Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications

3-6 July 2000

Filter Results

Displaying Results 1 - 25 of 125
  • ISCC 2000 Fifth IEEE Symposium on Computers and Communications [front matter]

    Publication Year: 2000, Page(s):i - xvi
    Request permission for commercial reuse | PDF file iconPDF (695 KB)
    Freely Available from IEEE
  • Acceleration of TCP throughput over satellite-based Internet access using TCP gateway

    Publication Year: 2000, Page(s):245 - 253
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB)

    Satellite communication is able to provide wide bandwidth, and satellite-based Internet access is expected to be a high speed Internet access method of the next generation. However, the propagation delay of a satellite link degrades the TCP throughput. The reason for this problem is that TCP performs window based flow control and most communicating hosts use the default window size such as 8 kbyte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):806 - 808
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • The Internet is challenging the intelligent network

    Publication Year: 2000, Page(s):800 - 805
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The service scenario which integrates traditional telecommunications and the Internet is one of the most promising in near/medium term. In order to be able to provide services within this scenario, the service providers must provide themselves with a platform, which effectively supports all the service aspects from creation to deployment, to efficient execution, to the areas of management. The obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RED behavior with different packet sizes

    Publication Year: 2000, Page(s):793 - 799
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    We consider the adaptation of random early detection (RED) as a buffer management algorithm for TCP traffic in Internet gateways where different maximum transfer units (MTUs) are used. We studied the two RED variants described by Floyd and Jacobson (1993), and point out a weakness in both. The first variant where the drop probability is independent from the packet size discriminates connections wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification and computation of dependencies for distributed management

    Publication Year: 2000, Page(s):78 - 83
    Cited by:  Papers (17)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    This paper addresses the role of dependency analysis in distributed management. The identification of dependencies becomes increasingly important in today's networked environments because applications and services rely on a variety of supporting services which might be outsourced to a service provider. However, service dependencies are not made explicit in today's systems, thus making the task of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient and flexible late join algorithm for interactive shared whiteboards

    Publication Year: 2000, Page(s):404 - 409
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    We propose a novel late join algorithm for distributed applications with a fully replicated architecture (e.g. shared whiteboards). The term `late join algorithm' is used to denote a mechanism that allows a late-coming participant rejoin an ongoing session. Generally, this requires that participants in the session provide the latecomer with the current state of the shared application. We identify ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Light-weight stream synchronization framework for multimedia collaborative applications

    Publication Year: 2000, Page(s):398 - 403
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Today's Internet best-effort services introduce unavoidable uncertainties in the data transfer delay and create the need for synchronization mechanisms that preserve the temporal relationship among streams of distributed multimedia applications. We present algorithms for stream synchronization that are immune to moderate clock skew between sender and receivers and take into account the different t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple XOR-based technique for distributing group key in secure multicasting

    Publication Year: 2000, Page(s):166 - 171
    Cited by:  Papers (3)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    One approach to multicast group security is to have a group key shared by every group member. In this paper, we are interested in group key distribution and management. A new simple technique is introduced for key distribution to a large group based on the hierarchical key tree. The new technique uses bit XOR operation between keys to reduce the computation effort, and uses random byte patterns (B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Association of uplink power control and base station assignment in cellular CDMA systems

    Publication Year: 2000, Page(s):705 - 710
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    In a wireless CDMA network a mobile is classically connected to the base station with the best received power level (R×L). The association (or the integration) of base station assignment with power control allows a given network to have better achievable performance. We investigate the association of base station assignment and power control in order to study the best achievable signal-to-in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The adaptive load service (ALS): an ABR-like service for the Internet

    Publication Year: 2000, Page(s):482 - 487
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    We present a novel approach for realizing adaptive QoS control in the Internet called the adaptive load service (ALS). ALS was designed in a similar fashion to the available bit rate service (ABR) proposed for ATM. That is, the senders transmit control messages indicating their requirements, intermediate routers adjust the indicated values in accordance with their available resources and the recei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A standalone video communication system for wireless applications

    Publication Year: 2000, Page(s):304 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    This paper describes a low bit rate standalone portable video communication system developed for wireless applications. The video codec is based on H.263, and the audio codec is based on G.723.1. The transmission bandwidth is limited to 25 kHz. In order to have reasonable good video and audio quality, the source bit rate is set to 38 kbps. This includes video, audio and synchronization. The bit st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing performance using weighted round-robin

    Publication Year: 2000, Page(s):785 - 792
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    IP networks will evolve from today's best-effort Internet into multi-class networks supporting quality of service requirements of diverse applications. This paper addresses one of the challenges of these new IP networks: how to set control parameters to deliver differentiated performance. We study this problem in a simplified setup of a single link and a weighted round robin queueing discipline. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inverse multiplexing for ATM. Technical operation, applications and performance evaluation study

    Publication Year: 2000, Page(s):391 - 396
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    In a wide area network (WAN) established infrastructure, one of the main problems ATM network planners and users face, when greater than T1/E1 bandwidth is required, is the high cost associated to T3/E3 links. The technology to cover the gap between T1/E1 and T3/E3 bandwidth at reasonable cost is known as inverse multiplexing for ATM (IMA). IMA allows multiple T1/E1 lines to be aggregated to suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security requirements for management systems using mobile agents

    Publication Year: 2000, Page(s):160 - 165
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decentralized power control algorithms for multi-service CDMA-based cellular systems

    Publication Year: 2000, Page(s):700 - 704
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    We present two decentralized iterative power control algorithms (IPCAs) for the uplink and downlink communication in multi-service CDMA wireless environments in order to expand the system capacity while at the same time satisfy the various QoS requirements. The proposed dynamic IPCAs are decentralised in the sense that they can be implemented in a distributed mode at the individual cell sites and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative decoding of product codes composed of extended Hamming codes

    Publication Year: 2000, Page(s):732 - 737
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Iterative decoding of product codes that uses a soft-in/soft-out decoder based on the Chase algorithm was introduced by R. Pyndiah et al. (see Proc. IEEE GLOBECOM, vol.1/3, p.339-43, 1994). This decoding scheme is quite similar to turbo codes, but makes possible the implementation of the decoder with low complexity while providing acceptable performance. In this paper for the product codes compose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel Reed-Solomon coding in asymmetric digital subscriber lines

    Publication Year: 2000, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The ADSL standard is based on using hard decision decoding of Reed-Solomon (RS) codes. The standard states that as an option a four dimensional 16-state trellis code can be concatenated with an RS code. The resulting structure is rather complex mainly because of the associated complexity of the Viterbi decoder of the trellis code. An alternative to this complex structure is to improve the performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System stability with the PD ABR flow control algorithm

    Publication Year: 2000, Page(s):477 - 481
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    In a previous work we have proposed the PD (proportional and derivative) algorithm, which is an explicit algorithm for ABR flow control in ATM networks. The performance study of this algorithm has shown that on one hand, it achieves a full utilization of network links and the fairness in bandwidth allocation. On the other hand, the PD algorithm ensures good buffer occupancy with respect to the fix... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnostic tests for communicating nondeterministic finite state machines

    Publication Year: 2000, Page(s):424 - 429
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Systematic test sequence generation for conformance testing of communication protocol implementations, has been an active research area during the last decade. Methods were developed to produce optimized test sequences for detecting faults in such systems. However the application of these methods gives only limited information about the location of detected faults. In this paper we propose a compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic QoS-support for CORBA

    Publication Year: 2000, Page(s):60 - 65
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Quality of service (QoS) management is an increasing demand on distribution infrastructures. While most of the existing QoS management architectures support a fixed set of QoS only, larger distributed systems encounter a variety of QoS requirements. This leads to a mix of different platforms and increased interoperability and management efforts. Generic QoS management could help to reduce this eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of multiplexer-introduced loss for MPEG-4 data streams connected to (R)CBR channels

    Publication Year: 2000, Page(s):298 - 303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    As MPEG-4 uses objects to compose scenes, and each object is transmitted using one or more data streams (e.g. for audio, video base, and video enhancement layers) the network overhead for a single service can be very high. MPEG-4 systems specifies a multiplexing tool to reduce the network overhead. This multiplexer can drop frames, if the frames deadlines and the network channel QoS make a timely ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How unfair can weighted fair queuing be?

    Publication Year: 2000, Page(s):779 - 784
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    This paper presents a study carried out on a weighted fair queuing implementation for Unix routers-the WFQ implementation of the ALTQ project. It shows the WFQ/ALTQ weaknesses and explains why we cannot expect an interesting behavior from a system using such a scheduler. The conclusions here presented are supported by a set of tests using UDP traffic only. With a tool developed in our laboratory, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of operation support systems in public data networks

    Publication Year: 2000, Page(s):72 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Operation support systems (OSS) facilitate the development, deployment and maintenance or high-quality network-based services at a reasonable cost. This paper reviews the trends, particularly the customers' needs to manage their own data networks, and their effects on the architecture of OSS of public data networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable memory management for ATM systems

    Publication Year: 2000, Page(s):385 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    The scalability of SDH/SONET to high speeds places strict performance requirements on ATM systems. Throughput preservation of link speed through protocols to a higher layer application is a known problem in high-speed communication systems, which becomes more acute as link speed increases and is being addressed with designs that offer high speed data paths and high embedded processing power. We in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.