By Topic

Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]

1-3 April 1992

Filter Results

Displaying Results 1 - 25 of 105
  • Eleventh Annual International Phoenix Conference on Computers and Communications (Cat. No.92CH3129-4)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (507 KB)
    Freely Available from IEEE
  • Relative-clock-based specification and test result analysis of distributed systems

    Publication Year: 1992, Page(s):687 - 694
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB)

    A model employing totally ordered events of a distributed system based on a logical clock has been presented by L. Lamport (1978). The authors propose a new interpretation and extension of Lamport's notion of concurrency by introducing the concept of relative concurrency to capture the nature of concurrency of distributed systems by means of a relative (or logical) clock. They then derive a totall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An SNMP-based expert network management system for a large-scale OSI-based campus network

    Publication Year: 1992, Page(s):695 - 700
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB)

    The authors examine the design issues of a practical network management system using the simple network management protocol (SNMP) in the context of a large-scale open systems interconnection (OSI)-based campus-network called TAINS. Various design aspects are examined and the importance of time-management is examined. In the proposed design, intelligent, time-synchronized agents are deployed to co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge sharing between distributed knowledge based systems

    Publication Year: 1992, Page(s):701 - 705
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB)

    A distributed knowledge-based system (KBS) designed to help computer network users and administrators use, manage, and maintain computer networks is described. The initial version of the system emphasizes the types of local area networks that are typically found in large industrial, governmental, or educational organizations. Knowledge used by the system is elicited from experts, generated from lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote visualization and parallelism using existing networks

    Publication Year: 1992, Page(s):706 - 713
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (737 KB)

    A method for using existing networks and available parallel channels to provide the needed throughput for remote visualization is proposed. This method keeps the functionalities of the traditional protocol stack but introduces parallelism at all points where bottlenecks can develop. The approach allows the use of existing protocol standards and off-the-shelf hardware to permit new applications tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Star network computer: a heterogeneous computing system

    Publication Year: 1992, Page(s):714 - 721
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB)

    An architecture for tightly coupled network computing is presented. The system was created to provide a scalable processing environment for computationally intensive applications. The system consists of a digital data switch surrounded by computing elements. The switch is composed of a back-to-back baseline multistage interconnection network, plus the ISDN protocol suite with an asynchronous trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital neural network implementation

    Publication Year: 1992, Page(s):722 - 728
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    The authors provide a comparison of implementation approaches for digital neural networks. Digital neural networks of large size are feasible if the inputs and outputs are single-bit binary signals. A key component for this application is the parallel counter, which counts the number of inputs that are ONEs. Progress is reported toward the implementation of parallel counters with up to 1022 inputs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural network and pattern recognition techniques for characterizing ultrasonic transducers

    Publication Year: 1992, Page(s):729 - 735
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    A system in which transducers are characterized and classified using both pattern recognition and neural network algorithms is presented. Various techniques are investigated, compared, and analyzed. The hardware of the system used in collecting and measuring the characteristics of the transducers, and the parameters used in classifying the transducers into classes are described. The neural network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated circuit neural networks using ferroelectric analog memory

    Publication Year: 1992, Page(s):736 - 742
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB)

    The application of ferroelectric thin-film capacitors as synapses in integrated circuit implementation of artificial neural networks is described. A continuous-valued synapse where the synaptic efficacy is controlled by the polarization of a ferroelectric capacitor element is presented. The ferroelectric analog synapse utilizes nondestructive readout. A ferroelectric capacitor circuit model has be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Hough transform based on pyramidal architecture

    Publication Year: 1992, Page(s):743 - 750
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1055 KB)

    A hierarchical Hough transform (HT) based on pyramidal architecture is described, being a main component of the low-to-medium spatial vision subsystem for a mobile robot. The sequence of processing in the system originally conceived to be essential to the extraction of line features in indoor scenes consisted of: histogram equalization, smoothing with the use of a medial filter, edge detection usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel algorithm for the differential maintenance of a transitively closed relation

    Publication Year: 1992, Page(s):751 - 758
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (766 KB)

    A parallel algorithm to propagate the insertion or deletion of a set of tuples in a binary relation into a transitively closed concrete relation without complete recomputation of the transitive closure is presented. The parallel external closure operator is used to determine the tuples which have to be added or deleted from the concrete relation. A performance analysis for the parallel external cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability analysis of composite coteries

    Publication Year: 1992, Page(s):759 - 765
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    A collection of quorums is called a coterie. The authors present an algorithm to construct coteries by composing existing coteries. The resulting coteries are called composite coteries. Several different measures may be used to analyze coteries. One of the most commonly used measures is availability. In general, it is difficult to directly compute the availability of coteries in a large system. An... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of conflict-free Petri nets to parallel programs and asynchronous circuits

    Publication Year: 1992, Page(s):766 - 773
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB)

    The author composes a unified approach for dealing with the race detection problem for two entirely different models, namely, parallel programs and asynchronous circuits. It is shown that the problem of determining whether two transitions in a one-bounded conflict-free Petri net can become enabled simultaneously is solvable in polynomial time. This is referred to as the pairwise concurrency proble... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pre-run-time scheduling of processes with exclusion relations on nested or overlapping critical sections

    Publication Year: 1992, Page(s):774 - 782
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    Nested or overlapping critical sections in processes frequently occur in many hard-real-time system applications. For a pre-run time schedule, the ability to schedule such processes can often significantly increase the chances of finding a feasible schedule. The authors study the properties of exclusion relations defined on nested or overlapping critical sections. An algorithm is presented that is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time constrained performance of a two channel reservation protocol for local networks

    Publication Year: 1992, Page(s):644 - 650
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    An efficient reservation-based carrier sense multiple access with collision-detection (CSMA/CD) protocol for two types of priority packets is presented. Type 1 packets are of relatively short duration, need a very quick response time, and have a high arrival rate. Type 2 packets are of longer duration, do not require as fast a response time, and have a low arrival rate. Expressions are developed f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approximate analysis of a token ring network with nonpreemptive priority under go-back-to-higher-priority discipline

    Publication Year: 1992, Page(s):651 - 658
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The authors present an approximate analysis of an asymmetric token ring network with nonpreemptive priority under a new discipline named the go-back-to-higher-priority discipline. This discipline is described and the token ring network is analysed on the basis of the independent hypothesis for the distribution of the cycle time. Then, probabilities for the number of messages at the token's arrival... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network performance of packet video on a local area network

    Publication Year: 1992, Page(s):659 - 666
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    Simulation was used to determine feasible operating regions for sending packet video over a carrier sense multiple access with collision detection (CSMA/CD) LAN. Simulation studies were used to compute the percentage of lost video frames and project the number of video sessions that can be carried by an Ethernet. The analysis was used to validate the simulation and applied in a limited way to vide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A user friendly specification environment for FDT and its application to LOTOS

    Publication Year: 1992, Page(s):667 - 673
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The authors propose a new specification methodology and environment named the model based programming (MBP) environment. The objective of MBP is to design a user-friendly specification environment for formal description techniques (FDTs) such as LOTOS and SDL. MBP consists of the following tools: (1) mechanism for requirement acquisition, (2) tutor, (3) formal specification description model and (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testability-directed service definitions and their synthesis

    Publication Year: 1992, Page(s):674 - 678
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB)

    The author proposes a new approach for designing easily testable protocols. Testability requirements are identified and specified at the service definition stage, which, by synthesis or any other refinement or protocol design process, can be mapped onto the protocol design. The advantage of this approach is that it is much simpler to specify testability requirements at the service level than at th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification of events and states in complex systems

    Publication Year: 1992, Page(s):679 - 686
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Monitoring consists of collecting information from the system and detecting particular events and states using the collected information. These events and states can be symptoms for performance degradations, erroneous functions, suspicious activities, etc. and are subject to further analysis. Detecting events and states requires a specification language which makes it possible to express a wide va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-token protocol for high-speed multimedia LANs

    Publication Year: 1992, Page(s):604 - 611
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB)

    The authors deal with a new channel access scheme for ring LANs, referred to as the self-token protocol. They describe the basic operation of the protocol, priority transmission and the packet error detection/recovery method. The performance of the protocol was evaluated by using computer simulation. It was shown to have superior characteristics by combining the merits of the multiple-token and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic priority assignment scheme for real-time communications in DQDB networks

    Publication Year: 1992, Page(s):612 - 619
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB)

    The authors propose a dynamic priority assignment scheme which is able to make the best use of the multiple priority mechanism and achieve significant system performance for real-time communications. First, they briefly introduce the distributed queue dual bus (DQDB) standard and point out some problems for real-time communications. A dynamic system model is proposed and some design strategies for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptation of FDDI physical layer chip to Playthrough protocol

    Publication Year: 1992, Page(s):620 - 627
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (854 KB)

    Data flow design and very-high-speed integrated circuit (VHSIC) hardware description language (VHDL) behavioral simulation are presented for a physical layer encoder/decoder (ENDEC) chip that supports use of a Playthrough protocol on ring topology local area networks. The authors describe the Playthrough protocol's operational concept. The ENDEC design uses as much of the fiber distributed data in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast protocol conversion technique using reduction of state transition graphs

    Publication Year: 1992, Page(s):628 - 635
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (678 KB)

    A technique to improve the formal protocol conversion method suggested by K. Okumura (1986) is presented. The algorithm first constructs the reduced state transition graphs (STGs) of the protocols for which the converter is to be designed, and then follows the Okumura algorithm to produce a reduced communicating finite state machine (CFSM) model of the converter. This reduced machine is expanded t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A queueing approach to the performance evaluation of DQDB

    Publication Year: 1992, Page(s):636 - 643
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (695 KB)

    A queuing model for the distributed queue dual bus protocol is presented and analyzed. A queue buffer of length one and a single priority level are assumed. The state of a node is defined by the number of requests in the distributed queue before and after generation of a packet. The node average waiting time and average throughput are analyzed as functions of the node position and state in the net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.