By Topic

Performance, Computing and Communications, 1998. IPCCC '98., IEEE International

Date 16-18 Feb. 1998

Filter Results

Displaying Results 1 - 25 of 60
  • 1998 IEEE International Performance, Computing and Communications Conference. Proceedings (Cat. No.98CH36191)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (493 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s): 0_20
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • CoveT: a coverage tracker for collision events in system verification

    Publication Year: 1998, Page(s):172 - 177
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Hardware escapes in complex ASIC designs are very costly to fix in terms of both money and time. It is therefore necessary for design bugs to be detected and removed as early as possible in the design cycle. One cost-effective way of debugging a design is to simulate a software model of the design. However it has been traditionally difficult to measure how much of the design has been verified and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing multimedia protocol performance through knowledge based modeling

    Publication Year: 1998, Page(s):140 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Multimedia transmission protocols take advantage of video compression coders. The core of video sequence compression coders is the motion estimation task. Unfortunately video sequence coders cannot be implemented effectively on desktop workstations because of the high computing requirements of the motion estimation task. It is possible to reduce the computing power required penalizing the compress... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service guarantees at end-to-end transport protocols

    Publication Year: 1998, Page(s):321 - 327
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Emerging high-speed networks provide support for a wide range of applications with different traffic characteristics and quality of service (QoS) requirements. For example, real time applications require guaranteed services such as minimum bandwidth and bounded end-to-end delay. Network resources should be allocated in order to provide the guaranteed services required by applications. Networks emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic resource allocation in ATM networks

    Publication Year: 1998, Page(s):328 - 335
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    This paper is principally concerned with dynamic resource allocation in ATM networks. When designing and configuring an ATM network, it remains difficult to guarantee the quality of service (QoS) for different connections, this needs more advanced functions to monitor the current situation, determine the required resource, allocate the resource, and modify it. In this paper, we introduce a dynamic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VCR functionality in transmission of MPEG video over CBR channel

    Publication Year: 1998, Page(s):133 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Different techniques for providing VCR-type functions, such as fast-forward and fast-reverse, are developed for transmission of pre-encoded MPEG video over constant-bit-rate (CBR) channels. Computer simulations using eight MPEG-1 movies showed that the receiver buffer size can be kept small even if VCR functionality is supported in the system. A simple call admission control algorithm is also deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive testing of networks using a CFSM specification

    Publication Year: 1998, Page(s):111 - 116
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    We introduce a variant of the communicating finite state machine model for the specification of networks in order to determine correct or faulty behavior using passive testing. The appropriateness of the model is first argued, followed by an initial study of how the passive testing procedures developed for finite state machines could be applied. Approaches for, and limitations of, fault detection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fault-tolerant distributed sorting algorithm in tree networks

    Publication Year: 1998, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    The paper presents a distributed sorting algorithm for a network with a tree topology. The distributed sorting problem can be informally described as follows: nodes cooperate to reach a global configuration where every node, depending on its identifier, is assigned a specific final value taken from a set of input values distributed across all nodes; the input values may change in time. In our solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of distributed database application models using Java RMI

    Publication Year: 1998, Page(s):187 - 192
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Java RMITM (remote method invocation) technology provides programmers with clean abstractions and simplified semantics for implementing parallel distributed programs on networks of heterogenous computing machines. This technology is being applied to many classes of applications in both the scientific/technical and business domains. From a performance perspective, is Java RMI technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data network analysis using NOVA

    Publication Year: 1998, Page(s):124 - 130
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    A flexible, model-based tool is presented for use in the analysis of telecommunication networks. The tool was designed and implemented using object-oriented principles. Through the use of software models, which can be modified or added, NOVA allows the analysis of data networks with arbitrary characteristics and topologies. We discuss specific models for a network node and a link, which are the ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a multicast routing algorithm

    Publication Year: 1998, Page(s):442 - 447
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Multicast communication can support wide range of applications such as digital video distribution. In multicast communication, routing paths are established in terms of minimizing the total cost of the multicast tree or minimizing the distances of each connection from source to the destinations. In this paper, we are also concerned about the number of copies in one switching fabric and propose a n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method to analyze the performance of multi-access protocols

    Publication Year: 1998, Page(s):426 - 434
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Current telecommunications includes plenty of services and applications for final users. New standards are currently being discussed such as 802.14 for HFC networks, or DAVIC for access networks with new technologies such as HFC, ADSL, FTTC and FTTH, including new MAC multi-access protocols. Different types of traffic are defined depending on the service they are carried on: CBR, VBR, ABR and so o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability of wavelength division multiplexed optical passive star networks with range limited tunable transceivers

    Publication Year: 1998, Page(s):86 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    The size of an optical passive star and the wavelength range of tunable optical transceivers is limited by current technology. Scalability of passive star networks built with these two limitations is thus an important issue for building large networks. Previously, Cao, Du and Pavan (see Technical Report, Department of Computer Science, University of Minnesota, 1996) explored the design issues for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic bandwidth allocation to virtual paths

    Publication Year: 1998, Page(s):94 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    An important problem associated with virtual paths is to determine the bandwidths that should be allocated to the set of virtual paths in the network. The bandwidth allocation to virtual path has strong impact on network throughput, signaling and call blocking QoS. There exist many algorithms in the literature which attempt to assign bandwidth to the virtual paths. However, to the best of the auth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lower bound for quantifying overlap effects: an empirical approach

    Publication Year: 1998, Page(s):253 - 259
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1108 KB)

    Among the many features that are implemented in today's microprocessors there are some that have the capability of reducing the execution time via overlapping of different operations. Overlapping of instructions with other instructions and overlapping of computation with memory activities are the main way in which execution time is reduced. In this paper we will introduce a notion of overlap and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access paths and testing in an ultra high-performance ATM switch

    Publication Year: 1998, Page(s):373 - 378
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    This paper discusses the architecture and testing of an ultra high performance 4-input, 4-output asynchronous transfer mode (ATM) switch that has been designed as part of the DARPA-sponsored “Thunder and Lightning” project at the University of California, Santa Barbara. This research project is focused on the design and prototype demonstration of ATM links and switches operating at or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating dynamically scheduled memory address traces

    Publication Year: 1998, Page(s):245 - 250
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    It is common practice to study the performance of a computer memory hierarchy design via trace-driven simulation. The validity of such studies is dependent on the accuracy of the memory address trace that is used to drive the simulations. To study the performance of a memory hierarchy for a multiprogrammed computer system, the accuracy of the trace is defined by the length, in terms of the number ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking a network of PCs running parallel applications

    Publication Year: 1998, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Presents a benchmarking study that compares the performance of a network of four PCs connected by a 100 Mbit/s fast Ethernet running three different system software configurations: TCP/IP on Windows NT, TCP/IP on Linux and a lightweight message-passing protocol (U-Net active messages) on Linux. For each configuration, we report results for communication micro-benchmarks and the NAS (Numerical Aero... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance optimisation evaluation of TCP/IP over wireless networks

    Publication Year: 1998, Page(s):395 - 401
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The transmission control protocol (TCP) is a large extended transport protocol, mainly used in fixed networks. It works well in those networks in which the main cause of packet loss is congestion. Some mechanisms included in the TCP optimise their use in this kind of networks. Today, Internet users need access it over wireless links in order to get this service anywhere they are. However, the TCP ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple hierarchical traffic model for VBR MPEG video

    Publication Year: 1998, Page(s):147 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    A hierarchical model is derived for MPEG video. This model is developed so as to represent the bit-rate variations of MPEG video at two different time scales/levels: scene level and frame level. Various evaluations show that the proposed model not only matches very good the statistical characteristics with the real MPEG video but also predicts accurately the network performance of an ATM multiplex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance measurements of a small-scale VOD server based on the UNIX

    Publication Year: 1998, Page(s):200 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Recent progress in network technologies has made it possible to integrate digital video and audio into distributed computing environments. Among the various distributed multimedia applications, video-on-demand (VOD) services are the most typical application area. However, interest in large-scale VOD systems is gradually transferring to small and low-cost VOD systems because of the excess investmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New network QoS measures for FEC-based audio applications on the Internet

    Publication Year: 1998, Page(s):355 - 362
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    New network QoS (quality of service) measures for interactive audio applications using FEC (forward error control) are proposed. Applications such as an Internet phone require both low data loss and a short delay for the underlying transport layer. The FEC-based error control has become popular as a way of meeting such requirements; new application data (or highly compressed data) are copied onto ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delta service in a mobile file system client cache

    Publication Year: 1998, Page(s):222 - 228
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper evaluates a delta service extension to a mobile file system cache developed in order to minimize the amount of data transferred over wireless communications links. Network bandwidth stands as one of the resource limitations impacting the design of mobile computer applications. At the mobile file system service level, caching provides resource conservation in distributed applications. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel reification: a reflective model for distributed computation

    Publication Year: 1998, Page(s):32 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper presents a new reflective model, called Channel Reification, which can be used in distributed computations to overcome difficulties experienced by other models in the literature when monitoring communication among objects. The channel is an extension of the message reification model. A channel is a communication manager incarnating successive messages exchanges by two objects: its applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.