Skip to main content

previous disabled Page of 700
and
  1. No Access

    Chapter and Conference Paper

    Design of two-dimensional FIR digital filters by using the singular-value decomposition

    The SVD has been applied in conjunction with 1-D FIR-filter techniques for the design of 2-D quadrantally-symmetric FIR filters. It has been shown that three related realizations are possible and in each case,...

    Wu-Sheng Lu, Hui-** Wang, Andreas Antoniou in Advances in Communications and Signal Proc… (1989)

  2. No Access

    Chapter and Conference Paper

    MPS-an experimental multi-microprocessor based parallel system

    This paper introduces an experimental tightly-coupled multi-microprocessor system (MPS) for parallel processing. An overview of hardware architecture is given and a simple example of algorithm run on MPS is us...

    Gu Qing Zuo, An Zhong Wang in CONPAR 90 — VAPP IV (1990)

  3. No Access

    Chapter

    The Application of the Partition Function in “Revenue-Oriented” Performance Analysis for Network Management

    In a circuit-switched network, an accepted call blocks other connection requests. How could one quantify this interference? How do the routes used affect the performance of the network? How much should one “ch...

    Wei-hsing Wang, Eugene Pinsky in Network Management and Control (1990)

  4. Chapter and Conference Paper

    Linear Complexity Profiles and Continued Fractions

    The linear complexity, \( \mathcal{L} \) (sn), of a sequence sn is defined as the length of the shortest linear feedba...

    Muzhong Wang in Advances in Cryptology — EUROCRYPT ’89 (1990)

  5. No Access

    Chapter and Conference Paper

    Specifying Processes in Terms of Their Environments

    A simple approach to specification and verification of processes is suggested. Instead of process equivalence as usual in process algebra, the correctness of an implementation w.r.t a specification is determined ...

    Wang Yi in Specification and Verification of Concurrent Systems (1990)

  6. No Access

    Chapter and Conference Paper

    Prelude: A system for portable parallel software

    William Weihl, Eric Brewer, Adrian Colbrook in PARLE '92 Parallel Architectures and Langu… (1992)

  7. No Access

    Chapter and Conference Paper

    Choice coordination with multiple alternatives (preliminary version)

    The Choice Coordination Problem with k alternatives (k-CCP) was introduced by Rabin in 1982 [Rab82]. The goal is to design a wait-free protocol for n asynchronous processes which causes all correct processes to a...

    David S. Greenberg, Gadi Taubenfeld, Da-Wei Wang in Distributed Algorithms (1992)

  8. Chapter and Conference Paper

    The development and testing of the identity-based conference key distribution system for the RHODOS distributed system

    In this paper, we demonstrate that it is possible to develop an authentication service as an integral part of a distributed operating system, subject to some requirements and extensions to the original Koyama-...

    Michael Wang, Andrzej Goscinski in Computer Security — ESORICS 92 (1992)

  9. No Access

    Chapter and Conference Paper

    Optimal map**s of m dimensional FFT communication to k dimensional mesh for arbitrary m and k

    The FFT communication patterns are important to not only FFT algorithms, but also many other algorithms over one or higher dimensional. The map** of m dimensional FFT communication to k dimensional mesh has pre...

    Z. George Mou, **ao**g Wang in PARLE '93 Parallel Architectures and Languages Europe (1993)

  10. No Access

    Chapter and Conference Paper

    A unified framework for multicast forwarding

    This paper examines the issues of implementation and integration in multicast. A framework for multicast forwarding is presented, which separates multicast forwarding from any associated protocols that may aff...

    Zheng Wang, Jon Crowcroft in Network and Operating System Support for D… (1994)

  11. No Access

    Chapter

    Fault Diagnosis of Network Connectivity Problems by Probabilistic Reasoning

    In this paper, we propose a framework for identifying most probable faulty network components from a set of generic alarms in a heterogeneous environment. A designated network entity with management responsibi...

    Clark Wang, Mischa Schwartz in Network Management and Control (1994)

  12. Chapter and Conference Paper

    On the Matsumoto and Imai’s Human Identification Scheme

    At Eurocrypt'91, Matsumoto and Imai presented a human identification scheme for insecure channels, which is suitable for human ability of memorizing and processing a short secret. It prevents an in- truder fro...

    Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai in Advances in Cryptology — EUROCRYPT ’95 (1995)

  13. Chapter

    An Approach to TTCN-Based Test Execution

    Test execution plays an important role in the protocol conformance testing system. We can classify existing test execution methods into two types: Compiling-based Test Execution and Interpreting-based Test Exe...

    Yamin Wang, Jian** Wu, Ruibing Hao in Protocol Test Systems (1995)

  14. No Access

    Chapter

    Interference Suppression for CDMA Overlays of Narrowband Waveforms

    An overview of the performance of CDMA networks which overlay narrowband signals in order to increase spectral efficiency is presented. Such systems employ interference suppression filters in the CDMA receiver...

    Laurence B. Milstein, Jiangzhou Wang in Code Division Multiple Access Communications (1995)

  15. Chapter

    Protocol Validation Tools as Test Case Generators

    A method is proposed to transform a test case generation problem to a protocol validation problem. Protocol validation has been studied for years and many validation tools are available. By transforming a test...

    Chang-Jia Wang, Liang-Seng Koh, Ming T. Liu in Protocol Test Systems (1995)

  16. Chapter

    Wireless LAN Emulation over ATM Networks

    In this paper, the main issues of wireless LAN Emulation over ATM networks are addressed and investigated. One of the most important issues is to support the transparent services for the mobile terminals. We s...

    Nen-Fu Huang, Yao-Tzung Wang in High Performance Networking (1995)

  17. Chapter

    D-BMAP Models for Performance Evaluation of ATM Networks

    The fixed cell size used in ATM networks naturally leads to the use of discrete-time models for performance evaluation. In this paper, we describe our work on estimating network performance based on Discrete-time...

    John A. Silvester, Nelson L. S. Fonseca in Performance Modelling and Evaluation of AT… (1995)

  18. Chapter

    Automatic Verification of Real-Time Communicating Systems by Constraint-Solving

    In this paper, an algebra of timed processes with real-valued clocks is presented, which serves as a formal description language for real-time communicating systems. We show that requirements such as “a proces...

    Wang Yi, Paul Pettersson, Mats Daniels in Formal Description Techniques VII (1995)

  19. No Access

    Chapter and Conference Paper

    A group-oriented (t, n) undeniable signature scheme without trusted center

    We shall propose a new group-oriented undeniable signature scheme without the assistance of any trusted center in this paper. A single group public key, instead of all public keys of individual members, is use...

    Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang in Information Security and Privacy (1996)

  20. No Access

    Chapter

    Temperature Dependence of Photoluminescence in InGaAsP/InP Strained MQW Heterostructures

    Multiple quantum well (MQW) InGaAsP/InP heterostructure systems have been drawn considerable research interest in recent years due to its suitability for long wavelength optoelectronic devices1. The performance o...

    O. Y. Raisky, W. B. Wang, R. R. Alfano in Hot Carriers in Semiconductors (1996)

previous disabled Page of 700