By Topic

Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat.

12-12 Sept. 1997

Go

Filter Results

Displaying Results 1 - 25 of 124
  • 1997 International Conference on Information, Communications and Signal Processing Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications

    Publication Year: 1997, Page(s):i - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (1891 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):0_3 - 0_7
    Request permission for commercial reuse | PDF file iconPDF (487 KB)
    Freely Available from IEEE
  • An adaptive priority traffic control approach for guaranteed services in ATM networks

    Publication Year: 1997, Page(s):1518 - 1521 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    This paper presents an adaptive priority traffic control approach which uses a dynamic buffer allocation scheme, and an adaptive priority queuing technique for handling the delay-sensitive traffic in ATM networks. The former adjusts the buffer size based on the real traffic demand, while the latter adaptively change the priority. The simulation results show that diverse delay-sensitive traffic ach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and performance analysis for the multimedia function unit of the NSC-98 CPU

    Publication Year: 1997, Page(s):1513 - 1517 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Leveraging Taiwan's hardware technologies, the National Science Council in Taiwan proposed a project to design an advanced CPU, called NSC-98, compatible to the Intel MMX architecture. This paper discusses the design of the multimedia extension, called MFU (multimedia function unit), in this CPU. The MFU has the following two special features: (1) support three more instructions for permutation op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization and source modeling of MPEG-2 VBR video source

    Publication Year: 1997, Page(s):1652 - 1656 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    This paper presents the results of our study on the statistical characterization of MPEG-2 VBR video stream and the modeling of such source. The frame trace, marginal distribution of the frame size and the high autocorrelation existing in the continuous frames are analyzed. An ARMA process is used to model MPEG-2 video source. The different frame types of MPEG-2 video are considered together by pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design patterns for parallel computations of master-slave model

    Publication Year: 1997, Page(s):1508 - 1512 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    This paper presents two design patterns useful for parallel computations of master-slave model. These patterns are concerned with task management and parallel and distributed data structures. They can be used to help address the issues of data partition and mapping, dynamic task allocation, and load balancing in parallel programming with the benefit of less programming efforts and better program s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic characterization of VBR video streams using uniform transmission in ATM networks

    Publication Year: 1997, Page(s):1647 - 1651 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    We propose a simple method which can be used to characterize any pre-compressed variable bit rate (VBR) video stream in terms of ATM traffic parameters: peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS). Though it is simple to find the PCR parameter, there is generally a very large set of SCR/MBS pairs that can be used to describe a given video stream. An SCR/MBS pair... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Least required bandwidth in VP-based ATM networks

    Publication Year: 1997, Page(s):1504 - 1507 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    In an ATM network, a virtual path (VP) is a labeled path which can be used to transport a bundle of virtual connections (VCs) and to manage the resources used by these connections. The ATM multimedia leased line service is provided across user-to-user VPs. The customers can increase/decrease the VP bandwidth according to their demand. This paper proposes a method to derive the least required bandw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The strategy of inter-processor communication in BDCS for network survivability

    Publication Year: 1997, Page(s):1428 - 1431 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    This paper proposes a new inter-processor communication (IPC) method that can reduce the processing time of network restoration such as self healing mesh (SHM) and presents the performance evaluation through the analysis and simulation of the proposed method. This IPC mechanism was adopted at the SDH-based broadband digital cross-connect system (BDCS). Results of simulations are presented. And its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing priority channel assignment scheme for handoff in CDMA cellular system

    Publication Year: 1997, Page(s):1766 - 1770 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    A new queueing priority channel assignment scheme for handoff in the CDMA cellular system is proposed and analyzed. The proposed scheme employs a dynamic priority queueing discipline instead of first-in first-out (FIFO), which differs from the previous ones. Also, the performance of this scheme is evaluated by computer simulation, and it is compared with that of the non-prioritized call handling a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Branch prediction methods used in modern superscalar processors

    Publication Year: 1997, Page(s):1475 - 1479 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Branch prediction is crucial to maintaining high performance in modern superscalar processors. Conditional branches can occur as frequently as one in every 5 or 6 instructions in nonnumeric programs, leading to heavy mis-prediction penalties in current superpipelined, superscalar architectures. Realization of this fact has lead to an upsurge in the number of recent research publications in this ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a dynamic video resolution control scheme in media-synchronized video and audio communications

    Publication Year: 1997, Page(s):1642 - 1646 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    This paper studies a congestion control scheme in integrated variable bit-rate (VBR) video, audio and data (e.g., image or text) communications, where each video stream is synchronized with the corresponding audio stream. When the audio and-video streams are output, media-synchronization control is performed. To avoid congestion, we employ a dynamic video resolution control scheme which dynamicall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tight bounds on the BEPs of DQPSK and π/4-DQPSK over the nonselective Rician fading channel with narrowband IF filter reception

    Publication Year: 1997, Page(s):1501 - 1503 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    The bit error probability (BEP) performance of differential quaternary phase shift keying (DQPSK) and π/4-DQPSK over the nonselective Rician fading channel is analyzed with narrowband IF filter reception. While the exact BEPs can be obtained in terms of Marcum's Q-function whose computation requires complicated numerical integration, this paper emphasizes simple, tight, exponential upper bounds... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault resolution and alarm correlation in high-speed networks using database mining techniques

    Publication Year: 1997, Page(s):1423 - 1427 vol.3
    Cited by:  Papers (7)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    A telecommunications company must be able to effectively manage its network. Increasing system size, complexity and bandwidth are threatening to overload current management systems so it comes as no surprise that network management is a high priority for leading telecommunications providers. Central to network management is the monitoring of the performance of the network and the handling of large... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictable architecture for real-time systems

    Publication Year: 1997, Page(s):1761 - 1765 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Architecture used to support real-time applications must have the ability to achieve predictability. This paper surveys the problems and solutions related to conventional architectures for predictable real-time systems. Issues covered include caches, pipelines, context switches, real-time clock and hardware queues. This paper, also proposes the approaches in a constructive way that it is possible ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining optimum subband edges for signal compression

    Publication Year: 1997, Page(s):1542 - 1546 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The coding gain in subband coding, a popular technique for achieving signal compression, depends on how the input signal spectrum is decomposed into subbands. The optimality of such decomposition is conventionally addressed by designing appropriate filter banks. The issue of optimal decomposition of the input spectrum is addressed by choosing the set of band that, for a given number of bands, will... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subjective coding of best basis wavelet coefficients for multiresolution analysis

    Publication Year: 1997, Page(s):1363 - 1367 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    This paper presents a wavelet based image compression algorithm using subjective thresholding and quantization of the wavelet coefficients. subjective compression techniques use the properties of the human visual system (HVS) to eliminate redundant information in an image. By combining the wavelet transform coefficients with psychovisual thresholding and quantization schemes, a coding result of 0.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of saddlepoint integration on forward-link analysis of asynchronous cellular DS-CDMA over Rayleigh-faded channels

    Publication Year: 1997, Page(s):1322 - 1326 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    We evaluate the forward-link performance of an asynchronous direct-sequence code-division multiple-access (DS-CDMA) cellular system over a Rayleigh-faded channel using an efficient numerical technique called saddlepoint integration (SPI). As each mobile receives signals from its own base station as well as other surrounding base stations, the bit-error rate (BER) analysis often results in a compli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling algorithms for multiprocessor real-time systems

    Publication Year: 1997, Page(s):1470 - 1474 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Real-time systems are subject to fundamental user requirements, such as correctness of the systems, taking into account timeliness and simultaneity, a high degree of predictability. This means that the scheduling algorithm is an important component of these systems. A scheduling algorithm is used to determine a schedule for a set of tasks so that the task's deadlines and resource requirements are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Camera object tracking system

    Publication Year: 1997, Page(s):1557 - 1561 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    This paper presents a pan and tilt camera system that can follow a predefined object that move freely under a specific constraint. We use a stepping motor that work in a half step mode, provides a minimum of 0.9 degree movement, but it is adequate as a pan and tilt actuator system for the specified usage. A Kalman filter is used to estimate the object motion in the block matching process due to di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance model for a local VoD system

    Publication Year: 1997, Page(s):1638 - 1641 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    A multimedia information system provides an effective means to convey information to, users. This paper studies the problem of carrying out a video on demand (VoD) application over a high speed LAN to support computer supported collaborative working (CSCW) for people working in a local collaborative environment. A multimedia information system using the HP 100VG-AnyLAN is proposed and setup for th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Mth power carrier recovery structure for MPSK

    Publication Year: 1997, Page(s):1496 - 1500 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    An approximate, linearized analysis for the phase error probability density function (PDF) for the Mth power carrier recovery structure under the additive white Gaussian noise (AWGN) channel with constant unknown carrier phase and random-walk carrier phase channel models are presented. From the analysis, the optimum receiver parameters for a given channel condition can then be obtained analyticall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Propagation measurements on an over-water, line-of-sight link in Singapore

    Publication Year: 1997, Page(s):1714 - 1718 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Reliable prediction methods to predict the multipath fading activity of the microwave link are required for economical system design. However, there is insufficient data and uncertainty about the existing multipath fading models for tropical regions. An extensive experimental program has been undertaken on an over-water line-of-sight radio relay link in Singapore. Measurement results showed that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flood routing method for data networks

    Publication Year: 1997, Page(s):1418 - 1422 vol.3
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    A new routing algorithm based on a flooding method is introduced. Flooding techniques have been used previously, e.g. for broadcasting the routing table in the ARPAnet and other special purpose networks. However, sending data using flooding can often saturate the network and it is usually regarded as an inefficient broadcast mechanism. Our approach is to flood a very short packet to explore an opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying and retrieving software components based on profiles

    Publication Year: 1997, Page(s):1756 - 1760 vol.3
    Cited by:  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    We propose that the software reuse system can classify, register, and retrieve software components based on their profiles. There are two profiles: object profiles are constructed by extracting from software components their identifiers, function identifiers, and variable identifiers. Virtual profiles are made by extracting common identifiers and their weights from object profiles or virtual profi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.