Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Seventh Annual International Phoenix Conference on Computers an Communications. 1988 Conference Proceedings

16-18 March 1998

Filter Results

Displaying Results 1 - 25 of 85
  • Seventh Annual International Phoenix Conference on Computers and Communications. 1988 Conference Proceedings (Cat. No.TH0188-3)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • A survey of the impact of current linguistic research on computer applications

    Publication Year: 1988, Page(s):440 - 444
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB)

    Special logics for representing the semantics of domains peculiar to human language have been developed, and formal syntax research has been enriched by a substantial number of linguistically sound, formally specified grammatical theories that reflect a declarative rather than procedural approach to grammar and which embody the flexibility of information location afforded by unification. These the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The grid bus architecture for MIMD

    Publication Year: 1988, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    An MIMD computer interconnection architecture, the grid bus architecture, is explored. Algorithms are introduced which route messages in an efficient and fault-tolerant manner. A chip which implements the basic algorithm was built to show how the algorithm can be designed into hardware. Simulations of the architecture show the decrease in performance under high loads and larger array sizes. Other ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid differential encoder and non-linear filter (DEN filter)

    Publication Year: 1988, Page(s):470 - 473
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    A system is presented to combine two goals in image processing; compression and non-linear filtering. The compression is done using a modified differential Huffman coding technique. The non-linear filter uses a bounding technique to filter impulse noise while passing edges. Simulation results are presented in tabular form, along with several original and filtered images added for subjective viewin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault diagnosis and reconfiguration for reliable VLSI arrays

    Publication Year: 1988, Page(s):69 - 73
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    An online fault-tolerant strategy is proposed; it is composed of two phases: testing and locating faults, and reconfiguration. In the first phase, an online testing technique is used, which is a compromise between the commonly used techniques of time and space redundancy. It is capable of detecting permanent as well as transient faults. The reconfiguration phase is realized by using a global contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert system tool for broadband cable plant design

    Publication Year: 1988, Page(s):464 - 468
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    A formulation of the cable plant design problem using artificial intelligence and expert system techniques is described. The knowledge of the design engineer is captured in an interactive expert system. Such an expert system has been designed and implemented to provide the network designer with a tool to design the broadband cable plant. The design includes the knowledge representation for the cab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reconfigurable multiple-SIMD/MIMD/TMR system for multi-phase space-based missions

    Publication Year: 1988, Page(s):62 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The way in which a shuffle/exchange network is managed for single and multiple hybrid triplicated-modular-redundancy operations in addition to the normal SIMD, MIMD and multiple MIMD operations is described. The proposed system, the Omega/H(3,S), is suitable for applications that require various phases of a mission. Two TMR configurations are embedded in the structure of the routing netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An AI-based network management system

    Publication Year: 1988, Page(s):458 - 461
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    A preliminary network management prototype that is based on the cooperation of two components is described. A network monitoring and control system (NMCS), which uses advanced database management, graphics and man/machine interface techniques, is used for data collection and status evaluation. A rule-based expert system uses its acquired expert knowledge to recommend appropriate control actions to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of AI techniques to adaptive routing in wide-area networks

    Publication Year: 1988, Page(s):157 - 160
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Adaptive decentralized routing in wide-area networks is characterized by all nodes making routing decisions based on their current view of the status of remote nodes. Unfortunately, each node's view can be, and usually is, different, especially when the network is very large. The authors introduce the idea of cooperating intelligent agents, embedded within nodes, which infer the states of remote n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerance design of VLSI two dimension systolic processor array

    Publication Year: 1988, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    After briefly reviewing the development of the IC, the authors point out the necessity of introducing fault tolerance techniques to IC design. They discuss two fundamental fault tolerance design techniques for two-dimensional systolic array: direct reconfiguration and a fault-stealing algorithm. The authors propose a reconfiguration method which is easier and more successful than that given by M.G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The specification of concurrency: an object-based approach

    Publication Year: 1988, Page(s):246 - 250
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    An object-based model that stresses the parallel objects (PO) property of parallelism is presented. The main goal of an environment based on PO is to allow the user a maximally parallel decomposition of its applications. Two types of parallelism, interobject and intraobject parallelism, are utilized. The former results from the intrinsic capacity of execution associated with any object. The latter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol rate detectability of filtered OQPSK by a delay and multiply receiver

    Publication Year: 1988, Page(s):174 - 178
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    The detectability of the symbol rate of an offset quadrature-modulated signal by a delay and multiply receiver is investigated. Signal pulses considered are filtered rectangular pulses. The signal-to-noise ratio (SNR) at the receiver output is used as the measure of detectability. The effects of timing error, amplitude balance and filter order are studied. Also, analytical results are compared wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical panel-application of AI and expert systems to the design of very large distributed systems

    Publication Year: 1988, Page(s):194 - 200
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    This panel discussion consists of four position papers examining the potential of applying concepts and theories from the fields of artificial intelligence (AI) and expert system design in the research and development of distributed systems. The focus is on aspects of the operating systems and their stringent requirements as reflected in their complex decision-making processes. The panelists recog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link allocation in point-to-point multicomputer networks

    Publication Year: 1988, Page(s):353 - 356
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The allocation of physical links to implement channels between nodes in multicomputer networks that use a point-to-point interconnection topology is examined. There are three basic link allocation options available in the design of the multicomputer: provide half-duplex channels using one link per channel, provide full-duplex channels using two links per channels, or augment the network using addi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based software engineering tool for code analysis

    Publication Year: 1988, Page(s):291 - 295
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A rule-based software engineering tool is described that was developed for analyzing a large system of modules implemented in the Pascal language. It was used to create an intermodule cross-reference database for the system, a directed graph of procedure and function calls representing a high-level control-flow model of the system, and a collection of reports containing metric information about th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A laboratory for testing DoD protocol implementations: its architecture and methodologies

    Publication Year: 1988, Page(s):404 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    An examination is made of the protocol laboratory developed by Unisys Defense Systems for the US Defense Communications Agency. The laboratory was created to test implementations of the DoD Internet protocols (IP, TCP, FTP, SMTP, Telenet) for compliance with the military standards. The authors explain the need for such testing, discuss the testing principles on which the laboratory was founded, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logic-based work and utterance discovery from mixed-detail phonetic lattices

    Publication Year: 1988, Page(s):450 - 454
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    One approach to continuous speech recognition is to segment the acoustic linguistic analysis. It is shown how the insights of A. Smith (1976), K.W. Church (1983), and V.W. Zue (1985) in this regard may be combined in a single system. The algorithms and data structures can be conveniently expressed in a logic-based programming formalism. Input is a phonetic lattice with detail ranging from coarse c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slotted Aloha performance in a Rician fading environment

    Publication Year: 1988, Page(s):152 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Problems facing packet radio networks operating within buildings are outlined. The performance of the Aloha protocol in Rician fading channels with receiver capture and diversity is studied. The performance is found to be similar to Rayleigh channels for environments with a high variation in shadow losses but inferior to Rayleigh channels for environments with low variation in shadow losses View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Violation detection and recovery of distributed programs' safety properties

    Publication Year: 1988, Page(s):99 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    On the basis of communication-closed layers of a distributed program, the author suggests the use of a communication-closed layer as the syndicate unit for dynamically detecting and recovering from violations of safety properties as defined by the static portions of the specifications. A fault-tolerant layer is composed of several communication-closed layers known as alternate layers, each of whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLSI designs for redundant binary-coded decimal addition

    Publication Year: 1988, Page(s):52 - 56
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A binary-coded decimal system provides rapid binary-decimal conversion. However, BCD arithmetic operations are often slow and require complex hardware. One can eliminate the need for carry propagation and thus improve performance of BCD operations by using a redundant binary-coded decimal (RBCD) system. The VLSI design of an RBCD adder is introduced. The design consists of two small PLAs and two f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of software development information

    Publication Year: 1988, Page(s):240 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    A software development methodology that can be termed structured software development information generation is presented. Current software development methodologies fall short of completely documenting the entire software development. Some means for filling these shortfalls and inadequacies are presented. The methods proposed are based on collecting information into a relational database. An enti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of temporal variance for moving object extraction

    Publication Year: 1988, Page(s):480 - 484
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A technique for moving object detection and extraction is presented. The method is based on registration of a sequence of moving images followed by a temporal variance measurement. It is very suitable for systolic array machines and can be implemented efficiently. The result of applying these algorithms to a sequence of real data is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the implementation of an optical token-ring LAN

    Publication Year: 1988, Page(s):166 - 172
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    A description is given of an MAC (medium access control) and physical layer implementation of DAFNE, a multiservice optical local area network using the token ring access method. The nodes' hardware structure and the technologies chosen for their implementation are described. The implementation of the layers and their interface with the optical ring are investigated. The optical components used ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Objects and data structures in the FP paradigm

    Publication Year: 1988, Page(s):256 - 260
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    The way in which local data and data structures can be incorporated into untyped functional programming (FP) is demonstrated. A functional form called an infinite conditional (the CASE functional form) is added to the set of functional forms. CASE can be used to select functions dynamically, which has the effect of transforming objects into functions. In order to simulate pointers in algorithms on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new performance estimation technique for digital transmission systems using a single parity check code

    Publication Year: 1988, Page(s):184 - 190
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    A robust estimation scheme for bit-error rates in live traffic digital transmission systems that use a binary single-parity check code for error detection is proposed. The scheme estimates the bit error rate by converting the estimates of the parity error detection rate. This is done through the use of a closed form of the detection probability of the single-parity code. The form is expressed in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.