By Topic

Seventh Annual International Phoenix Conference on Computers an Communications. 1988 Conference Proceedings

16-18 March 1998

Filter Results

Displaying Results 1 - 25 of 85
  • Seventh Annual International Phoenix Conference on Computers and Communications. 1988 Conference Proceedings (Cat. No.TH0188-3)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • A survey of the impact of current linguistic research on computer applications

    Publication Year: 1988, Page(s):440 - 444
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB)

    Special logics for representing the semantics of domains peculiar to human language have been developed, and formal syntax research has been enriched by a substantial number of linguistically sound, formally specified grammatical theories that reflect a declarative rather than procedural approach to grammar and which embody the flexibility of information location afforded by unification. These the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quantitative model-based expert system for LAN development

    Publication Year: 1988, Page(s):429 - 433
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    A quantitative model-based expert system, or QMB for short, is described. A QMB is a rule-based system coupled to an analytic model. The QMBs provide another level of refinement over rule-based systems by giving quantitative answers to problems. He discusses the difficulties associated with the design of a shell for a QMB and proposes the use of a semishell, which assists the knowledge engineers i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of a prototype of an intelligent operating system consultant

    Publication Year: 1988, Page(s):424 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Work on an intelligent operating system consultant and teacher (OSCAT) intended for use in a training environment is discussed. The ultimate goal of OSCAT is to test the theories necessary to describe the functions of such a knowledge-based system. The pragmatic aims of OSCAT are to create an interface to an operating system that offers intelligent features for control and interrogation of the und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri FYI-an intelligent user-extensible system specification tool

    Publication Year: 1988, Page(s):208 - 212
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    A description is given of Petri FYI, a systems specification tool based on the Petri-net model of computation, and suitable for design of concurrent systems. It allows the user to specify, manipulate and reason about systems as would an expert developer, using episodic and program-slice models. Petri FYI was implemented using PROLOG, which allowed rapid prototyping with predicate calculus as an ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NBS network management requirements study

    Publication Year: 1988, Page(s):413 - 414
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The major issues in the development of OSI management standards are examined. The use of multiple managers is discussed. Other important topics discussed include blocking in management services and protocols, and the need for managing implementation-dependent resources View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based software engineering tool for code analysis

    Publication Year: 1988, Page(s):291 - 295
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A rule-based software engineering tool is described that was developed for analyzing a large system of modules implemented in the Pascal language. It was used to create an intermodule cross-reference database for the system, a directed graph of procedure and function calls representing a high-level control-flow model of the system, and a collection of reports containing metric information about th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical panel-application of AI and expert systems to the design of very large distributed systems

    Publication Year: 1988, Page(s):194 - 200
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    This panel discussion consists of four position papers examining the potential of applying concepts and theories from the fields of artificial intelligence (AI) and expert system design in the research and development of distributed systems. The focus is on aspects of the operating systems and their stringent requirements as reflected in their complex decision-making processes. The panelists recog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modular design for providing ISDN switching hardware in the GTD-5 EAX

    Publication Year: 1988, Page(s):370 - 373
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Innovative hardware and firmware design approaches for switching network and facility interface circuitry are described. The ISDN module makes use of recent advances in semiconductor and packaging technology. These technologies are supplemented by novel design techniques which provide a highly integrated, fault-tolerant and modular system. The module supports basic (2B+D) and primary (23B+D) rate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The robustness of tree algorithms in an unshared feedback error environment

    Publication Year: 1988, Page(s):313 - 317
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The robustness of the Capetanakis Collision Resolution Algorithm (CCRA) for multiple-access networks is discussed. In particular, the authors show that the algorithm is robust against errors that cause different stations to see different feedback information on the results of transmission attempts, and they quantify, through simulations, the performance (throughput/delay) degradation caused by tho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing open networks

    Publication Year: 1988, Page(s):410 - 412
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    The progress and schedules associated with OSI management standardization, and efforts to define network management requirements, are reviewed; the author synopsizes the ISO efforts to standardize management communication services for specific functional areas of management, reviews efforts to integrate network management across ISO and non-ISO environments, and examines some of the advanced needs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An interface providing portability for operating system kernels: the BIGSAM ideal machine

    Publication Year: 1988, Page(s):234 - 239
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The design of a kernel/machine interface, which provides portability for an operating system kernel, and its implementation in the BIGSAM distributed operating system are discussed. The interface, consisting mostly of a set of procedure calls and the routines that implement them, provides an abstract or ideal machine on which the rest of the kernel runs. The basic concept of an ideal machine and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast in hypercube multiprocessors

    Publication Year: 1988, Page(s):26 - 30
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Existing hypercube multiprocessors only support one-to-one interprocessor communication. However, multicast (one-to-many) communication is needed for executing many data-parallel algorithms. An optimal multicast algorithm should be able to minimize both the traffic generated and the time required to delivery a message. By modeling this problem as a graph-theoretical problem, the authors conjecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flow analysis technique for parallel computations

    Publication Year: 1988, Page(s):286 - 290
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    A flow-analysis technique for real-time parallel computations at the computation level is presented. The technique is based on reducing the given parallel computation to a sequential one and then applying one of the available flow-analysis techniques for sequential computations. An example is given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unbounded protocol for point to multipoint communication

    Publication Year: 1988, Page(s):391 - 396
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The design and analysis of a protocol with an unbounded sequence space that ensures reliable point-to-multipoint communication over local area networks is considered. Analytical models are used to obtain throughput and delay characteristics. Simulation is used to provide an assessment of the analytical results. Salient features of the authors' approach are: (i) the responsibility of ensuring relia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous DS-CDMA system for VSAT satellite communication networks

    Publication Year: 1988, Page(s):140 - 144
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A direct-sequence code-division multiple-access (DS-CDMA) system was assessed from the technical feasibility standpoint for use with wide C-band transponders in standard 56-kb/s point-to-point communications. The basic concept of the DS-CDMA system discussed and the performances of DS-CDMA systems (asynchronous and synchronous) are explored. Extensive link analysis and system tradeoffs re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new performance estimation technique for digital transmission systems using a single parity check code

    Publication Year: 1988, Page(s):184 - 190
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    A robust estimation scheme for bit-error rates in live traffic digital transmission systems that use a binary single-parity check code for error detection is proposed. The scheme estimates the bit error rate by converting the estimates of the parity error detection rate. This is done through the use of a closed form of the detection probability of the single-parity code. The form is expressed in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum likelihood decoding applied to run length limited codes

    Publication Year: 1988, Page(s):112 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    To control the level of intersymbol interferences while providing synchronization for read-back data, run-length-limited codes are widely used in modern recording systems. The feasibility of utilizing the redundancies introduced by these codes and the intrinsic correlative aspects of magnetic recording channels is used to improve the output error probability. To accomplish this, a modified Viterbi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerance design of VLSI two dimension systolic processor array

    Publication Year: 1988, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    After briefly reviewing the development of the IC, the authors point out the necessity of introducing fault tolerance techniques to IC design. They discuss two fundamental fault tolerance design techniques for two-dimensional systolic array: direct reconfiguration and a fault-stealing algorithm. The authors propose a reconfiguration method which is easier and more successful than that given by M.G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective algorithms for partitioning distributed programs

    Publication Year: 1988, Page(s):363 - 368
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Results are presented on the effectiveness of several algorithms for partitioning graphs with weighted nodes and edges. Such graphs can represent a number of interesting program structures, such as processes using message passing or dataflow graphs and other distributed software. The graph partitions can be used in software tools to control the allocation of program units to distributed processes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kernel mechanisms for distributed real-time programs

    Publication Year: 1988, Page(s):218 - 222
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The design of a kernel for distributed real-time programs is described. This design allows a distributed real-time program to be configured by interconnecting ports of component processes. This configuration is specified separately from the programs of individual processes, permitting easy reconfiguration of programs. The kernel provides mechanisms for both asynchronous and synchronous communicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rendezvous type protocols without acknowledged packets

    Publication Year: 1988, Page(s):308 - 312
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    An algorithm is proposed to make broadcast reliable; the authors subsequently use the reliable broadcast to support reliable, unacknowledged packet transfers in connectionless protocols. The ack-per-packet protocols are shown to have poor recovery characteristics, with built-in positive feedback loops. The proposed protocol addresses the issues of an efficient recovery from node-wide problems whil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Petri net models of queueing systems

    Publication Year: 1988, Page(s):324 - 329
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    It is shown that for timed Petri nets with exponentially distributed firing times (M-timed Petri nets), the state space can be generated directly from net specifications, and then the stationary probabilities of states can be obtained by standard methods, developed for analysis of (continuous-time) Markov chains. Numerous performance measures can be derived from stationary probabilities of states.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A laboratory for testing DoD protocol implementations: its architecture and methodologies

    Publication Year: 1988, Page(s):404 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    An examination is made of the protocol laboratory developed by Unisys Defense Systems for the US Defense Communications Agency. The laboratory was created to test implementations of the DoD Internet protocols (IP, TCP, FTP, SMTP, Telenet) for compliance with the military standards. The authors explain the need for such testing, discuss the testing principles on which the laboratory was founded, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slotted Aloha performance in a Rician fading environment

    Publication Year: 1988, Page(s):152 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Problems facing packet radio networks operating within buildings are outlined. The performance of the Aloha protocol in Rician fading channels with receiver capture and diversity is studied. The performance is found to be similar to Rayleigh channels for environments with a high variation in shadow losses but inferior to Rayleigh channels for environments with low variation in shadow losses View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.