierarchy is similar to one independently i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of software development information

    Publication Year: 1988, Page(s):240 - 244
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (472 KB)

    A software development methodology that can be termed structured software development information generation is presented. Current software development methodologies fall short of completely documenting the entire software development. Some means for filling these shortfalls and inadequacies are presented. The methods proposed are based on collecting information into a relational database. An enti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An AI-based network management system

    Publication Year: 1988, Page(s):458 - 461
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (324 KB)

    A preliminary network management prototype that is based on the cooperation of two components is described. A network monitoring and control system (NMCS), which uses advanced database management, graphics and man/machine interface techniques, is used for data collection and status evaluation. A rule-based expert system uses its acquired expert knowledge to recommend appropriate control actions to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an efficient unification processor

    Publication Year: 1988, Page(s):4 - 13
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (352 KB)

    A novel architecture is proposed for a unification processor based on a linear (parallel substitution) unification (LPSU) algorithm. The operations of parallel search and substitution are supported through associative techniques. The unification processor (UP) can be used as a coprocessor in a closely-coupled multiprocessing environment or as a processing resource in a distributed environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed broadcast algorithm for binary De Bruijn networks

    Publication Year: 1988, Page(s):318 - 322
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB)

    Broadcasting in a particular class of networks, namely binary De Bruijn networks (BDN), is examined. A binary De Bruijn network has 2n processing nodes with no more than four connections at each node. These networks are extremely versatile in the sense that they contain many useful topologies as subnetworks. The authors present a distributed algorithm for broadcasting in BDN that requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast in hypercube multiprocessors

    Publication Year: 1988, Page(s):26 - 30
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB)

    Existing hypercube multiprocessors only support one-to-one interprocessor communication. However, multicast (one-to-many) communication is needed for executing many data-parallel algorithms. An optimal multicast algorithm should be able to minimize both the traffic generated and the time required to delivery a message. By modeling this problem as a graph-theoretical problem, the authors conjecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous DS-CDMA system for VSAT satellite communication networks

    Publication Year: 1988, Page(s):140 - 144
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (340 KB)

    A direct-sequence code-division multiple-access (DS-CDMA) system was assessed from the technical feasibility standpoint for use with wide C-band transponders in standard 56-kb/s point-to-point communications. The basic concept of the DS-CDMA system discussed and the performances of DS-CDMA systems (asynchronous and synchronous) are explored. Extensive link analysis and system tradeoffs re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based software engineering tool for code analysis

    Publication Year: 1988, Page(s):291 - 295
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (308 KB)

    A rule-based software engineering tool is described that was developed for analyzing a large system of modules implemented in the Pascal language. It was used to create an intermodule cross-reference database for the system, a directed graph of procedure and function calls representing a high-level control-flow model of the system, and a collection of reports containing metric information about th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Language constructs for persistent object based programming

    Publication Year: 1988, Page(s):251 - 255
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (444 KB)

    Object-based multiprocessor systems provide facilities for preserving instances of data structures in their original form and manipulating them in parallel. This imposes demands on programming language designs to provide parallel processing with persistent object manipulation. ℵ is a language designed for parallel processing in such an environment. The author describes the main features of &... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new double-loop computer network: its simulated performance

    Publication Year: 1988, Page(s):386 - 390
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (308 KB)

    The advantages of double-loop ring structures have been exploited, especially at higher loads, leading to a novel structure for a double-loop network. Simulation results for the network's performance are given. They show that the network has a superior performance compared to other existing ring structures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A T1-based DSP modem for interfacing voice and packet networks

    Publication Year: 1988, Page(s):374 - 378
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    A packet-switched data network (PSDN) with dial-in or dial-out capability requires a large number of interfaces to the public switched telephone network (PSTN). A T1 trunk connected to an X.25 trunk by a multiple digital signal processing modem is proposed for this interface in place of individual telephone lines, modems and computer cables. The design and performance for this type of modem, meeti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.