IEEE Transactions on Communications

Issue 234  Part 1 • Feb-Apr 1994

 This issue contains several parts.Go to:  Part 2  | Part 3 

Filter Results

Displaying Results 1 - 25 of 73
  • Construction of trellis codes with a good distance profile

    Publication Year: 1994, Page(s):290 - 298
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    Systematic feedforward trellis codes for 8-PSK and 16-QAM modulation are constructed using a nested step by step algorithm which guarantees a good distance profile. This makes the codes suitable for use with sequential decoding, where a rapidly growing distance profile is needed to reduce the average number of computations. In addition to having a good distance profile, the new codes achieve asymp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability and availability analysis of Manhattan street networks

    Publication Year: 1994, Page(s):511 - 522
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    A Manhattan street network (MSN) is a regular, two-connected local area network. It has multiple paths between each pair of nodes that improve the reliability and throughput relative to single-loop networks. The authors evaluate reliability for accurate and approximate MSN models. Via both simulation and theoretical analysis, they show that there is little difference between the exact and approxim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fiber distributed data interface: throughput evaluation with multiple classes of traffic

    Publication Year: 1994, Page(s):499 - 510
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    The fiber distributed data interface (FDDI) standard supports synchronous and asynchronous data transmissions. It allows each station to have multiple classes of asynchronous data, and meets the requirements of different classes by means of a timer-based priority scheme. The performance of a FDDI network carrying multiple classes of traffic is considered. An analytical model is presented to evalua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of generalized minimum distance decoding to hybrid-ARQ error control

    Publication Year: 1994, Page(s):640 - 647
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    Generalized minimum distance (GMD) decoding is modified to allow simultaneous error detection and error correction. The soft-decision information retained by the generalized minimum distance concept is used as a source of reliability information which determines when a retransmission of the received packet should be requested. The performance of hybrid-ARQ GMD decoding is shown to be comparable to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of fixed and variable-rate signaling for meteor burst communications

    Publication Year: 1994, Page(s):211 - 215
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    This paper compares fixed-rate signaling (FRS) with variable-rate signaling (VRS) when used in conjunction with forward error-correction coding for meteor burst communications. VRS refers to the reduction of bandwidth to compensate for the signal decay, which occurs as a meteor trail diffuses. The performance is quantified by calculating the cutoff channel model which assumes that signal amplitude... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new protocol for route discovery in multiple-ring networks. 1. The basic protocol

    Publication Year: 1994, Page(s):488 - 498
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB)

    Source routing requires that the source station knows a route to the destination. The paper presents a new bridge protocol for route discovery in multiple-ring networks, where several token-rings are connected by bridges. The protocol gives to the source station an indication of the availability of a route to the destination. If such a route exists, the source is supplied with a description-a list... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DPSK performance for indoor wireless Rician fading channels

    Publication Year: 1994, Page(s):592 - 596
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Indoor wireless channels which fade because of reflections from the building structure and the objects within the building have been experimentally found to fit either Rayleigh or Rician statistics. Digital communications performance has been calculated for these models, although in the Rician case numerical methods are typically employed. The authors present the closed form solution for DPSK in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Folding algorithm: a computational method for finite QBD processes with level-dependent transitions

    Publication Year: 1994, Page(s):625 - 639
    Cited by:  Papers (60)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1492 KB)

    This paper presents a new computational method for steady state analysis of finite quasi-birth-death (QBD) processes with level-dependent transitions. The QBD state space is defined in two-dimension with N phases and K levels. Instead of formulating solutions in matrix-geometric form, the Folding-algorithm provides a technique for direct computation of πP=0, where P is the QBD generator which i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal source coding with codebook transmission

    Publication Year: 1994, Page(s):336 - 346
    Cited by:  Papers (20)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1128 KB)

    A universal source coding system with vector quantizer codebook transmissions is studied using high resolution quantization theory. Conditions are derived for the optimal tradeoff between quantizer resolution and the information rate used to transmit codebooks. A formula that tightly bounds the mean squared error of the universal coding system as a function of the time between codebook transmissio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improvement on codebook search for vector quantization

    Publication Year: 1994, Page(s):208 - 210
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    Presents a simple but effective algorithm to speed up the codebook search in a vector quantization scheme when a MSE criterion is used. A considerable reduction in the number of operations is achieved. This algorithm was originally designed for image vector quantization in which the samples of the image signal (pixels) are positive, although it can be used with any positive-negative signal with on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes

    Publication Year: 1994, Page(s):477 - 487
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB)

    Provides an analysis of a rate-based access control scheme in high speed environments based on a buffered leaky bucket algorithm. The analysis is carried out in discrete time which is representative of an ATM environment. For the cell arrivals to the leaky bucket the authors consider a general discrete Markovian arrival process which models bursty and modulated sources. The key of the analysis is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the number of wavelengths and switches in all-optical networks

    Publication Year: 1994, Page(s):583 - 591
    Cited by:  Papers (36)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    The authors consider optical networks using wavelength division multiplexing, where the path a signal takes is determined by the network switches, the wavelength of the signal, and the location the signal originated. Therefore, a signal is routed through a combination of circuit switching and wavelength routing (assigning it a wavelength). They present a bound on the minimum number of wavelengths ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systolic architecture for fast stack sequential decoders

    Publication Year: 1994, Page(s):324 - 335
    Cited by:  Papers (26)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB)

    The troublesome operation of reordering the stack in stack sequential decoders is alleviated by storing the nodes in a systolic priority queue that delivers the true top node in a short and constant amount of time. A new systolic priority queue is described that allows each decoding step, including retrieval, reordering and storage of the nodes, to take place in a single clock period. A complete d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay bounds on a queueing system with consistent priorities

    Publication Year: 1994, Page(s):615 - 624
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1068 KB)

    A discrete-time queueing system operating under a two-level, consistent priority service policy is studied. The consistency of the policy guarantees that no low priority customer will be served before a previously (or simultaneously) arrived high priority one. Unlike the well known head of the line priority policy (which is consistent), the considered policy provides for limited service to low pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of an all-digital maximum likelihood carrier phase and clock timing synchronizer for eight phase-shift keying modulation

    Publication Year: 1994, Page(s):773 - 782
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    An all-digital trellis-coded 8PSK (TC-8PSK) demodulator well suited for VLSI implementation, including maximum likelihood estimation decision-directed (MLE-DD) carrier phase and clock timing recovery, is introduced and analysed. By simply removing the trellis decoder the demodulator can efficiently cope with uncoded 8PSK signals. The proposed MLE-DD synchronisation algorithm requires one sample fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency reference in VSAT

    Publication Year: 1994, Page(s):233 - 236
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A low cost technique of frequency reference distribution within a VSAT network is discussed. This technique allows the use of a modestly frequency stable oscillator as the master frequency reference in the hub of a star-connected VSAT network. The need for extremely frequency stable OCXOs in VSATs is completely avoided. This technique was successfully incorporated In the early commercial VSAT netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video signal coding with DCT and vector quantization

    Publication Year: 1994, Page(s):200 - 207
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2272 KB)

    An image coding scheme using the discrete cosine transform is analyzed when the transform coefficients are vector quantized. The coding method is based on the known scheme proposed by Chen and Smith (1977) which sorts the picture blocks into classes according to the level of image activity. The coding scheme is modified to allow for vector quantization of the ac coefficients, in particular a pyram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coherent reception of generalized MSK over Rayleigh flat-fading channels

    Publication Year: 1994, Page(s):410 - 416
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    This paper addresses the problem of coherent data detection over Rayleigh flat-fading channels. Minimum shift keying and Gaussian minimum shift keying are assumed as modulation formats. After baseband conversion and filtering, the received waveform is processed, in an all-digital fashion, by means of a decision-directed algorithm aimed at estimating and removing the propagation-induced distortion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel assignment under a conflict-free allocation policy

    Publication Year: 1994, Page(s):466 - 476
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1104 KB)

    A random, conflict-free slot assignment policy is adopted for the allocation of a common channel between two (non-communicating) stations. Although this policy is inferior to the optimal periodic, fixed slot assignment policy, it is shown than it achieves the performance of that optimal policy as the variance of the packet arrival process increases. The main advantage of the random, conflict-free ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded multipulse modulation in optical communication systems

    Publication Year: 1994, Page(s):574 - 582
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    An optical communication system using coded multipulse position modulation is described. The position of the pulses in each signalling interval are derived from general binary constant weight codes. The combined coding and modulation of multiple pulses provides a minimum distance between any two signaling frames. Photon counting is used at the receiving end for noiseless optical channel in which o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of statistical multiplexing for heterogeneous bursty traffic in an ATM network

    Publication Year: 1994, Page(s):745 - 753
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    Analyzes the performance of a statistical multiplexer for heterogeneous types of bursty traffic in an asynchronous transfer mode (ATM) network. The authors model each type of bursty traffic with a Markov-modulated Poisson process (MMPP), and represent the different burstinesses of traffic by changing the parameters of the MMPP. Then, they use a finite queue multi-server model for analysis of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete time queues with phase dependent arrivals

    Publication Year: 1994, Page(s):606 - 614
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB)

    The queueing behavior of many communication systems is well modeled by a queueing system in which time is slotted, and the number of entities that arrive during a slot is dependent upon the state of a discrete time, discrete state Markov chain. Techniques for analyzing such systems have appeared in the literature from time to time, but distributions have been presented in only rare instances In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a multilevel coded modulation system

    Publication Year: 1994, Page(s):299 - 312
    Cited by:  Papers (47)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1444 KB)

    A modified version of the multilevel coded modulation scheme of Imai and Hirakawa (1977) is presented and analyzed. In the transmitter, the outputs of the component codes are bit interleaved prior to mapping into 8-PSK channel signals. A multistage receiver is considered, in which the output amplitudes of the Gaussian channel are soft limited before entering the second and third stage decoders. Up... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple symbol partially coherent detection of MPSK

    Publication Year: 1994, Page(s):430 - 439
    Cited by:  Papers (16)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    The authors show that by using the known (or estimated) value of carrier tracking loop SNR in the decision metric, it is possible to improve the error probability performance of a partially coherent MPSK system relative to that corresponding to the commonly used ideal coherent decision rule. Using a maximum-likelihood approach, an optimum decision metric is derived and shown to take the form of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perfect three-level and three-phase sequences and arrays

    Publication Year: 1994, Page(s):767 - 772
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Introduces construction methods for synthesizing new classes of perfect sequences and arrays. Time discrete sequences and arrays are perfect, if their periodic autocorrelation function sidelobes are zero. The construction of perfect three-level and three-phase sequences is performed in two steps. In the first step, a maximal length shift-register sequence with elements in GF(q) is built for a leng... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas