By Topic

Singapore ICCS '94. Conference Proceedings.

Date 14-18 Nov 1994

Go

Filter Results

Displaying Results 1 - 25 of 75
  • A robust algorithm for passive angle tracking of multiple moving targets

    Publication Year: 1994, Page(s):935 - 938 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    The performance of MUSIC [Schmidt, 1979], Sastry's [Sastry et al., 1991], Sword's [Sword et al., 1990] and the like algorithms degrade rapidly in the absence of a perfect array geometry that introduces phase errors in the received data covariance matrix. In the present paper, a stable high resolution (SHIRE) algorithm, assuming no perfect array geometry for the receiving sensors, has been develope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shared time division duplexing

    Publication Year: 1994, Page(s):1073 - 1079 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Various multiple access schemes based on time-division and packet reservation are compared in terms of their statistical multiplexing capabilities, sensitivity to speech packet dropping, delay, robustness to lossy packet environments, and overhead efficiency. In particular, the authors propose a low-delay multiple access scheme, called shared time-division duplexing (STDD), which allows both the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate analysis of asymmetric packet switch modules under bursty and nonuniform traffic environment

    Publication Year: 1994, Page(s):1139 - 1143 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    This paper analyses the performance of output channel grouped asymmetric packet switch modules in ATM networks, under geometrically bursty input traffic with input/output traffic imbalance. The switch module considered has n inputs and m outputs. A packet destined for a particular output address (out of g) needs to access only one of the r available physical output ports; m=gr. The motivation for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of upper layers of computers and telephony switches for IN

    Publication Year: 1994, Page(s):964 - 968 vol.3
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    We present an architecture of CSTA, an OSI-application layer protocol that links the telecommunications and data processing environments to support a variety of applications. It allows flexible creation of new telecommunications services and applications. It allows computer users and applications to invoke telecommunications services on the switch View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-valued adaptive eigencomponents updated algorithm for beamforming

    Publication Year: 1994, Page(s):897 - 901 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    We consider a symmetrically distributed antenna array and develop an efficient real-valued adaptive algorithm to adjust the eigencomponents of the correlation matrix by an iterative technique. The iterative technique can alleviate the computation burden in the eigendecomposition. The proposed algorithm requires only O(M) real multiplications in each iteration and can converge faster than the LMS-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zech logarithmic decoding for two error-correcting cyclic codes-An analysis

    Publication Year: 1994, Page(s):1069 - 1072 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    An analysis of the decoding scheme for binary two error correcting cyclic codes whose generator polynomials have at most two irreducible factors has been presented. This class includes binary narrow sense BCH codes with designed distance 5. The decoding algorithm uses the Zech logarithm for the finite field in which the routes of the code lie View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiresolution block matching algorithm for motion estimation in video coding

    Publication Year: 1994, Page(s):1117 - 1120 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    Motion estimation is the most time-consuming task in current video coding standards. In this paper, we present a multiresolution block matching (MBM) algorithm for motion estimation in low bit-rate video coding. The proposed algorithm can adapt the spatial resolution of the local motion field according to the image scene. Simulations using real image sequences show that this algorithm not only red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicasting the ITU MCS: integrating point-to-point and multicast transport

    Publication Year: 1994, Page(s):1013 - 1017 vol.3
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Many designs for multicast transport protocols presume a homogeneous view of the network environment they are operating in, the latter hiding the various networks' features from the transport layer. However, knowing its underlying network characteristics enables a multicast transport protocol to adjust itself to particular networks. This can be important for providing a scalable, reliable multicas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounds on synchronized handoff performance in microcellular radio systems

    Publication Year: 1994, Page(s):1103 - 1107 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    In this paper we analyse the performance of a synchronized call handoff algorithm called the Hierarchical Optimization Handoff Algorithm (HOHA). New results are presented with the derivation of an analytical model which describes the behaviour of the HOHA and provides an upper bound on its performance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of an OSI RPC system

    Publication Year: 1994, Page(s):1195 - 1199 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    It is expected that the OSI-RPC (remote procedure call) will be the primary technique for providing communications support between components of open distributed processing environments. The paper presents a design and implementation of an OSI RPC mechanism based on the model proposed by ISO in its second Committee Draft View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-supported routing for intelligent networks and personalized wired communications

    Publication Year: 1994, Page(s):1027 - 1033 vol.3
    Cited by:  Papers (5)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    We present the architecture, capabilities, and applications of CSTA, a European ISDN-OSI interface for routing in intelligent networks. It allows computer-supported routing of all types of telephony calls: voice, video, image, and data. This enhances routing in telephony networks in terms of speed, throughput, reliability, support of call priorities, and customization of routing to users requireme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication processing techniques for multimedia systems

    Publication Year: 1994, Page(s):974 - 980 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Key techniques required for communication processing in multimedia systems are (1) high-speed protocol processing of every data packet and (2) simultaneously processing of many sessions. This paper proposes three solutions of high-performance protocol processing: protocol data unit management using page management method, assembling and disassembling of header and contents in hardware, and resched... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal scheduling for multiclass queues with blocking

    Publication Year: 1994, Page(s):1008 - 1012 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    A problem of optimal scheduling of multiple queues competing for service at a single station is considered, where each queue has a finite buffer and the service may be class dependent. The cost is linear in the number of waiting customers and also includes the cost of customers lost due to blocking upon arrival to a full queue. The scheduling problem is solved by converting to a discrete Markov de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inter-networking security

    Publication Year: 1994, Page(s):1190 - 1194 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Inter-networking security in a multi-vendor heterogeneous network environment is a critical problem for IT professionals. This paper analyzes the security threats in a multi-vendor network environment and proposes a network security architecture for building a secure distributed network. It also discusses various information security packages including crypto-systems, network authentication, and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency assignment problems with various constraints

    Publication Year: 1994, Page(s):1085 - 1089 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Studies the problem of assigning a collection of operating frequencies to a collection of radio transmitters under various constraints including co-channel constraints, adjacent-channel constraints and co-site constraints using graph-colouring methods. Traditionally, these methods have been applied only to the co-channel constraint problem. The authors show how they can be generalised to apply to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emerging packet network technologies and services

    Publication Year: 1994, Page(s):1158 - 1163 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Customer needs demand faster, reliable and integrated solutions to all kind of service needs: voice, text, image, video and data. There is increasingly more demand for speed and throughput on LANs, MANs, and WANs. Broadband ISDN is expected to be the backbone network technology that will integrate LANs, MANs, and WANs in a seamless manner. Initial introduction of ATM network is suggested via an ov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variance reduction of source-tracking response zeros of adaptive arrays in the presence of errors

    Publication Year: 1994, Page(s):930 - 934 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    A new technique to reduce the variances of the source-tracking response zeros of power inversion arrays in the presence of random amplitude and phase errors is investigated. Essentially, the ten, variances are reduced by dividing the original system into several spatially shifted power inversion arrays, averaging the weight vectors of these arrays, and determining the zeros of the spatially averag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive motion-compensated interframe prediction coding using subjective thresholding of wavelet transform coefficients

    Publication Year: 1994, Page(s):1135 - 1138 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    A psychovisual image compression method using multiresolution wavelet coefficients for adaptive motion compensation interframe prediction is proposed. It is shown that a higher compression ratio is achieved using this scheme when compared to the existing techniques View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of the ISDN PC card

    Publication Year: 1994, Page(s):1169 - 1174 vol.3
    Cited by:  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    This paper describes the ISDN PC card which is complied with the Personal Computer Memory Card International Association (PCMCIA) standard. By accessing an ISDN terminal with a portable PC and this card, the user can achieve a high level of communication functionality View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of adaptive mesh routing chip

    Publication Year: 1994, Page(s):1023 - 1026 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Design of an adaptive router chip with minimum possible delay is described. The designed router is for message passing between computers which are connected in 2D mesh topology. The implemented algorithm is the negative-first adaptive wormhole routing algorithm which is deadlock free, livelock free, minimal, and maximally adaptive. The functional blocks of the router and asynchronous interfaces be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved DC- and Nyquist-free error control line code

    Publication Year: 1994, Page(s):1064 - 1068 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    An improved DC- and Nyquist-free error control line code based on the (8,4) extended Hamming code is proposed and its performance is analyzed. To increase its code rate, two blocks of error control codes are used as a line code with simple pre-coding. The proposed code can be well suited for high speed communication links, where DC- and Nyquist-free pulse format, channel error control, and low-com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A programmable bursty traffic algorithm for use in packet-level discrete time packet switch simulation studies

    Publication Year: 1994, Page(s):1001 - 1003 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    A novel scheme for the classification and reproduction of packet channel burstiness is presented. Channels are described by burst-length-loading pairs, and an algorithm is presented which can faithfully reproduce any traffic characteristic for use in packet-level discrete time packet switch simulation studies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phase-coded pulse compression implementation for radar performance analysis

    Publication Year: 1994, Page(s):1039 - 1043 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    This paper evaluates the advantages of using phase-coded pulse compression technique for radar systems. A matched filter using mathematical models has been successfully implemented, and various simulations were done to evaluate the radar system's performance under noisy environment and its resistance to jamming. All simulations of transmission and reception of radar signals were done using the Sig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing a white page service to the Human Genome Project

    Publication Year: 1994, Page(s):1185 - 1189 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    As the Human Genome Project grows, so does the number of genome users, activities, organizations, and databases. There is a need to provide an electronic white page service to genome users, so that a genome user can for instance find out the e-mail address of a remote genome user or the network address of a genome database server. Because of the distributed and heterogeneous nature of the Human Ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A gain/phase calibration technique for adaptive beamforming

    Publication Year: 1994, Page(s):912 - 914 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    A calibration technique is proposed to handle the minimum variance distortionless response (MVDR) adaptive beamforming problems involving unknown perturbed sensor/channel gain and phase. This technique is using basically the property of the MUSIC null spectrum. From the computer study, it is found that this technique exhibits relatively stable performance over other existing techniques in the sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.