By Topic

Networks, 1995. Theme: Electrotechnology 2000: Communications and Networks. [in conjunction with the] International Conference on Information Engineering., Proceedings of IEEE Singapore International

Date 3-7 July 1995

Filter Results

Displaying Results 1 - 25 of 139
  • Proceedings of IEEE Singapore International Conference on Networks and International Conference on Information Engineering '95

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (901 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Author's index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • A phase error tracking algorithm for demodulating QPSK-spread IS-95 signal

    Publication Year: 1995, Page(s):459 - 462
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    In this paper, using a linear characteristic of tan-1() function with in-phase and quadrature-phase samples, we propose a phase error tracking and correcting algorithm for demodulating QPSK-spread IS-95 signal. We derive the proposed algorithm and simulate the performance which shows that the proposed algorithm corrects the phase error between the transmitted and the received signals View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental environment for parallel discrete-event simulation of communication networks

    Publication Year: 1995, Page(s):190 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Achieving speedup in discrete-event simulations of communication networks can be done through the use of a network of heterogeneous workstations. The authors describe the realization of an environment for performing these simulations through the use of a graphical user interface tool. With this environment, they evaluated the parallel discrete-event simulation program by simulating Omega networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The architecture of and support provided by the RHODOS distributed file facility

    Publication Year: 1995, Page(s):508 - 512
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    We propose an architecture for the distributed file facility. It explores the potentials of the client server model and is fully scalable. We also report on the support provided to redirection of standard I/O, creation of medium weight processes and migration of processes by this facility View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of the multicast transport protocols using Petri nets

    Publication Year: 1995, Page(s):106 - 110
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    After a brief introduction to the theory of Petri nets, the MTP (multicast transport protocols) for the distributed network management system is presented. The authors designed the group communication protocol which has low protocol-message overhead and efficiency. The atomic and reliable group communication protocol designed in the paper guarantees that each message sent to a group is delivered t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Messenger communication

    Publication Year: 1995, Page(s):177 - 180
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The current model of computer communication is based on Shannon's (1949) model consisting of a sender, a channel and a recipient, where the sender sends a packet of data, along a channel to the recipient. Usually there are two channels, one each direction, allowing data flow in both directions. A protocol can be understood as a procedure which enhances the quality of the message exchange. Messenge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing fault-tolerant services in an open client/service paradigm

    Publication Year: 1995, Page(s):576 - 580
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The design and understanding of fault-tolerant open distributed systems is a very difficult task. We have to deal with not only all the complex problems of open distributed systems when all the components are well, but also the more complex problems when some of the components fail. This paper proposes a fault-tolerant computing model on open distributed systems. The performance of the model is si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous media recording for video conferencing

    Publication Year: 1995, Page(s):550 - 554
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    In this paper, we present a new real-time file system architecture which is optimized for supporting continuous media recording in video conference applications. We show that this new design optimizes simultaneously several performance criteria, i.e., minimum buffer size, maximum I/O bandwidth utilization, maximum I/O throughput, minimum I/O latency and minimum response time. Design of this file s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of the distributed Lisp

    Publication Year: 1995, Page(s):195 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    A number of parallel Lisp languages on shared-memory multiprocessors have previously been proposed and implemented. However, the current environments for existing Lisp language systems are mostly general purpose workstations(WSs) without shared-memory. The present authors have designed a distributed Lisp (DLisp) system that runs on commonly used environments such as UNIX, X-Window and WSs connecte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient multirate FDM demultiplexer for satellite communication systems

    Publication Year: 1995, Page(s):527 - 531
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    A new generation of “user-oriented” satellites with regenerative, on-board processing FDMA/TDM (frequency division multiple access and time division multiplexing) payloads has been proposed. A multicarrier demodulator (MCD) is required to interface the FDMA in the uplink and the TDM in the downlink. This paper presents the design of a polyphase-filter-FFT-bank (PFFB) demultiplexer as a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A client-server architecture for distributed problem solving

    Publication Year: 1995, Page(s):513 - 517
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The use of distributed systems has been constantly evolving during the last decade, a fact due to their lower aggregate cost, greater availability and higher flexibility. Distributed algorithms can, in addition, exploit the possibility offered by these systems for parallel execution and more sufficient use of resources. The paper describes a friendly environment supporting the development and exec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling policies for protocol stacks for user application requirements

    Publication Year: 1995, Page(s):111 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Presents some of the scheduling issues in a communication protocol stack and discusses it with respect to the requirements of the user applications. The authors present the architecture of LITMAP and discuss its salient features from the performance point of view. In particular, the flexible scheduling facility provided by LITMAP is presented in detail. Two scheduling policies are considered: firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifiable secret sharing and multiparty protocols in distributed systems

    Publication Year: 1995, Page(s):637 - 643
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    In this paper, we propose verifiable secret sharing and multiparty protocols in a distributed system under the assumption that each participant can broadcast a message to all other participants and that each pair of participants can communicate secretly. The secrecy achieved is unconditional and does not rely on any assumption about computational intractability. Applications of these results to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code acquisition for the DS-CDMA RAKE receiver in a multipath fading channel

    Publication Year: 1995, Page(s):215 - 219
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    This paper presents acquisition algorithm and an improved detection technique for the DS/CDMA (direct sequence code division multiple access) RAKE receiver in a multipath fading channel. DS/CDMA systems use the RAKE receiver to overcome signal fading due to multipath propagation. To maximize the performance improvement of the RAKE receiver, an accurate code acquisition is required for the RAKE bra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling of image distortion processes associated in video-phone systems and descriptors for image quality

    Publication Year: 1995, Page(s):473 - 477
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    A variety of video-phone systems have begun to appear in the consumer market. The quality of the images generated by these systems is severely affected by the bandwidth restriction of the twisted cable pair. Typically, some of these systems operate with a transmission bit rate less than 19.2 kbps. In comparing different systems with respect to image quality, one finds it useful to assess the quali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EPS: a parallel execution environment

    Publication Year: 1995, Page(s):199 - 203
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Parallel computers have the ability to enhance the computing performance of large applications economically. The difficulty lies in providing a suitable execution environment in which parallel applications can be executed. The paper examines important characteristics of a suitable environment for a parallel computer (the EPS). This environment supports the execution of parallel applications by pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wideband impulse response of indoor channel at 2 GHz using directive patch antennae

    Publication Year: 1995, Page(s):532 - 536
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    Wideband impulse measurements using a vector network analyser at 1.95 GHz have been made in a typical laboratory setting. Directive patch antennae were placed at 2 m and 1.5 m heights. The median root mean square (RMS) delay spread found is 8 ns for an antenna height of 2 m and 11 ns for a 1.5 m height in line-of-sight (LOS) areas. In obstructed (OBS) areas, a delay of about 25 ns is obtained rega... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the suitability of the OSI standard to the diagnosis of communication networks

    Publication Year: 1995, Page(s):116 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    The theory of system-level diagnosis offers an attractive foundation on which to base the fault management of networks. The authors evaluate whether the facilities provided within the OSI network management standard are adequate for the purposes of system-level diagnosis. It is established that for a management system based on a central observer, the OSI framework is indeed sufficient to implement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation environment for studying workstation multimedia capacities

    Publication Year: 1995, Page(s):627 - 631
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    The concept of multimedia capacity region (MCR) is used to characterize a workstation's capability in supporting multimedia processing with quality of service guarantees. Typically, the MCR depends on the process behavior, processing scheduling policy and the quality of service constraints. In most cases, an analytical method is not available to compute the MCR. We build a simulation environment f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Options of ATM adaptation layer for MPEG video

    Publication Year: 1995, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The design and performance analysis of a forward error protection scheme which uses the two dimensional error coding technique for the ATM adapttion layer (AAL) to support MPEG video services in ATM networks, are carried out. Our study has shown that the design of the forward error correction (FEC) code for the convergence sublayer (CS) in the AAL must be carefully considered because of the possib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-speed double loop network with buffer insertion access scheme for supporting multi-media communication services

    Publication Year: 1995, Page(s):237 - 241
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A double loop network based on the topological strategy of forward loop backward hop designed to support a large volume of information exchange is presented. The double loop network has two particular characteristics in bandwidth requirement and congestion avoidance since each network node is attached with extra links. The medium access scheme of the double loop network is implemented by a buffer ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A provably entrusted undeniable signature

    Publication Year: 1995, Page(s):644 - 648
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    We propose a new notion of an entrusted undeniable signature which is a variant of the undeniable signature. Also we propose a provably entrusted undeniable signature whose security can be proved. The proposed entrusted undeniable signature is a new type of undeniable signature in which the signer confirms his(her) signature to any verifier without the help of court but the verifier can't run the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol configuration and interoperability-a case study

    Publication Year: 1995, Page(s):299 - 303
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Providing an application-tailored communication protocol increases the exploitation of service specific characteristics by any application. Especially, the configuration approach of communication protocols according to specified and requested application quality-of-service (QoS) requirements offers a highly flexible scenario to allow for a sufficient and appropriate protocol processing. The approa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.