By Topic

Computers and Communications, 1998. ISCC '98. Proceedings. Third IEEE Symposium on

Date June 30 1998-July 2 1998

Filter Results

Displaying Results 1 - 25 of 132
  • Proceedings Third IEEE Symposium on Computers and Communications. ISCC'98. (Cat. No.98EX166)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (631 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):717 - 720
    Request permission for commercial reuse | PDF file iconPDF (383 KB)
    Freely Available from IEEE
  • Collaborative distance training: architecture of a demonstrator

    Publication Year: 1998, Page(s):298 - 304
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Starting from existing group conferencing applications, we have investigated how to implement a flexible, adaptive communication environment for developing co-operative activities based on the communication behaviour of participants. The originality of this work consists of its integral approach of the problem as result of multidisciplinary, contextual research: multiple conceptual views (behaviou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design methodology of an educational computer-aided telematics service

    Publication Year: 1998, Page(s):293 - 297
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    This paper discusses the development of an adaptable computer-aided learning educational environment for teaching telematics courses and suggests a proper design and implementation methodology. The proposed service will use many currently available state-of-the-art tools and techniques in telematics and computer-aided education. A structured methodology for designing and implementing the CAL servi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband access technologies and operations

    Publication Year: 1998, Page(s):680 - 684
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    Advances in switching, transport, and digital signal processing technologies are enabling public network providers to offer new broadband services to customers. The bottleneck, however, is the access network, which is still predominantly the 3-kHz loop plant designed to deliver plain old telephone service. This paper presents a high-level description of various broadband access technologies, descr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On thorough garbage collection in distributed systems

    Publication Year: 1998, Page(s):576 - 581
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    In this paper, we consider the hard problem of the thorough garbage collection in uncoordinated checkpointing algorithms. After introduction of the traditional garbage collecting scheme, with which only the obsolete checkpoints can be discarded, we show that this kind of traditional method may fail to discard any checkpoint in some special cases, and point our that it is very necessary and urgent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quadriphase M-ary CDMA signal design without co-channel interference for approximately synchronized mobile systems

    Publication Year: 1998, Page(s):110 - 114
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Suehiro (1985) has proposed a quadriphase signal design method for the uplink of the cellular CDMA mobile communication systems. The designed signals work without co-channel interference when the systems are synchronized approximately. The designed signals are free from the influence of multipath signals within some delay. The filters for the designed signals can be realized as SAW devices. We ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The network management structure in an object oriented system environment

    Publication Year: 1998, Page(s):675 - 679
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    During the design of a system it is very important to achieve a correct and comprehensible structure; a system that cannot be understood cannot be managed. Although methodologies to do so exist, but the object oriented approach for modelling the network management systems is of special interest, because the resources that need to be managed map naturally into objects. This paper outlines the resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic application in the design of dynamic interconnection networks

    Publication Year: 1998, Page(s):571 - 575
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    This paper presents a new method for solving the problem of designing dynamic interconnection network using Genetic algorithms. Three parameters are considered: network latency, hardware complexity and degree of reliability. Two types of faults are simulated, the link fault and the switch fault. A GA based package was developed to study the effect of the various parameters affecting the design pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal TTCN-based protocol testing for intelligent network

    Publication Year: 1998, Page(s):205 - 209
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    The intelligent network is evolving from its first generation architecture to an advanced platform in Korea. In parallel with the advancement of the IN itself the protocol test technology for IN components is enhanced based on a formal approach. This paper presents our experience with the formal TTCN-based (TTCN: tree and tabular combined notation) intelligent network application conformance testi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BER evaluation of symbol-aided coherent demodulation for Rician and Rayleigh fading channels

    Publication Year: 1998, Page(s):105 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    We examine the applicability of symbol-aided demodulation (SAD) to Rayleigh and Rician fading channels, which are the channels most frequently encountered in terrestrial mobile communications and satellite communications, respectively. The effects of filtering and interpolation on the bit error rate (BER) performance of the SAD system are evaluated. The BER comparisons for optimum Wiener filtering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced distributed call admission control for wireless systems

    Publication Year: 1998, Page(s):695 - 699
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Call admission control (CAC) is one of the key elements to provide quality of service (QoS) guarantee in wireless mobile networks. A good CAC scheme should efficiently support handoffs and maintain a high utilization of the scarce radio resource while it should also be simple for implementation. Since the traditional guard channel policy is not optimal for a hard constrained handoff dropping proba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The limitations of artificial neural networks for traffic prediction

    Publication Year: 1998, Page(s):8 - 12
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    B-ISDN is expected to support a variety of services, each with their own traffic characteristics and quality of service requirements. Such diversity however, has created new congestion control problems, some of which could be alleviated by a traffic prediction scheme. This paper investigates the applicability of artificial neural networks for traffic prediction in broadband networks. Previous work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of a rate-based ABR scheme supporting bursty data applications

    Publication Year: 1998, Page(s):265 - 270
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    The available bit rate (ABR) service has been proposed by the ATM Forum in 1994 and also adopted by the ITU shortly afterwards. This paper presents the performance of a rate-based ABR in the presence of bursty data applications. Based on measurements reported in the literature, we have developed a simulation tool to evaluate the performance of the rate-based ABR mechanism. The simulation model inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic legality checker and attribute evaluator for a distributed enterprise environment

    Publication Year: 1998, Page(s):286 - 292
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The present state of communication networks with respect to speed and reliability and the recent growth of distributed applications have created a need for a global enterprise solution to the legality checking and attribute evaluation requirement. Traditionally, the mainframe systems provided the cohesion of all the processes with respect to the company regulations. When decentralized systems and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-service methods for performance management in switched broadband networks

    Publication Year: 1998, Page(s):183 - 187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    The introduction of switched virtual connections and value-added services in ATM networks create new conditions for network management. A general model for performance management in switched broadband networks, based on interaction between management functions and control functions is presented. Finally, in-service methods for monitoring of network performance (especially cell losses) in switched ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical simulation model for MPEG video

    Publication Year: 1998, Page(s):473 - 477
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    In this paper, a hierarchical model is derived for MPEG video. This model is developed so as to represent the bit-rate variations of MPEG video at two different time scales/levels: scene level and frame level. Various evaluations show that the proposed model not only matches well the statistical characteristics with the real MPEG video but also predicts accurately the network performance of an ATM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metacomputing environment for demanding applications: design, implementation, experiments and business benefit

    Publication Year: 1998, Page(s):564 - 570
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    A metacomputing environment is presented, suitable for the efficient execution of computationally intensive parallel jobs that may require/generate large volume of data. A cluster of networked computing nodes as a physical layer to the distributed architecture is considered. A job model for the submitted tasks is presented that derives from real-life application areas. The proposed distribution of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of congestion control mechanisms for IN signalling systems

    Publication Year: 1998, Page(s):198 - 204
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    The evolution of increasingly complex telecommunication services, has fuelled in the last years the development of new network architectures. There is a growing interest on the evolution of the intelligent network and of the B-ISDN. The integration of the signalling systems of these two architectures will allow, in a medium term scenario, the support sophisticated services. The provision of these ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multicast congestion control mechanism for reliable multicast

    Publication Year: 1998, Page(s):142 - 146
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    This paper evaluates a congestion control mechanism for reliable multicast applications that uses a small dynamic set of group members, or representatives, to provide timely and accurate feedback on behalf of congested subtrees of a multicast distribution tree. Through simulations, we evaluate our algorithm with and without TCP cross traffic. This study demonstrates that while our algorithm makes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative decoding with erasures in a concatenated system with diversity

    Publication Year: 1998, Page(s):100 - 104
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    We study error correcting codes, which are constructed by using “permutation” and “iterative decoding” in conjunction with “concatenation”. These codes include “concatenated codes”, “product codes” and “turbo codes” as special cases. We then extend our approach to a continuous channel, by adopting AZD (ambiguity zone detection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symmetric adaptive customer modeling in an electronic store

    Publication Year: 1998, Page(s):348 - 352
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Electronic Commerce (EC) is currently one of the fastest growing and most practically relevant application areas of distributed systems technologies. It is based on the economic aspects of commercial trading patterns combined with distributed computing systems technology. It is a market environment that is characterized by low transaction costs, a large number of market participants, and easy onli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior of task scheduling algorithms with probabilistic module execution times

    Publication Year: 1998, Page(s):647 - 651
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Static task scheduling in distributed computing systems is a very complex problem and known to be NP-hard. This problem is even harder when the module execution times become probabilistic. In this paper we study the effect of probabilistic module execution times on the performance of task-scheduling algorithms. We show that in static task scheduling, for probabilistic module execution times, and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive scheme for better utilization with QoS constraints for VBR video traffic in ATM networks

    Publication Year: 1998, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    The efficient transportation of real-time variable bit rate (VBR) video traffic in high-speed networks is critical for current multimedia applications. The real-time VBR video traffic has stringent delay and cell-loss requirements. The high burstiness of the correlated VBR video traffic makes the adaptive resource management, highly desirable. This paper presents a dynamic bandwidth allocation sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM input-buffered switches with the guaranteed-rate property

    Publication Year: 1998, Page(s):331 - 335
    Cited by:  Papers (36)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    There is considerable interest in the provision of guaranteed-rate services for IP and ATM networks. Simultaneously, bandwidth demands make input-buffered architectures attractive, and in some cases, necessary. We consider the problem of how to support guaranteed-rate services in a single-stage, input-buffered switch suitable for a LAN switch, an ATM switch or an IP router. Such a switch must be f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.