14,007 Result(s)
-
Chapter and Conference Paper
Design of two-dimensional FIR digital filters by using the singular-value decomposition
The SVD has been applied in conjunction with 1-D FIR-filter techniques for the design of 2-D quadrantally-symmetric FIR filters. It has been shown that three related realizations are possible and in each case,...
-
Chapter and Conference Paper
MPS-an experimental multi-microprocessor based parallel system
This paper introduces an experimental tightly-coupled multi-microprocessor system (MPS) for parallel processing. An overview of hardware architecture is given and a simple example of algorithm run on MPS is us...
-
Chapter and Conference Paper
Specifying Processes in Terms of Their Environments
A simple approach to specification and verification of processes is suggested. Instead of process equivalence as usual in process algebra, the correctness of an implementation w.r.t a specification is determined ...
-
Chapter
The Application of the Partition Function in “Revenue-Oriented” Performance Analysis for Network Management
In a circuit-switched network, an accepted call blocks other connection requests. How could one quantify this interference? How do the routes used affect the performance of the network? How much should one “ch...
-
Chapter and Conference Paper
Linear Complexity Profiles and Continued Fractions
The linear complexity, \( \mathcal{L} \) (sn), of a sequence sn is defined as the length of the shortest linear feedba...
-
Chapter and Conference Paper
Prelude: A system for portable parallel software
-
Chapter and Conference Paper
Choice coordination with multiple alternatives (preliminary version)
The Choice Coordination Problem with k alternatives (k-CCP) was introduced by Rabin in 1982 [Rab82]. The goal is to design a wait-free protocol for n asynchronous processes which causes all correct processes to a...
-
Chapter and Conference Paper
The development and testing of the identity-based conference key distribution system for the RHODOS distributed system
In this paper, we demonstrate that it is possible to develop an authentication service as an integral part of a distributed operating system, subject to some requirements and extensions to the original Koyama-...
-
Chapter and Conference Paper
Optimal map**s of m dimensional FFT communication to k dimensional mesh for arbitrary m and k
The FFT communication patterns are important to not only FFT algorithms, but also many other algorithms over one or higher dimensional. The map** of m dimensional FFT communication to k dimensional mesh has pre...
-
Chapter and Conference Paper
A unified framework for multicast forwarding
This paper examines the issues of implementation and integration in multicast. A framework for multicast forwarding is presented, which separates multicast forwarding from any associated protocols that may aff...
-
Chapter
Fault Diagnosis of Network Connectivity Problems by Probabilistic Reasoning
In this paper, we propose a framework for identifying most probable faulty network components from a set of generic alarms in a heterogeneous environment. A designated network entity with management responsibi...
-
Chapter
An Approach to TTCN-Based Test Execution
Test execution plays an important role in the protocol conformance testing system. We can classify existing test execution methods into two types: Compiling-based Test Execution and Interpreting-based Test Exe...
-
Chapter and Conference Paper
On the Matsumoto and Imai’s Human Identification Scheme
At Eurocrypt'91, Matsumoto and Imai presented a human identification scheme for insecure channels, which is suitable for human ability of memorizing and processing a short secret. It prevents an in- truder fro...
-
Chapter
Interference Suppression for CDMA Overlays of Narrowband Waveforms
An overview of the performance of CDMA networks which overlay narrowband signals in order to increase spectral efficiency is presented. Such systems employ interference suppression filters in the CDMA receiver...
-
Chapter
Protocol Validation Tools as Test Case Generators
A method is proposed to transform a test case generation problem to a protocol validation problem. Protocol validation has been studied for years and many validation tools are available. By transforming a test...
-
Chapter
Automatic Verification of Real-Time Communicating Systems by Constraint-Solving
In this paper, an algebra of timed processes with real-valued clocks is presented, which serves as a formal description language for real-time communicating systems. We show that requirements such as “a proces...
-
Chapter
D-BMAP Models for Performance Evaluation of ATM Networks
The fixed cell size used in ATM networks naturally leads to the use of discrete-time models for performance evaluation. In this paper, we describe our work on estimating network performance based on Discrete-time...
-
Chapter
Wireless LAN Emulation over ATM Networks
In this paper, the main issues of wireless LAN Emulation over ATM networks are addressed and investigated. One of the most important issues is to support the transparent services for the mobile terminals. We s...
-
Chapter and Conference Paper
Uppaal in 1995
Uppaal is a tool suite for automatic verification of safety and bounded liveness properties of real-time systems modeled as networks of timed automata [12, 9, 4], developed during the past two year...
-
Chapter
Temperature Dependence of Photoluminescence in InGaAsP/InP Strained MQW Heterostructures
Multiple quantum well (MQW) InGaAsP/InP heterostructure systems have been drawn considerable research interest in recent years due to its suitability for long wavelength optoelectronic devices1. The performance o...