[1991 Proceedings] Tenth Annual International Phoenix Conference on Computers and Communications

27-30 March 1991

Filter Results

Displaying Results 1 - 25 of 121
  • Tenth Annual International Phoenix Conference on Computers and Communications (Cat. No.91CH2959-5)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Universal frequency reuse: the CDMA advantage in capacity for digital cellular radio

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    Summary form only given, as follows. Interference among simultaneous users presents the primary limitation on capacity of all multiple access communication systems. In frequency-division-multiple-access (FDMA) and time-division-multiple-access (TDMA) cellular systems, interference is controlled by assigning disjoint frequency or time slots to all users in the same cell and disjoint frequency bands... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental CDMA personal communications network

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB)

    Summary form only given. An experiment designed to demonstrate the feasibility of overlaying a direct sequence code division multiple access (CDMA) personal communications network (PCN) on an existing set of narrowband microwave users is described. The frequency band 1850-1990 MHz was chosen for the experiment; this band will be divided into two 50 MHz subbands, one for the base-to-mobile link and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conformance validation of graphical user interfaces

    Publication Year: 1991, Page(s):733 - 739
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The authors address the validation of graphical user interfaces in their correctness or conformance to the required functionalities. A functional testing approach is presented with justifications. A form of state diagram (called WinSTD) has been developed in conjunction with a specification notation (called WinSpec) to formally state the valid inputs and outputs of user interfaces for conformance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keyboard optimization using genetic techniques

    Publication Year: 1991, Page(s):726 - 732
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    The problem of optimizing a keyboard for a particular finite dictionary, H, defined as a subset of the words over a finite alphabet, A is considered. The letters of A are assigned to elements of a set K. Thus, associated with every element i ∈ K is a set Ci such that the {Ci} partitions A. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia systems

    Publication Year: 1991, Page(s):719 - 724
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The topics discussed are multimedia database systems; continuous media and distributed computer systems; the future of multimedia systems; the Eastman Kodak Company's viewpoint on multimedia application and possible product development in this area; and multimedia system architecture. Several problems that have to be solved in the development of multimedia systems are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance bounds for direct-sequence spread-spectrum communications with complex signature sequences

    Publication Year: 1991, Page(s):408 - 414
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The authors present a unified performance analysis of direct-sequence spread-spectrum multiple-access (DS/SSMA) communications with deterministic complex signature sequences. The probability density function (pdf) of the multiple-user interference is determined. Using a round-down and round-up procedure on the pdf, arbitrarily tight lower and upper bounds on the probability of bit error (pbe) are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvements for the next generation of FDDI

    Publication Year: 1991, Page(s):710 - 716
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    Some changes are suggested to the fiber distributed data interface (FDDI) which will extend its applicability and efficiency. They present a concept showing how to gain a multiplicative effect in throughput for token rings by using a combination of a second counter-rotating ring and destination removal. Evidence is given to show that 100 Mb/s rings can deliver up to 250 Mb/s on each ring assuming ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access controls for open architecture in intelligent networks

    Publication Year: 1991, Page(s):587 - 593
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The author investigates the security issues and implications in implementing an open network architecture (ONA) in intelligent networks (INs). A view of technical limitations to ONA in IN is developed from the security standpoint. Specifically, access controls for ONA in IN are investigated. The author describes a multi-level functional component (FC) approach to ONA in an IN. With multi-level FCs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum detection of Rayleigh signals in nonstationary noise

    Publication Year: 1991, Page(s):401 - 407
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The authors propose an adaptive thresholding procedure for Rayleigh envelope distributed signals and noise, where noise power residues instead of noise power estimates are processed. It is shown that it is the optimum constant false alarm rate (CFAR) detector when the noise samples are statistically independent and identically distributed in the sense that its detection performance approaches that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDB: a high-performance fault-tolerant switching fabric for ATM switching systems

    Publication Year: 1991, Page(s):703 - 709
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The authors propose a unified scheme to enhance both the fault-tolerance and the performance of the delta network for asynchronous-transfer-mode (ATM) switching systems. In this scheme, the number of the input/output links in each switching element (SE) is doubled, compared to that used in the delta network, to widen the path between two stages. Buffer modules are also added to the SEs to serve as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An expert system for network management

    Publication Year: 1991, Page(s):580 - 586
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The authors propose a generalized architecture for an expert system to manage the resources of a computer network and/or a distributed system. The authors apply the proposed architecture to construct an expert system for allocating the resources needed by a task in a distributed computing environment. The resources are allocated such that the system load and the average delay of executing a task a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Baseband pulse shaping to reduce intersymbol interference in narrowband M-ary CPFSK signaling

    Publication Year: 1991, Page(s):393 - 400
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Baseband pulse shaping is proposed to reduce intersymbol interference of M-ary Continuous Phase Frequency Shift Keyed (CPFSK) signals in narrowband channels. It is shown that the error rate performance of M-ary CPFSK signals with modulation index 1/M can be significantly improved by using a raised cosine baseband pulse. Three symbol by symbol detection techniques, namely... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topological analysis of networks composed of multiple satellites

    Publication Year: 1991, Page(s):427 - 433
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    A method of evaluating the topological quality of a multiple node satellite communication network is presented. The criteria for evaluation are network survivability and throughput. Nodal connectivity is used to characterize survivability, and mean path length is used to characterize throughput. The effects of nodal losses in a network consisting of a Walker low-orbit sphere and a geosynchronous c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high speed high performance packet switch with redundancy

    Publication Year: 1991, Page(s):696 - 702
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The architecture of an electro-optical packet switch is outlined. Electronic circuits are used for buffering and control at the switch inputs. The switch outputs do not require logic circuits or buffers, but are simple regenerative repeaters. An optical interconnection network links inputs and outputs. A novel feature of the proposed architecture is the capability to transmit from each input unit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation of executable code from formal protocol specifications written in LOTOS

    Publication Year: 1991, Page(s):346 - 352
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    A novel tool for generating implementation prototypes of communication protocols and concurrent systems specified using the ISO LOTOS language is presented. LOTOS specifications are analyzed and translated into C functions that are executed by cooperating processes in the UNIX environment. The set of LOTOS process definitions is first translated into a suitable number of extended finite state mach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tuning computer communications networks and protocols

    Publication Year: 1991, Page(s):573 - 579
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    The objective is to adjust the protocol parameters and network elements to achieve maximum data throughput over a certain circuit or set of circuits (a network path) subject to certain constraints, such as: delay-bandwidth product, error rate, and tuning parameter limits and accessibility. To provide optimal performance from the user's perspective, which is application to application, all peer lay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A deadline-driven window protocol for transmission of hard real-time traffic

    Publication Year: 1991, Page(s):667 - 673
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    A description is given of a protocol to handle traffic with timing constraints, such as the traffic generated by distributed real-time applications. The protocol uses a dynamic double-window based strategy to implement the optimal minimum-laxity-first policy. The author discusses the major issues involved in the design of the protocol. The tie assessment phase is formally described and its mechani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated protocols for guaranteeing time-critical communication in CSMA environments

    Publication Year: 1991, Page(s):622 - 628
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Two protocols for carrier-sense-multiple-access (CSMA) transmission of time-critical messages are proposed. The basic idea of the protocols is to integrate some controlled access elements into the contention-based CSMA protocol. The proposed protocols are called the sparse integrated protocol and the periodic integrated protocol. The first protocol can be used in distributed systems in which time-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A table-driven (feedback) decoder

    Publication Year: 1991, Page(s):385 - 392
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    The authors present a table-driven technique for decoding of convolutionally encoded data. The approach can be used in either the feedback or the direct mode. A data-independent syndrome vector is generated on the transmitted bits. If it is different from zero it is used to address pre-computed tables of corrections for the encoded bits. The decoding is performed as a separate step. When the feedb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The support for a dynamic parallel object model on a transputer-based architecture

    Publication Year: 1991, Page(s):316 - 322
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    It is shown how a parallel object model can be used as a support environment for massively parallel architectures based on transputer technology. The intention is to verify that parallelism integrates well with such properties of the object paradigm as abstraction, uniformity, and dynamicity. The authors also present the guidelines to build prototypes by an approach based on primitives. In particu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decentralized consensus protocols

    Publication Year: 1991, Page(s):257 - 262
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The goal of decentralized consensus protocols is to exchange information among computers so that each computer acquires information held by every other computer in the system. The authors introduce a unifying framework which generalizes these decentralized consensus protocols. A necessary and sufficient property for consensus protocols, which uses k round of message exchange, is presented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient memory-resident data objects

    Publication Year: 1991, Page(s):145 - 151
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    The authors investigate the feasibility of replicated data objects consisting of several memory-resident replicas backed-up by a single append-only long maintained on disk. First, it is shown that such objects can be managed by simple variants of the most popular replication control protocols for disk-resident replicated objects. Second, under standard Markovian hypotheses, the availability of rep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threshold policies for load sharing in heterogeneous systems

    Publication Year: 1991, Page(s):100 - 105
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The authors adopt a queuing-theoretic approach to analyzing different threshold policies in the context of a particular model: the single-queue multiple-server (SQMS) model. Computing nodes are represented as servers and the authors consider the general case where they may have different service rates. This is a model of a centrally scheduled system as the entire system work-load goes through a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind deconvolution using a maximum likelihood channel estimator

    Publication Year: 1991, Page(s):448 - 452
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A channel estimator is presented that does not depend on a learning sequence or estimated data sequence for identifying the unknown channel. The authors endeavor to solve the problem of blind equalization in two steps. First, a maximum-likelihood estimate is made of the unknown channel from the received data alone. These estimates are then used in a maximum likelihood sequence (Viterbi) decoder to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.