By Topic

Proceedings Twelfth International Conference on Information Networking (ICOIN-12)

21-23 Jan. 1998

Filter Results

Displaying Results 1 - 25 of 141
  • Proceedings Twelfth International Conference on Information Networking (ICOIN-12)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (524 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1998, Page(s):730 - 733
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Priority assignment for multimedia multipoint-to-point communication

    Publication Year: 1998, Page(s):247 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    This paper proposes a priority assignment method for multimedia multipoint-to-point communication. First, it discusses the performance degradation of multimedia communication caused by delay and proposes a new performance measure. Then it gives the priority assignment method based on the new measure. According to the analysis, it is shown that the proposed priority assignment increases the perform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient protocols for multimedia streams on WDMA networks

    Publication Year: 1998, Page(s):241 - 246
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    This paper introduces a new approach to integrate different types of medium access (MAC) protocols into a single wavelength division multiplexing (WDM) network system so as to efficiently accommodate various types of multimedia traffic streams with different characteristics and quality of service (QoS) demands. The proposed WDM network, which is termed multimedia wavelength multiple access (M-WDMA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The prototype of continuous media file system, CrownFS

    Publication Year: 1998, Page(s):235 - 240
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Currently, many multimedia or continuous media server system is under development on top of either workstations or high-end PCs clustered with high speed networking facilities. In this paper we introduce Crown, a continuous media server on clustered high performance PCs with Myrinet, fast network switching equipment, and then address CrownFS, a file system on top of Crown, to offer continuous medi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of a kind of 2 parallel queueings with precedence for multimedia network communication

    Publication Year: 1998, Page(s):229 - 234
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    In multimedia network communication we should guarantee that the control information can be transmitted in time and as accurately as possible. First, we propose a parallel queueing model with precedence, which makes sure that the high priority packets are dealt with within constant time no matter how the traffic load is. On the other hand, it ensures that the lost probability of the high priority ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agent network for supporting personal mobility

    Publication Year: 1998, Page(s):131 - 136
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Needs and interests of the personal mobility have been increasing, because of the rapid development of wireless communication technologies and computer networks. Telecommunication sectors have made a lot of efforts to provide the personal mobility resulting in the development of PCN (Personal Communication Networks) or UPT (Universal Personal Telecommunications) services. However, the mobility ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load shift protocol design in ATM-based VOD systems

    Publication Year: 1998, Page(s):222 - 227
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Load shift is a basic operation for load balancing algorithms. In this paper, we study the load shift problem in an ATM-based distributed video-on-demand (VOD) system. Two different system configurations are considered for the load shift. One allows more than one video streams being active simultaneously from multiple video servers to a set-top box (STB), in which no-gap load shift is possible. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile computing deploying agents

    Publication Year: 1998, Page(s):127 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    An agent based paradigm is proposed for mobile computing. The fixed host deploys an agent in the mobile host that is provided with a rule or event-condition-based power of attorney, to act on its behalf. The rule application policy enforces that the transactions are either time and attribute sensitive or time and attribute tolerant. Issues related to rule compatibility, cache consistency, recovery... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of ATM OAM functions for the integrated service access network

    Publication Year: 1998, Page(s):218 - 221
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    As the various types of application services are increased in the ATM (Asynchronous Transfer Mode) network, it becomes very important requirement for ATM network equipment to provide for higher transfer rate and to detect the network failure or the service degradation. In order to meet these requirements we develop a monolithic single chip device which can handle VP/VCI address translation, cell a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a view model of agents in the cyber office

    Publication Year: 1998, Page(s):123 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    A cyber space, which is a virtual space shared by persons who are connected by the advanced computer communication network technology, has been studied, in order to satisfy various kinds of human activities in the real society. As one of concepts of the cyber space, a concept of Human-Agent Symbiotic Space was proposed to develop a well-supported cyber space in our project based on the ADIPS frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of average delay performance in packet network by introducing intermediate nodes

    Publication Year: 1998, Page(s):25 - 28
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Large propagation delay and probability of packet loss associated with the large scale network reduce the throughput for automatic repeat-request (ARQ) protocol. The throughput of the ARQ protocol falls rapidly with increasing error (packet loss) probability. The network propagation delay aggravates this problem. This paper discusses the improvement of performance in average delay and throughput b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WWW browser and server with guaranteed QoS support over native ATM API

    Publication Year: 1998, Page(s):212 - 217
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    In this paper, we present WWW browser and server that can utilize guaranteed QoS over ATM network using native ATM API. Native ATM API is the API for native ATM services, i.e., ATM-specific services. It can provide native ATM's benefits directly to its applications, without producing such drawbacks as stack overhead and functional limitations which can be found in IP over ATM, LAN emulation over A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The algebra of spatio-temporal intervals

    Publication Year: 1998, Page(s):116 - 121
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The relations among temporal intervals can be used to model all time dependent objects. We propose a fast mechanism for temporal relation compositions. A temporal transitive closure table is derived, and an interval-based temporal relation algebraic system is constructed. Thus, we propagate the time constraints of arbitrary two objects across long distances n by linear time. We also give a complet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic rate control mechanism for large scale sessions

    Publication Year: 1998, Page(s):21 - 24
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The network environments of the Internet Multicast session performance are various. The size of Internet community gets bigger and bigger and the variety gets deepening. This paper suggests to build a barrier on every link to restrict the amount of data flowing into the network. Each link has threshold value to specify the requirement for the packets. Multimedia stream is encoded into multiple lay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of the presentation controller functions for distributed hypermedia system

    Publication Year: 1998, Page(s):206 - 211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    We propose a distributed multimedia system based on client-agent-server architecture for next-generation distributed multimedia general-purpose platform, as well as define advanced multimedia presentation models. In order to realize the platform, we have designed and developed Video-on-Demand and Multimedia-on-Demand systems as prototype system for the platform. In this paper we will discuss desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic rate control methods for continuous media transmission

    Publication Year: 1998, Page(s):110 - 115
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    On continuous media transmission using compression techniques, a variable bit rate transmission method is required to maintain the video frame rate at a constant. At the same time, user's Quality of Service must be guaranteed even if packet loss and delay occur by CPU loads on the client or server, and network traffic increase. In this paper, two variable bit rate transmission methods are describe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed first and last consistent global checkpoint algorithm

    Publication Year: 1998, Page(s):475 - 480
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Distributed coordinated checkpointing algorithms are discussed. The first global checkpoint for a checkpoint initiation is a set containing the checkpoint for each process in which any checkpoint before the element is not consistent with the initiation. The last global checkpoint for a checkpoint initiation is a set containing the checkpoint for each process in which any checkpoint after the eleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point-to-multipoint communication protocol PTMP and evaluation of its performance

    Publication Year: 1998, Page(s):646 - 651
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    In this paper, an efficient one-way point-to-multipoint communication protocol PMTP is proposed. The PTM protocol is helpful in distribution unique information content to many workstations simultaneously and correctly. The protocol is designed for network channels of low error possibility and utilizes broadcast for the stream-type data distribution. Re-transmission request for lost packets are ret... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of multiple 28.8 kbps call control in PSTN-PSDN communication processing system

    Publication Year: 1998, Page(s):535 - 538
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    An analysis of multiple users call control of the Communication Processing System (CPS) that supports public information service by connecting PSTN and PSDN is presented in this paper. The aim of the call analysis is to classify access ratio, analyze the cause of errors, and support the efficient data communication in PSTN. The PC communication users access specific database connected to PSDN. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive rate-based congestion control scheme for ATM networks

    Publication Year: 1998, Page(s):14 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The ATM Forum has chosen a rate-based scheme as an approach to congestion control for Available Bit Rate (ABR) services. So far many rate-based schemes, such as Forward Explicit Congestion Notification (FECN), Backward Explicit Congestion Notification (BECN), and Proportional Rate Control Algorithm (PRCA), has been proposed. In FECN and BECN, which use negative feedback rate control, the overall n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior of agents based on mental states

    Publication Year: 1998, Page(s):199 - 204
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    In multiagent systems, agents communicate with each other to satisfy an entire goal of the systems. To achieve this goal, an agent has to determine its behavior based on its situation in the operational environment. In previous works, an agent using information of external environment has been proposed. However, it is required to utilize various information with respect to each agent to realize a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-based flexibility in distributed systems

    Publication Year: 1998, Page(s):104 - 109
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    This paper discusses how to make a distributed object system flexible so as to satisfy the application's requirement in the change of the system environment. Each object supports other objects with quality of service (QoS). The change of the system is modeled to be the change of QoS supported by the objects. We discuss relations among the operations with respect to QoS, i.e. QoS-based equivalency ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARQ protocols for bi-directional data transmission

    Publication Year: 1998, Page(s):468 - 473
    Cited by:  Patents (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Automatic repeat request (ARQ) protocols are discussed so far to analyze the buffer size and the delay required for two peer processes. However, ARQ protocols in group communications are not discussed, where multiple senders send packets to multiple receivers. In the group communication protocols, acknowledgments of packets received are piggy-backed by packets. Hence, the forward and feedback chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vicarious certification and billing agent for Web information service

    Publication Year: 1998, Page(s):344 - 349
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    In this paper, we describe the concepts and implementation of agent providing vicarious certification and billing methods in World Wide Web. The object of vicarious certification is to provide open interface to users (clients) for using World Wide Web information service. The billing agent has enhanced functions: usage based mini payment method, vicarious billing management instead of each CPs (Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.