Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Seventh Annual International Phoenix Conference on Computers an Communications. 1988 Conference Proceedings

16-18 March 1998

Filter Results

Displaying Results 1 - 25 of 85
  • Seventh Annual International Phoenix Conference on Computers and Communications. 1988 Conference Proceedings (Cat. No.TH0188-3)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • A survey of the impact of current linguistic research on computer applications

    Publication Year: 1988, Page(s):440 - 444
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB)

    Special logics for representing the semantics of domains peculiar to human language have been developed, and formal syntax research has been enriched by a substantial number of linguistically sound, formally specified grammatical theories that reflect a declarative rather than procedural approach to grammar and which embody the flexibility of information location afforded by unification. These the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Central clocked event-triggered local modulo-N-counting for bus arbitration

    Publication Year: 1988, Page(s):106 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Central clocked local modulo-N-counting methods are presented for fast distributed-bus arbitration. A model with discrete time is introduced for description, presentation, analysis and simulation of these counting techniques. With one or two active units the analytical solutions for the minimum mean transfer time and the maximum throughput of a unit are derived. Simulation results are sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Violation detection and recovery of distributed programs' safety properties

    Publication Year: 1988, Page(s):99 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    On the basis of communication-closed layers of a distributed program, the author suggests the use of a communication-closed layer as the syndicate unit for dynamically detecting and recovering from violations of safety properties as defined by the static portions of the specifications. A fault-tolerant layer is composed of several communication-closed layers known as alternate layers, each of whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of memory management schemes for a multimemory-multiprocessor system

    Publication Year: 1988, Page(s):94 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    The virtual memory management schemes for a multimemory-multiprocessor system based on bus-structured architecture are dealt with. The design issues peculiar to such a system are pointed out. Various schemes to manage them are introduced. Simulations of the memory management schemes are carried out to evaluate the design alternatives. A queuing network model is established to predict the overall s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic file management techniques

    Publication Year: 1988, Page(s):86 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Consideration of the dynamic characteristics of file referencing behavior provides an appropriate basis for the design of effective algorithms for the management of a hierarchical file system. Several algorithms are proposed, based on similar algorithms in the memory referencing context. Trace-driven simulation experiments were conducted to assess the performance implications of these approaches. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMPSS: automated multiprocessor synthesis system

    Publication Year: 1988, Page(s):81 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    The authors' system, AMPSS, takes an algorithmic description of a digital system and maps it into a multiprocessor architecture. This mapping is done in two steps. In the first step, the algorithm description is mapped onto a two-dimensional array of processors working in synchrony with a system clock. This mapping is done using a space-time transformation. In the second step, the task assigned to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The grid bus architecture for MIMD

    Publication Year: 1988, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    An MIMD computer interconnection architecture, the grid bus architecture, is explored. Algorithms are introduced which route messages in an efficient and fault-tolerant manner. A chip which implements the basic algorithm was built to show how the algorithm can be designed into hardware. Simulations of the architecture show the decrease in performance under high loads and larger array sizes. Other ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing open networks

    Publication Year: 1988, Page(s):410 - 412
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    The progress and schedules associated with OSI management standardization, and efforts to define network management requirements, are reviewed; the author synopsizes the ISO efforts to standardize management communication services for specific functional areas of management, reviews efforts to integrate network management across ISO and non-ISO environments, and examines some of the advanced needs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault diagnosis and reconfiguration for reliable VLSI arrays

    Publication Year: 1988, Page(s):69 - 73
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    An online fault-tolerant strategy is proposed; it is composed of two phases: testing and locating faults, and reconfiguration. In the first phase, an online testing technique is used, which is a compromise between the commonly used techniques of time and space redundancy. It is capable of detecting permanent as well as transient faults. The reconfiguration phase is realized by using a global contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A laboratory for testing DoD protocol implementations: its architecture and methodologies

    Publication Year: 1988, Page(s):404 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    An examination is made of the protocol laboratory developed by Unisys Defense Systems for the US Defense Communications Agency. The laboratory was created to test implementations of the DoD Internet protocols (IP, TCP, FTP, SMTP, Telenet) for compliance with the military standards. The authors explain the need for such testing, discuss the testing principles on which the laboratory was founded, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reconfigurable multiple-SIMD/MIMD/TMR system for multi-phase space-based missions

    Publication Year: 1988, Page(s):62 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The way in which a shuffle/exchange network is managed for single and multiple hybrid triplicated-modular-redundancy operations in addition to the normal SIMD, MIMD and multiple MIMD operations is described. The proposed system, the Omega/H(3,S), is suitable for applications that require various phases of a mission. Two TMR configurations are embedded in the structure of the routing netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A testing methodology to assess conformance for OSI application protocol entities

    Publication Year: 1988, Page(s):397 - 403
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    A testing architecture that can be applied appropriately to the various components of the OSI application layer (the application service elements and user elements) is developed. Finally, the authors present a relevant example concerning testing of the job transfer and manipulation protocol View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid differential encoder and non-linear filter (DEN filter)

    Publication Year: 1988, Page(s):470 - 473
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    A system is presented to combine two goals in image processing; compression and non-linear filtering. The compression is done using a modified differential Huffman coding technique. The non-linear filter uses a bounding technique to filter impulse noise while passing edges. Simulation results are presented in tabular form, along with several original and filtered images added for subjective viewin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerance design of VLSI two dimension systolic processor array

    Publication Year: 1988, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    After briefly reviewing the development of the IC, the authors point out the necessity of introducing fault tolerance techniques to IC design. They discuss two fundamental fault tolerance design techniques for two-dimensional systolic array: direct reconfiguration and a fault-stealing algorithm. The authors propose a reconfiguration method which is easier and more successful than that given by M.G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive algorithm to ensure differential service in a token ring network

    Publication Year: 1988, Page(s):330 - 334
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A distributed and adaptive token-passing algorithm which can be used to maintain the mean waiting times at the hosts of a token-ring network at a prescribed ratio is presented. The algorithm is simple to implement, and simulation results indicate that it performs well. The algorithm can also be easily modified for other purposes; in this study the authors demonstrate its use in controlling the thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based software engineering tool for code analysis

    Publication Year: 1988, Page(s):291 - 295
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A rule-based software engineering tool is described that was developed for analyzing a large system of modules implemented in the Pascal language. It was used to create an intermodule cross-reference database for the system, a directed graph of procedure and function calls representing a high-level control-flow model of the system, and a collection of reports containing metric information about th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unbounded protocol for point to multipoint communication

    Publication Year: 1988, Page(s):391 - 396
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The design and analysis of a protocol with an unbounded sequence space that ensures reliable point-to-multipoint communication over local area networks is considered. Analytical models are used to obtain throughput and delay characteristics. Simulation is used to provide an assessment of the analytical results. Salient features of the authors' approach are: (i) the responsibility of ensuring relia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert system tool for broadband cable plant design

    Publication Year: 1988, Page(s):464 - 468
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    A formulation of the cable plant design problem using artificial intelligence and expert system techniques is described. The knowledge of the design engineer is captured in an interactive expert system. Such an expert system has been designed and implemented to provide the network designer with a tool to design the broadband cable plant. The design includes the knowledge representation for the cab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLSI designs for redundant binary-coded decimal addition

    Publication Year: 1988, Page(s):52 - 56
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A binary-coded decimal system provides rapid binary-decimal conversion. However, BCD arithmetic operations are often slow and require complex hardware. One can eliminate the need for carry propagation and thus improve performance of BCD operations by using a redundant binary-coded decimal (RBCD) system. The VLSI design of an RBCD adder is introduced. The design consists of two small PLAs and two f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neuromorphic approach to adaptive digital circuitry

    Publication Year: 1988, Page(s):19 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    A design for an adaptive digital circuit based on neuromorphic (brain-inspired) architecture is proposed. The neuromorphic model used is a two-layered perceptron that utilizes a form of least-mean-square error correction in order to learn appropriate internal representations necessary to accomplish the mapping of binary input vectors into desired binary output vectors. The proposed network design ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and simulation of 1553 bus for upset tolerance experiments

    Publication Year: 1988, Page(s):131 - 135
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    Since satellite systems are particularly susceptible to transient faults induced by the radiation environment, a satellite communication protocol model has been developed for experimental research purposes. The model implements the MIL-STD-1553B protocol, which dictates the modes of communication between several satellite subsystems. The model has been developed using the behavioral and structural... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Petri net models of queueing systems

    Publication Year: 1988, Page(s):324 - 329
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    It is shown that for timed Petri nets with exponentially distributed firing times (M-timed Petri nets), the state space can be generated directly from net specifications, and then the stationary probabilities of states can be obtained by standard methods, developed for analysis of (continuous-time) Markov chains. Numerous performance measures can be derived from stationary probabilities of states.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flow analysis technique for parallel computations

    Publication Year: 1988, Page(s):286 - 290
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    A flow-analysis technique for real-time parallel computations at the computation level is presented. The technique is based on reducing the given parallel computation to a sequential one and then applying one of the available flow-analysis techniques for sequential computations. An example is given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new double-loop computer network: its simulated performance

    Publication Year: 1988, Page(s):386 - 390
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The advantages of double-loop ring structures have been exploited, especially at higher loads, leading to a novel structure for a double-loop network. Simulation results for the network's performance are given. They show that the network has a superior performance compared to other existing ring structures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.