Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on

6-11 Sept. 1993

Go

Filter Results

Displaying Results 1 - 25 of 77
  • Design and implementation of an OSI conformance test system considering extensions for interconnectability testing

    Publication Year: 1993, Page(s):665 - 669 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB)

    There is a wide perception of the need for conformance and interoperability testing to ensure the interoperability of open systems. In the circumstances, the authors have been making efforts to establish a system for interconnectability testing, which is a type of interoperability testing. In this paper, they discuss an interconnectability testing architecture that they have developed, and also a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test generation for the distributed test architecture

    Publication Year: 1993, Page(s):670 - 674 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB)

    ISO (International Standardization Organization) developed the ISO distributed test architecture for testing layered protocols. Furthermore, a general distributed test architecture where the IUT (implementation under test) contains several distributed ports is used for testing distributed systems, based on the Open Distributing Processing (ODP) Basic Reference Model (BRM). In this architecture, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicasting on certain self-similar networks

    Publication Year: 1993, Page(s):685 - 689 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB)

    Both the linear recursive networks and the hypercubic networks are known to be self-similar in their interconnection topologies. Here it is shown that multicasting can be efficiently performed on these networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's index

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • A resource pricing model for data networks

    Publication Year: 1993, Page(s):533 - 537 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    This paper presents a simple economic model for resource pricing in data networks. Though the model presented is simple, it is able to highlight various issues involved. The model is relevant for both networks that receive government subsidy, and also for those that have to generate all their revenue. The critical factor in calculating the tariff is correct estimation of subscriber demand. If proj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for recognizing user requirements in telecommunication services

    Publication Year: 1993, Page(s):528 - 532 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    This method is based on compensating for any information that is missing because it is too difficult for the user to describe, by discerning the user's intention from the information that is easy to describe. The authors introduce the STR service description language and propose the interface for inputting user requirements. They classify the specification's information from the user's viewpoint, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application architecture for network management

    Publication Year: 1993, Page(s):523 - 527 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The AT&T Unified Network Management Architecture (UNMA) initially focused on a hierarchical approach to integrated management through the use of OSI/TMN management protocols for communication of management information between the various systems in the hierarchy. With an increased emphasis on distributed systems and platforms in the industry. UNMA has enhanced its approach, by specifying an Ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic multicast-key determination protocol

    Publication Year: 1993, Page(s):518 - 522 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    This paper examines a generic deadlock-free protocol for the automated maintenance of a commonly-shared multicast-key within a group in communication with each other. The protocol's use under conditions of both centralized and distributed controls is described. Distributed schemes are inherently more robust and more readily available compared with the centralized scheme of establishing the common ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two round ZKIP of knowledge for SAT and its applications

    Publication Year: 1993, Page(s):512 - 517 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    This paper proposes the optimal 4-move ZKIP (Zero-Knowledge Interactive Proof systems) of knowledge for SAT and its application. Using the trapdoor bit commitment scheme and the WI(Witness Indistingushable) and the WH(Witness Hiding), it is shown that as compared with 6-move ZKIP for SAT, the proposed ZKIP is 4-move ZKIP for SAT and under claw-free pairs of functions the proposed ZKIP is also 4-mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security model

    Publication Year: 1993, Page(s):507 - 511 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    In view of the importance of researchers sharing the same concept of network security, this paper proposes a model in which network security issues can be treated integrally. The importance of network security has been recognized for some time, but providing networks (especially public networks) with security functions has proved difficult. The role of the network itself in computer network securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93

    Publication Year: 1993
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compressing Chinese text files using an adaptive Huffman coding scheme and a static dictionary of character pairs

    Publication Year: 1993, Page(s):808 - 812 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The compression method for Chinese text files proposed in this paper is based on a single pass data compression technique, adaptive Huffman coding. All Chinese text files to be compressed are modeled to contain not only ASCII characters, Chinese ideographic characters and punctuation marks, but also commonly used Chinese character pairs. The approach of using a static dictionary is employed to mai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACE-QPSK: a new method of coding QPSK for the nonlinear transmitter

    Publication Year: 1993, Page(s):862 - 866 vol.2
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Band-limited QPSK signals are prone to a high degree of spectral regrowth when nonlinearity is present in the transmitter amplifier. In a multi-carrier application with close adjacent channels (such as an FDMA satellite system), the spectral regrowth of adjacent channels can result in severe interference with the desired carrier. This may lead to substantial BER performance degradation or make nec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal data compression algorithms by using normal tree models

    Publication Year: 1993, Page(s):801 - 807 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Universal data compression algorithms are the algorithms by which source data can be coded without a priori knowledge of statistics of a source. This paper describes two techniques for constructing and updating normal trees-adding and discarding. Two universal data compression algorithms and their tree source models are proposed and their implementations are suggested. These algorithms are evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data modeling using an object-oriented logic language

    Publication Year: 1993, Page(s):744 - 748 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    An object-oriented logic programming language for modeling data is presented. This language supports most of the object-oriented features for data modeling and is based on many sorted horn clause logic. The data model provides a means for expressing queries as classes. Objects are defined as instances of a class allowing factoring of methods and type information View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On bounding Rician-type error probabilities and some applications

    Publication Year: 1993, Page(s):882 - 886 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The problem of efficiently evaluating the probability that the magnitude squared of one complex Gaussian random variable is less than the magnitude squared of another, possibly correlated, complex Gaussian random variable is addressed. This is known as an error probability of the Rician-type. In this paper, a bounding approach is taken. Tight upper and lower bounds are obtained, which together pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability analysis of inter-domain routing protocols

    Publication Year: 1993, Page(s):857 - 861 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    With the rapid growth in internetwork connectivity, it is becoming increasingly important to contain the overheads associated with inter-domain routing protocols. This paper analyses and compares storage, route computation and communication overheads of existing protocols for inter-domain routing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A universal double window sliding dictionary data compression algorithm

    Publication Year: 1993, Page(s):796 - 800 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    Compression of data is to minimise its representation which manifests in many applications such as storage and transmission. This proposed algorithm is an extension of the class of the substitutional encoders, typified by the Sliding Window technique (LZSS) of the Lempel-Ziv family of algorithms. This paper is concerned with the development of a universal lossless compression algorithm which allow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed staff directory system for a campus

    Publication Year: 1993, Page(s):740 - 743 vol.2
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    One of the common information services required in a campus environment is online directory services such as phone directory. This paper discusses the implementation of such a directory service. Besides being an online phone directory, this system also provides additional staff information such as staff photographs and their academic interests. This Staff Directory is built to supplement other app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of two interconnected DQDB MANs

    Publication Year: 1993, Page(s):549 - 553 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    The primary service which will be provided by broadband networks in the metropolitan or regional area will be directed to LAN interconnection for business and research users. Work has been aimed at the analysis of different access methods (MAC protocols) suitable for high speed and higher round trip delay networks such as metropolitan area networks (MAN). Since they will represent the first techni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two receivers for maximum likelihood sequence detection of minimum shift keying over the Gaussian channel with unknown carrier phase

    Publication Year: 1993, Page(s):877 - 881 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    The first receiver is the suboptimum maximum likelihood soft decoder in which explicit recovery of the unknown carrier phase is not necessary and it leads to constant receiver complexity independent of data sequence length. The second receiver is the two-stage receiver which is of an estimator-detector structure. The first stage being the carrier phase estimator extracts the carrier phase informat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical compound pulse time modulation for analogue fibre transmission

    Publication Year: 1993, Page(s):630 - 634 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    Compound pulse time modulation (CPTM) techniques represent an attractive alternative approach for multiplexing pulse time modulation (PTM) signals. This paper reports an experimental CPTM system based on combining pulse interval modulation and pulse width modulation for transmitting analogue signal over optical fibre cable employing a 1300 nm ELED. Signal to noise ratios of 40 dB have been achieve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the dimensioning of the leaky bucket policing mechanism for multiplexer congestion avoidance

    Publication Year: 1993, Page(s):617 - 621 vol.2
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    In this paper a model for an ATM multiplexer fed with bursty sources, controlled by the leaky bucket traffic controller is developed. Based on a suitable application of this model, a dimensioning procedure for the leaky bucket is proposed and its effectiveness analysed, considering the steady state cell loss probability as the performance measure for the multiplexer. Some numerical results are pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRUMP-a fast reliable transport protocol for distributed systems

    Publication Year: 1993, Page(s):601 - 605 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Traditional transport protocols such as TCP and TP4 were not designed to be used in distributed systems; they also fail to support the high speeds and low error rates of current high speed networks such as FDDI. Various protocols, such as VMTP, RRDP, NET-BLT and XTP have suggested ways of supporting distributed systems and/or high speed networks. However, none of them have fully supported both dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal neural routing algorithm

    Publication Year: 1993, Page(s):852 - 856 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    This paper describes a routing algorithm that uses the Hopfield neural algorithm. This algorithm takes into account the shortest path and link capacity and calculates the connections and weights of the neural network which will provide an optimum transmission path from source node to destination node. The minimization procedure is implemented using a modification of the neural network travelling s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.