Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Transactions on Communications

Issue 8 • Aug 1988

Filter Results

Displaying Results 1 - 13 of 13
  • Analysis of gateway congestion in interconnected high-speed local networks

    Publication Year: 1988, Page(s):986 - 989
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The effects of congestion on performance in interconnected high-speed local networks are investigated. The system studied uses network adapters as gateways to connect distributed local networks through a high-performance network link. Throughput measurements were determined by simulations of various combinations of link speeds, gateway buffering capacities, and local network traffic loads. The per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of multiuser coding to random access protocols

    Publication Year: 1988, Page(s):983 - 986
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The usefulness of multiuser coding for throughput enhancement in various random-access protocols with (0, 1, e) feedback is examined. A scheme is proposed in which the user population is divided into two or more classes and multiuser coding is used in such a manner that all collisions among at most one-user-per-class are resolved by virtue of the multiuser code. For ALOHA, tree, and inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approximate analysis of a buffered CSMA/CD

    Publication Year: 1988, Page(s):932 - 941
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    A continuous-time carrier-sense multiple access with collision detection (CSMA/CD) system with a finite number of homogeneous stations, each possessing an infinite buffer, is analyzed. The system and each station is treated approximately as an independent M/G/1 queuing system. Since stations are mutually dependent, the interference from other stations is taken into account, in te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol error rate curves for M-QAM signals with multiple cochannel interferers

    Publication Year: 1988, Page(s):980 - 983
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    A recursive algorithm for determining the probability of symbol error in an M-QAM system, subject to multiple-cochannel interferers, is presented. In particular, a recursive formula is derived for determining the symbol-error-rate (SER) of an M-QAM system subject to both multiple-sinusoidal and similar, independent QAM interferers. The result is expected to prove useful in the an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithmic technique for protocol verification

    Publication Year: 1988, Page(s):924 - 931
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    An algorithmic procedure for protocol verification is presented. A protocol is described as a collection of processes interacting with one another using CSP-type input/output operations. The safety properties of each process are described by a finite-state machine and the liveliness properties of each process by a collection of temporal logic formulas. The required behavior of the protocol is then... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The structure of the limit cycles in sigma delta modulation

    Publication Year: 1988, Page(s):972 - 979
    Cited by:  Papers (77)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    It is shown that when the input to a sigma-delta modulator is a DC level that can be expressed as a rational number b/a, when normalized with respect to the quantizer step, the output bit string is periodic with a period that is multiple of the denominator a. On the basis of number theory, the structure of these cycles for single-loop modulators is determined and the noi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed reservation-based CDMA protocol that does not require feedback information

    Publication Year: 1988, Page(s):913 - 923
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB)

    In some multiuser radio systems the receiver is not allowed to transmit feedback information to the senders. In other applications, the transmitters cannot receive feedback information sent by the receiver. For these cases, a multiple-access protocol is needed that maintains satisfactory performance in the absence of feedback. Such a protocol is introduced and an exact analysis and performance eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image coding using vector quantization: a review

    Publication Year: 1988, Page(s):957 - 971
    Cited by:  Papers (609)  |  Patents (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1460 KB)

    A review of vector quantization techniques used for encoding digital images is presented. First, the concept of vector quantization is introduced, then its application to digital images is explained. Spatial, predictive, transform, hybrid, binary, and subband vector quantizers are reviewed. The emphasis is on the usefulness of the vector quantization when it is combined with conventional image cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locally optimum detection in moving average non-Gaussian noise

    Publication Year: 1988, Page(s):907 - 912
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    Detection algorithms that are locally optimum Bayes, and also asymptotically optimum, are developed for both coherent and incoherent signaling for arbitrary interference and signal waveforms when the dependence in the noise samples is represented by a moving-average model. This leads to receiver structures, which are prewhitened versions of the locally optimum detectors in the independent case. A ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DmB1M code and its performance in a very high-speed optical transmission system

    Publication Year: 1988, Page(s):951 - 956
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    A line code called DmB1M that is suitable for a very high-speed, optical, digital-transmission system is described. This code possesses a good balance of marks, spaces, and jitter-suppression capability, as well as a simple in-service error-monitoring function. A fundamental analysis of the DmB1M code is presented, along with experimental results at 1.8 Gb/s. Advantages of this code in parallel si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal interception: a unifying theoretical framework for feature detection

    Publication Year: 1988, Page(s):897 - 906
    Cited by:  Papers (328)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    The unifying framework of the spectral-correlation theory of cyclostationary signals is used to present a broad treatment of weak, random signal detection for interception purposes. The relationships among a variety of previously proposed ad hoc detectors, optimum detectors, and newly proposed detectors are established. The spectral-correlation-plane approach to the interception problem is put for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic performance of M-ary orthogonal signals in worst case partial-band interference and Rayleigh fading

    Publication Year: 1988, Page(s):989 - 992
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    It is shown that for worst-case partial-band jamming, the error probability performance (for fixed Eb/NI) becomes worse with increasing M for (M>16). The asymptotic probability-of-error is not zero for any Eb/N I(>ln 2), but decreases inverse linearly with respect to it. In the fading case, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Twelve random access strategies for the fiber optic networks

    Publication Year: 1988, Page(s):942 - 950
    Cited by:  Papers (55)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    Twelve random-access strategies that do not constrain the distance or transmission rate of a network, and can use the capabilities of fiber-optic components, are described and compared. The twelve strategies consist of three protocols, each of which can use two timing arrangements and two network-access devices. The three protocols are the standard ALOHA protocol, LCSMA, and LCSMA/CD. The last two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas