By Topic

Emerging Technologies and Applications in Communications, 1996. Proceedings., First Annual Conference on

7-10 May 1996

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • SLINKY: a URL server

    Publication Year: 1996, Page(s):120 - 123
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB)

    In the same way that the IMAP protocol provides secure, ubiquitous access to a user's email, an analogous protocol is desirable to enable user access to an organized collection of URL links that comprise a private mapping of the Web document space. This paper describes the design and staged implementation of a SLINKY server that meets these goals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • THE META MODEL CONSTRAINT REMOVAL PROTOCOL: VIRTUAL REALITY FAIRNESS FOR WAR GAME NETWORKED EXERCISE

    Publication Year: 1996, Page(s):124 - 130
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (963 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intercast-enabling a mainstream broadcast medium for the personal computer

    Publication Year: 1996, Page(s):176 - 177
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB)

    Summary form only given. This paper describes the purpose, features and architecture of Intercast, a project under development in Intel's Internet Technology Lab (ITL) which enhances conventional television programming with additional, structured data, allowing the PC to add value to the TV experience. This associated digital information augments the broadcast television content and can be watched... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • When agents roam, who can you trust?

    Publication Year: 1996, Page(s):188 - 191
    Cited by:  Papers (20)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Roaming agents threaten a server with theft of assets, system resources and reputation. Generally ignored is the reciprocal threat of server against agent. Not only might a server steal the assets, resources, and reputation of an agent, but it might actually kill the agent. The central security concern for systems that allow agents to roam is how to establish trust, and how to limit risk for both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security considerations in agent-based systems

    Publication Year: 1996, Page(s):184 - 187
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Agent systems face all the security challenges involved with any system that sends messages. Delegating tasks to mobile programs, or to supposedly intelligent ones, raises another set of concerns. Agent-based systems also increase the connectedness and the complexity of the computing universe. As connectedness and complexity increase, new failure modes arise, some of which have security implicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia Communications eXchange (MMCX) local and wide area network considerations

    Publication Year: 1996, Page(s):148 - 155
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The Multimedia Communications eXchange (MMCX) product provides multimedia (voice, video and data) desktop collaboration. The MMCX client/server architecture supports multimedia calling between endpoints on the local area network, and also provides access to the wide area network. The MMCX endpoints can make multimedia calls across the WAN in multiserver networks, and can place audio calls to tradi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making mobile agents communicate: a flexible approach

    Publication Year: 1996, Page(s):180 - 183
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The authors assume agents to be computer programs that help a user to perform a task or set of tasks. They consider primitives for agent communication, interaction styles and blackboard systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia bridging: a structured view

    Publication Year: 1996, Page(s):144 - 147
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Multimedia, multipoint applications require the processing and coordination of audio, video and data, to unsure that each participant or user receives the proper media traffic mix in the expected format at the expected time. Such a requirement is met by multimedia bridging, which encompasses many functions, including, event ordering, multimedia synchronization, network-user interfacing, media proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPEG-2 conformance testing for interoperability

    Publication Year: 1996, Page(s):42 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    Cable Television Laboratories, Inc., has set up a laboratory to test conformance of consumer electronics equipment with the MPEG-2 standard. This paper discusses some MPEG background and initial MPEG-2 conformance testing for interoperability at CableLabs' testing laboratory. The methodology for performing encoder/decoder compliance testing is explained. Software and hardware platforms to support ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proxy-sharing proxy servers

    Publication Year: 1996, Page(s):116 - 119
    Cited by:  Papers (4)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    A proxy server is a Web server that caches Internet resources for re-use by a set of client machines. CERN's Web server implements proxy services and CERN-based proxy servers are in wide use at the enterprise level. This paper presents the design and implications of an extended proxy server that shares cache resources with near neighbors. A substantial reduction in internetwork load can be obtaine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The etaCOM network

    Publication Year: 1996, Page(s):94 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    The goal of the etaCOM network is twofold. One to handle the applications to be exhibited and the other to demonstrate the network itself. Five technology tracks are demonstrated: ATM, Internet, wireless, multimedia, and client-server. The etaCOM network shows the following: (a) ATM interoperability; (b) temporary Internet services; (c) wireless Internet services; (d) automatic teller machines wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture and implementation of a multimedia conference system

    Publication Year: 1996, Page(s):50 - 53
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    A new multimedia conference system is designed and implemented. The system allows a group of users to conduct a meeting in real time. Participants can jointly view and edit relevant multimedia information, including text, graphics, and still images distributed throughout the network. Participants can also communicate simultaneously by voice to discuss the information they are sharing. This multime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer and network-based multimedia bridging architectures

    Publication Year: 1996, Page(s):140 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Two kinds of multimedia conferencing bridging systems are examined: peer-to-peer and network-based bridging architecture. The investigation shows that the network-based system outperforms the peer-to-peer architecture in saving the bandwidth in the access link as well as within the network especially for audio and video. However, peer-to-peer bridging appears to be optimal for data View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A compositional approach to the specification of multimedia objects using Petri nets

    Publication Year: 1996, Page(s):38 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    We propose a compositional Petri net model, called CoPN, for multimedia synchronization specifications. The salient features of this model, including macroplaces and PN entities, are presented and the application of the CoPN model to multimedia synchronization specification is discussed via some simple examples. This compositional approach enables the compact and readable specification of complex,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing an enterprise ATM network

    Publication Year: 1996, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    This paper proposes the strategy of conducting a staged and controlled implementation of an ATM LAN within an enterprise in order to reducing the risk to the general corporate user as legacy connections are replaced. Project implementation is broken into eight separate sub-projects, each of which can stand on its own once implemented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Death of a phone system: an Internet viewpoint on computer telephony integration

    Publication Year: 1996, Page(s):131 - 133
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Computer telephony integration (CTI) holds the promise of changing the way in which we use our phones and computers. The Internet has always been ready for voice, in fact it is already ready for video. It is only now with the introduction of high speed broadband technologies like ATM, 100 Mbps LANs, and FDDI can one introduce this multimedia on the Internet. The author describes the state at which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superconductor RF filtering and CDMA capacity

    Publication Year: 1996, Page(s):170 - 173
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    This paper exploits how the interference suppression capability of the front-end RF filter in a cellular base station affects the performance characteristics of a dual CDMA cellular communication system. Analytical results of degradation on CDMA system performance in the presence of intersystem interference is analyzed, where the intersystem interference is caused by intermodulation between two ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing and browsing WWW semantic content

    Publication Year: 1996, Page(s):110 - 113
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    In order to realize the potential of the World Wide Web (WWW) to supply information it will be necessary to significantly increase the effectiveness of existing search and retrieval mechanisms. One promising approach is visualization, which has been used successfully in an wide range of domains to provide insight into the organization of complex systems, The Document Explorer system creates a visu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protocol simulator for the Thunder and Lightning ATM network

    Publication Year: 1996, Page(s):28 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    Software simulators have often been used to test and validate new protocols, but the high bandwidth of newly emerging ATM networks implies prohibitive memory requirements. This paper describes several simulation techniques we have devised as part of the Thunder and Lightning project to build 40 and 100 gigabit per second ATM networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attenuation and interference measurements conducted by Bell Atlantic to investigate the effect on an operational multichannel multipoint distribution service (MMDS)

    Publication Year: 1996, Page(s):88 - 91
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The paper presents the results from signal attenuation due to trees, and radar interference testing conducted on the multichannel multipoint distribution service (MMDS), in operation at Virginia Beach, VA. The test data collected provides valuable information on the effects of attenuation caused by the foliage of trees common to the area, and interference from an aviation radar system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WAVE: mobile intelligence in open networks

    Publication Year: 1996, Page(s):192 - 195
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    A novel technology called WAVE for distributed processing and control in large open systems is presented. The technology, combining mobile agent ideology with parallel processing of distributed semantic networks, may be efficiently used on a variety of system organisation levels, ranging from intelligent communication protocols to arbitrary parallel and distributed applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2 Mb/s DPSK modem for infrared wireless LAN and data communications

    Publication Year: 1996, Page(s):158 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The paper shows the design of a 2 Mb/s wireless IR experimental modem using DPSK modulation. This modem is suitable for LAN and data communications in office environments using both diffuse and quasidiffuse IR beams. The paper focuses on optical transmitter and receiver design, due to the optical power and sensitivity limitations in such links View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in multimedia scaling: the MPEG video streams case

    Publication Year: 1996, Page(s):46 - 49
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Multimedia streams usually have an inherent hierarchy and an inter-independency of subsequent blocks in their data structures. Dealing with these features within the operating system and the network brings a global resource usage improvement. We propose a new method for media scaling based on two complementary techniques: circular buffers and filtering. We describe an MPEG distributed application ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.