By Topic

IEEE Transactions on Communications

Issue 1  Part 1 • Date January 1982

Filter Results

Displaying Results 1 - 25 of 43
  • [Front cover and table of contents]

    Publication Year: 1982, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (288 KB)
    Freely Available from IEEE
  • Communications in the Automated Office: Guest Editor's Prologue

    Publication Year: 1982, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    The scope of this Special Issue is communication in its most general sense, encompassing communication from person to person, between people and machines, and from machine to machine. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of CSMA/CD Networks Under Combined Voice and Data Loads

    Publication Year: 1982, Page(s):6 - 11
    Cited by:  Papers (48)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB)

    This paper describes a simulation study of a class of carrier sense multiaccess buses with collision detection, similar to the Xerox Ethernet. The driving loads for the network models are similar to ones that might be found in an office information system which integrates data and voice communication. Various backoff algorithms are considered, to investigate the suitability of the approach and to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounding Mean Throughput Rate and Mean Delay in Office Systems

    Publication Year: 1982, Page(s):12 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB)

    Offices handle a mix of jobs, with each job consisting of one or more steps. The fundamental ingredients in performance analysis are the job arrival statistics, the service required for each job step, and a scheduling policy, for a given equipment configuration. The approach is hierarchical and can be refined in numerous ways; here the authors focus on a mean value analysis: the inputs are the mea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-Benefit Analysis for Local Integrated Facsimile/Data/Voice Packet Communication Networks

    Publication Year: 1982, Page(s):19 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Corporate planning for the automated office requires an increasing awareness of productivity improvement offered by control of office costs. A model for analyzing the cost tradeoffs involved in adding terminals to the communication channels of a local, centralized store and forward computer network for facsimile, data, and/or voice packet switched transmission is presented. The overall cost-benefi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model for Specification of Office Communications

    Publication Year: 1982, Page(s):27 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (934 KB)

    Specification of office communications requirements necessitates the development of a communications model applicable to office processes. The model must facilitate the representation of communications processes in terms of office physical and logical organization and operation. Physical aspects include office communications equipment and their interconnections, while logical components represent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Architecture for Computer-Based Message Systems

    Publication Year: 1982, Page(s):37 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1081 KB)

    In this paper the authors present an overview of an architectural model for large, distributed computer-based message systems. This model specifies (1) the organization of message systems in terms of functional entities; (2) the operation of the system; (3) the protocols and interfaces needed for interprocess communication; and (4) the organization of the directory system used to support identific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Naming and addressing in a computer-based mail environment

    Publication Year: 1982, Page(s):46 - 52
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB)

    In a computer-based mail environment, digital addresses are sufficient to allow the mail system to perform forwarding and delivery. However, digital addresses are not easily remembered by people and some of the intelligence inherent in the system must be used to provide a more humanly engineered addressing scheme. This paper proposes a two-stage approach. In the first stage, a set of attributes is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design Model for a Real-Time Voice Storage System

    Publication Year: 1982, Page(s):53 - 57
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB)

    In tomorrow's automated offices, an important role will be played by voice storage systems which enable telephone communication at any time. This paper discusses the problems and technical consideration in designing a flexible voice storage system featuring a distributed structure whose capacity can be expanded at will. Recent advances in microprocessors and magnetic minidisk devices have made thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Mail for the Hearing Impaired and Its Potential for Other Disabilities

    Publication Year: 1982, Page(s):58 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (825 KB)

    The introduction of electronic message systems in the office environment suggests a major new tool for the employability of physically disabled individuals. Communications barriers caused by hearing, speech, and visual impairments, as well as mobility barriers caused by paralysis and orthopedic disorders, become insignificant when individuals with such challenges have access to electronic mail. A ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A System for Managing Structured Messages

    Publication Year: 1982, Page(s):66 - 73
    Cited by:  Papers (7)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (966 KB)

    Message systems send and receive messages but do not manage the information the messages contain. Database management systems manage the information of a global database but do not have a notion of address. In this paper the authors outline a prototype system which integrates the facilities of message systems and database management systems. The system manages structured messages according to thei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Alerting Techniques for Office Activities Management

    Publication Year: 1982, Page(s):74 - 81
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    In this paper the authors approach the problem of office activities management from the database viewpoint. Database alerting techniques are developed to serve the purpose of office activities management. A conceptual framework for office information system design is presented. Simple database alerters and implementation techniques, existential alerters and time alerters are discussed. An example ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Support for Group Versus Individual Decisions

    Publication Year: 1982, Page(s):82 - 91
    Cited by:  Papers (143)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1288 KB)

    This paper gives several examples of computerized conferencing systems (CCSs) which have served as group decision support systems (DSSs). In addition, the results of a controlled experiment comparing the process and outcome of group decision-making in a face-to-face versus a CCS mode are discussed. Finally, preliminary results are presented from a second controlled experiment which explored how a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a Spelling List

    Publication Year: 1982, Page(s):91 - 99
    Cited by:  Papers (45)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1053 KB)

    The word list used by the UNIX spelling checker, SPELL, was developed from many sources over several years. As the spelling checker may be used on minicomputers, it is important to make the list as compact as possible. Stripping prefixes and suffixes reduces the list below one third of its original size, hashing discards 60 percent of the bits that remain, and data compression halves it once again... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Writing Tools

    Publication Year: 1982, Page(s):100 - 105
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    For many people, writing is painful and editing one's own prose is difficult, tedious, and error-prone. It is often hard to see which parts of a document are difficult to read or how to transform a wordy sentence into a more concise one. It is even harder to discover that one overuses a particular linguistic construct. The system of programs described here helps writers to evaluate documents and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Writer's Workbench: Computer Aids for Text Analysis

    Publication Year: 1982, Page(s):105 - 110
    Cited by:  Papers (31)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    This paper describes the Writer's Workbench programs, which analyze English prose and suggest improvements. Some limited data on the use of the Writer's Workbench and its acceptance are also presented. The Writer's Workbench incorporates the style and diction programs, described in a previous paper of this Transactions, into a more extensive system to help writers improve their writing. The system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Display Text Editor TED: A Case Study in the Design and Implementation of Display-Oriented Interactive Human Interfaces

    Publication Year: 1982, Page(s):111 - 119
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1146 KB)

    The authors present the criteria used in designing the human interface of the display text editor TED and explain how the design tradeoffs were made. Although discussed in the context of a text editor, these criteria are applicable to the design of human interfaces in general. They present a critical evaluation of the TED human interface in hindsight, and suggest modifications to overcome the shor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Potential of Forms in Office Automation

    Publication Year: 1982, Page(s):120 - 125
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (730 KB)

    Forms have been used in the design of at least three office automation systems (OfficeTalk, Odyssey, and OFS). Forms help ease the transition from a manual office system based on paper forms to a computer office system based on electronic forms. Forms also exhibit other advantages, not exploited presently, that make them very desirable for inclusion in office automation systems of the future. Pote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bit Error Rate Bounds for Viterbi Decoding with Modem Implementation Errors

    Publication Year: 1982, Page(s):129 - 134
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    A useful technique is derived for upper bounding the bit error rate of convolutional coding-Viterbi decoding in the presence of modem implementation errors or cochannel interference. This method utilizes the state transition matrix to find the contribution of each error event. By slightly underestimating the distance of each error path, the randomness of the implementation errors or interference c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cochannel Interference Considerations in Frequency Reuse Small-Coverage-Area Radio Systems

    Publication Year: 1982, Page(s):135 - 142
    Cited by:  Papers (124)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB)

    Frequency reuse small-coverage-area radio systems having hexagonal and square coverage areas are compared. Comparison is made on the basis of average signal to average interference (S̅/I̅) in the corners of the areas and on the basis of the expected probability of S/I exceeding some system threshold for at least one base station that is eligible to provide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Power Spectral Density of Digital Modulations Transmitted Over Nonlinear Channels

    Publication Year: 1982, Page(s):142 - 151
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (813 KB)

    This paper examines by analytical methods the power spectral densities of digital modulations (in particular, staggered and unstaggered quadrature modulations) passed through band-limited nonlinear channels. Previously observed (by computer simulation or hardware measurement) behavior of such spectra with regard to the suppression or restoration of its sidelobes after passing through the nonlinear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Sequence Detection and Optimal Symbol-by-Symbol Detection: Similar Algorithms

    Publication Year: 1982, Page(s):152 - 157
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB)

    An algorithm is derived which performs optimal symbol-by-symbol detection of a pulse amplitude modulated sequence. The algorithm is similar to the Viterbi algorithm with the optimality criterion optimal symbol detection rather than optimal sequence detection. A salient common feature is the merge phenomenon which allows common decisions to be made before the entire sequence is received. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentially Coherent Detection of QASK for Frequency-Hopping Systems - Part I: Performance in the Presence of a Gaussian Noise Environment

    Publication Year: 1982, Page(s):158 - 164
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    In this paper the concept of differentially coherent detection of differentially phase-encoded QASK signals (DQASK) is described, and a receiver structure proposed. The remainder of the paper analyzes the performance of DQASK in the presence of a Gaussian noise environment with comparisons made to coherent detection of QASK. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentially Coherent Detection of QASK for Frequency-Hopping Systems - Part II: Performance in the Presence of Jamming

    Publication Year: 1982, Page(s):165 - 172
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB)

    The performance of differentially coherent detection of frequency-hopped QASK in the presence of partial-band noise and partial-band multitone jamming is presented. In each case, the worst case jamming strategy is determined which consists of specifying the worst case partial-band fraction and the corresponding maximum average error probability. The results obtained are compared with those of M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of the SNA Virtual Route Pacing Control

    Publication Year: 1982, Page(s):172 - 184
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1175 KB)

    In this paper the authors provide a model and analysis of the IBM SNA virtual route pacing control used to control congestion in SNA networks. The model is appropriate to single virtual routes only. The analysis uses a Norton equivalent of the virtual route queueing model. Similar analyses of two other end-to-end window control mechanisms are carried out; one a sliding window with each message ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas