Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

Proceedings Twelfth International Conference on Information Networking (ICOIN-12)

21-23 Jan. 1998

Filter Results

Displaying Results 1 - 25 of 141
  • Proceedings Twelfth International Conference on Information Networking (ICOIN-12)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (524 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1998, Page(s):730 - 733
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Backup path sharing for survivable ATM networks

    Publication Year: 1998, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    Survivability is one of the critical issues in ATM networks, since even a single link failure may cause a large amount of data loss. Therefore, it is highly needed to provide mechanisms to restore lost connections. One such mechanism proposed is backup recovery. This mechanism shows simple and fast restoration of a connection failure, however, it requires a lot of spare resources to maintain backu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of self-healing algorithm for ATM networks

    Publication Year: 1998, Page(s):2 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    Automatic and rapid network service restoration (self-healing) when failures occur is of increasing importance for network operations and management as network speed and bandwidth increase. In this paper, we study the self-healing problem of an ATM network at the virtual path (VP) configuration level. We analyze the design issues of self-healing algorithms, and develop a state transition and bandw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic QoS control function of video communication for remote technical consultation system

    Publication Year: 1998, Page(s):179 - 183
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The purpose of this study is to develop a dynamic QoS (Quality of Service) control function for Remote Technical Consultation System. The Remote Technical Consultation System realizes technical consultation using video communication tool through narrow band networks. The proposed function can dynamically control size and quality of video images according to user's demands and purposes. The user do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed first and last consistent global checkpoint algorithm

    Publication Year: 1998, Page(s):475 - 480
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Distributed coordinated checkpointing algorithms are discussed. The first global checkpoint for a checkpoint initiation is a set containing the checkpoint for each process in which any checkpoint before the element is not consistent with the initiation. The last global checkpoint for a checkpoint initiation is a set containing the checkpoint for each process in which any checkpoint after the eleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of end-to-end QoS using prototyped VOD system

    Publication Year: 1998, Page(s):175 - 178
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    In order to realize multimedia applications such as VOD (Video-on-Demand) on highspeed networks, a client-agent-server video system which provides continuous media data such as audio and video to users has to guarantee suitable QoS (Quality of Service) in accordance with users' requirements, and available computing and network resources during providing media data to users. Therefore the client-ag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote joint application design process using package software

    Publication Year: 1998, Page(s):495 - 500
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Corporate information systems, aiming at reduction of cycle times from order receipt to shipment are increasingly based on integrated package software. In development of such a system, joint application design (JAD) in which users and developers reach agreements based on an understanding of the package functions and on prototyping to determine how those functions will be applied to business operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARQ protocols for bi-directional data transmission

    Publication Year: 1998, Page(s):468 - 473
    Cited by:  Patents (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Automatic repeat request (ARQ) protocols are discussed so far to analyze the buffer size and the delay required for two peer processes. However, ARQ protocols in group communications are not discussed, where multiple senders send packets to multiple receivers. In the group communication protocols, acknowledgments of packets received are piggy-backed by packets. Hence, the forward and feedback chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A STORM* environment for building multimedia presentations

    Publication Year: 1998, Page(s):329 - 332
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper describes an environment for constructing multimedia applications which are used to present different multimedia database objects in accordance with spatio-temporal constraints and from different sources. The main contribution of this paper is to propose an environment which integrates both a modelling case tool and an object-oriented database system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WWW browser and server with guaranteed QoS support over native ATM API

    Publication Year: 1998, Page(s):212 - 217
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    In this paper, we present WWW browser and server that can utilize guaranteed QoS over ATM network using native ATM API. Native ATM API is the API for native ATM services, i.e., ATM-specific services. It can provide native ATM's benefits directly to its applications, without producing such drawbacks as stack overhead and functional limitations which can be found in IP over ATM, LAN emulation over A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A purpose-oriented access control model

    Publication Year: 1998, Page(s):168 - 173
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects occur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A continual tree algorithm for integrated voice/data wireless networks

    Publication Year: 1998, Page(s):488 - 493
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    This paper proposes a continual tree algorithm for integrated voice/data wireless networks. The continual tree algorithm (CTA) is a new kind of reservation scheme and uses an improved continual tree algorithm to reserve slots of a channel. And based on a CTA a multimedia wireless multiple access (MWMA) is discussed. In addition to pretty good channel efficiency of a reservation scheme due to CTA, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An EFSM-based specification language for composite application services

    Publication Year: 1998, Page(s):280 - 285
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Computer communication services (e.g., E-mail, FTP, Teleconferencing, WWW) provide their own functions which don't interact with each other. Network users' requirements are often satisfied by using multiple services sequentially or in parallel. This paper proposes an EFSM-based service specification language which enables users to flexibly construct a composite service such as composed of multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of service traffic analysis system for Korean information infrastructure

    Publication Year: 1998, Page(s):265 - 268
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Not only the leading countries but also Korea has been constructing Information Superhighway for national competitiveness and giving better quality of living to its citizens. Concerning this, many Korean Information Infrastructure (KII) pilot projects have been beginning to realize the vision of the information society. Especially, the government and Korea Telecom provided KII field trial services... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communication protocol in transaction-oriented applications

    Publication Year: 1998, Page(s):386 - 391
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    In group communications, larger computation and communication are consumed to causally order all the messages transmitted in the network. Transactions in clients manipulate objects in servers by sending read and write requests to the servers. In this paper we define significant messages by using the relation among the transactions. We newly propose an object vector to causally order only the signi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The efficient connection based tariffing scenarios for basic and extra tariffing services in ATM network

    Publication Year: 1998, Page(s):517 - 520
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Tariffing of ATM network requires flexibility with respect to the introduction of new services and reliability of tariffing process that is fitted to the characteristics of diverse B-ISBN services. Tariffing method of ATM network is therefore a complex issue to resolve. In this paper, the efficient connection based tariffing method for ATM network is proposed, and several scenarios will explain th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zero Internet administration approach: the case of DNS

    Publication Year: 1998, Page(s):350 - 355
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    Knowledgeable network engineering practitioners are urgently needed in today's rapid growing networks. However, the community of these individuals is very small. In this paper, we discuss our Zero Internet Administration Approach which is one of the most important approach for today's network system. This approach significantly reduce the job of network administrator in particular and computer use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthetic and analytic methods for user-computer interaction design

    Publication Year: 1998, Page(s):726 - 729
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    As ways of designing better user interfaces (UIs), human-computer interaction (HCI) models and UI design guidelines can be useful tools. In this paper, a HCI model is first proposed, which is suitable for practical synthetic and analytic activities of UI design. Next, specific synthetic and analytic methods for UI interaction design is proposed, with the aim to make the usability of UIs much bette... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assigning a value to a communication protocol test case using sensitivity analysis

    Publication Year: 1998, Page(s):462 - 467
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    There is an enormous number of test cases that can be derived from any complex communication protocol. In order to test an implementation, in a reasonable amount of time and consuming only a reasonable amount of resources, the number of test cases in a test suite has to be within a reasonable limit. Some selection criteria need to be set in order to reduce the number of test cases. By assigning a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-paradigm programming language: DeLis for decentralized network applications

    Publication Year: 1998, Page(s):322 - 327
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    In this paper, we present the design and implementation of a programming language named DeLis to build a decentralized application an networks. The characteristics of DeLis are: (1) it consists of several LISP-based interpreters; (2) it provides inter-process communication facilities to exchange S-expressions through channels; (3) it provides a user interface description facilities with GUI parts;... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of the presentation controller functions for distributed hypermedia system

    Publication Year: 1998, Page(s):206 - 211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    We propose a distributed multimedia system based on client-agent-server architecture for next-generation distributed multimedia general-purpose platform, as well as define advanced multimedia presentation models. In order to realize the platform, we have designed and developed Video-on-Demand and Multimedia-on-Demand systems as prototype system for the platform. In this paper we will discuss desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical key establishment protocols based on secure keyed one-way hash functions

    Publication Year: 1998, Page(s):162 - 167
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    As key establishment protocols (KEP) are usually the initial step for setting up a secure network-based service, they are very important in enabling the required security. Most of the existing KEPs make use of cryptographic algorithms, either secret key or public-key cryptography. However, it is also possible to employ secure keyed one-way hash functions (SKOWHF) in KEP designs. Though several wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CASE approach to visual presentation designs

    Publication Year: 1998, Page(s):714 - 717
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    This paper focuses on two perspectives. First, there are many multimedia presentation systems that do not provide dynamic presentations. In order to improve the drawback, we allow dynamic presentations in our multimedia presentation system. We introduce the concept of data flow and control flow diagram for multimedia presentations have been broadly used in the structured analysis/design of softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible approach for extension of communication protocols

    Publication Year: 1998, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    Users of computer communication systems and their requirements are rapidly increasing and changing. In order to deal such a situation a rapid development method of communication systems is necessary. One of the such development methods is to change an existing specification of the system to obtain the desired specification of the system. However, a very little work has been done to support making ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.