{"title":"Software for mathematical analysis [ video data compression ]","authors":"D.L. Hench","doi":"10.1109/WESCON.1994.403591","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403591","url":null,"abstract":"An important type of software package that belongs in the engineering workplace is a mathematical analysis package. Popular packages include MATLAB, Mathematics, Mathcad and Maple V. The various packages are compared and contrasted here with regard to the insight that they can provide for a topic of current interest. The selected topic is cosine-transform data-compression as specified in the MPEG standard for video data compression. This problem is first introduced and the outputs of the various packages are shown with an emphasis on the insight to the problem that can be gained by using an approach that is natural to the software package under consideration.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data compression in the V.42bis modems","authors":"A. Lettieri, K. Holtz, E. Holtz","doi":"10.1109/WESCON.1994.403565","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403565","url":null,"abstract":"A first international data compression standard became available when the CCITT adopted the V.42bis. standard in 1990. The standard is now used by more than 50 modem manufacturers and is rapidly,spreading into Local and Remote Area Networks (LANs, WANs). Follow-on standards now being developed (such as V.34 or V.fast) use the same data compression method in different communications protocols. British Telecom developed the V.42bis standard by combining a variety of inventions and ideas into a standard called BLTZ (British Telecom Lempel Ziv). Data compression is based on tree libraries invented by Holtz in 1974, which Welch modified in 1984 into the LZW codes. British Telecom added \"Delayed Innovation\" and a limited recycling library. A built-in microprocessor monitors the compression ratio, switching compression on or off using IBM's \"Escape Character\" sequences. The output codes are stuffed into 8 bit octets and combined into packets which include error checking codes. Defective packets are re-transmitted automatically, ensuring error free data transmission.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using reconfigurable FPGAs in test equipment applications","authors":"B. Fawcett","doi":"10.1109/WESCON.1994.403536","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403536","url":null,"abstract":"Since their introduction in 1985, Field Programmable Gate Array (FPGA) devices have been used in tens of thousands of designs. In most of these, logic implemented in an FPGA could have been implemented with more traditional logic devices-masked gate arrays, or MSI/SSI devices, for example. However, FPGAs were a better alternative for any number of reasons-no nonrecurring engineering costs, lower design risks, less power dissipation, faster design and production cycles, etc. In essence, FPGAs combine the high-integration benefits of gate arrays with the time-to-market benefits of a user-programmable device, and typically are selected over other logic technologies to gain these benefits.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133477391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous interconnect in the FLEX 8000 architecture","authors":"M. S. Won, C. Lytle","doi":"10.1109/WESCON.1994.403518","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403518","url":null,"abstract":"The two major foundations of a programmable logic architecture are basic building block and interconnect. The basic building block is responsible for the implementation of logic in the architecture, while the interconnect is responsible for the subtler but no less important aspects of timing, flexibility, and ability to place a design into the device. This paper discusses the features of the FLEX 8000 interconnect structure, the FastTrack, its major differences from previous other schemes, and its overall importance in the architecture of the FLEX 8000 family of devices - a set of high-density, dual-grained programmable logic devices that can be used to implement a wide variety of logical functions.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fibre Channel as a network backbone","authors":"W. Rickard","doi":"10.1109/WESCON.1994.403521","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403521","url":null,"abstract":"This paper presents a methodology for building a collapsed-backbone enterprise LAN based on the emerging ANSI X3T11 Fibre Channel Standard. This architecture facilitates design of a high-performance campus-area network featuring transparent support for legacy IEEE 802.x LANs, 802.1g MAC-layer remote bridging, and direct attachment of FC workstations, servers, and peripherals to the central fabric. The bridged network of LANs allows stations and servers attached to separate LANs to communicate over a Fibre Channel fabric transparently, as if they were attached to a single LAN. In addition, software applications residing on direct-attached Fibre Channel nodes will be interoperable with applications on the traditional LANs.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130306436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using copied software: your work product at risk","authors":"R. Kruger","doi":"10.1109/WESCON.1994.403606","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403606","url":null,"abstract":"The computer software industry is one of the greatest business success stories in recent history, representing one of the fastest growing segments of the U.S. Economy while also dominating world markets. In the United States alone, 35 percent of the software in use is obtained illegally, with losses estimated at $2.3 billion in 1993. Software piracy occurs in many different ways. Five of the most common forms are: hard-disk loading, end-user piracy, counterfeiting goods, software rentals, and bulletin board piracy. Many businesses and end-users do not realize the risks associated with using copied software. Not only is using copied software against the law, the work product and consequently, a company's competitive edge is at stake. The paper considers enforcement activities around the world.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dealing with chaos: neural nets and fuzzy logic-tools for building products in the information age","authors":"J. Huffman","doi":"10.1109/WESCON.1994.403576","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403576","url":null,"abstract":"The tools of neural networks, fuzzy logic, and the like are providing the first crude computational tools to deal with the nonlinear and complex nature of the world. A recent paper on neural nets talked about separating points in its dimensional space. The idea was incomprehensible to us only a few years ago and now such accomplishments are taken for granted. Chaos theory, antichaos, complexity and so on are fields that must deal with complexity to thrive. They promise to show us even better ways to understand and deal with our complex universe. It is proposed that these computational tools are at least the first crude attempts to allow us to better master our understanding of complexity.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125931831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-chip lossless data compression solutions","authors":"A. Makhani","doi":"10.1109/WESCON.1994.403563","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403563","url":null,"abstract":"Today's lossless data compression single chip solutions offer something for everybody. Architectural flexibility, algorithm performance, industry standards, price and future direction differentiate one solution from the other. These differences position one above the other in certain applications. This paper contrasts recently introduced lossless data compression products from Advanced Hardware Architectures with those of STAC and IBM. Device examples used for this paper are respectively: AHA3210, STAC9731 and ALDC1-5S.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object oriented approach to post-delivery syndrome","authors":"D. Dixit, V. Dixit","doi":"10.1109/WESCON.1994.403590","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403590","url":null,"abstract":"Traditionally, software is developed by using the waterfall model. It is also known as structured development. The decomposition in structured development is based on functions. The development phases, namely, analysis, design and implementation are sequential. Maintenance is not thought of until the software is delivered to the end user. It is a general scenario that by the time software is delivered the requirements have changed or the technology has advanced. The customer is in a fix; she cannot use it or throw it due to the investment made on it. This potential obsolescence and the need for immediate maintenance is called post-delivery syndrome. This report identifies the causes for post-delivery syndrome in the traditional method and then discusses how the impact of post-delivery syndrome is reduced in object-oriented development.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiments using higher order logic in developing DSN controller software","authors":"S. Ramanna","doi":"10.1109/WESCON.1994.403596","DOIUrl":"https://doi.org/10.1109/WESCON.1994.403596","url":null,"abstract":"This paper presents experiments using the higher order logic (HOL) proof system in developing microwave generic controller (UGC) software for the Deep Space Network. These experiments explore various forms of requirements for the Swi-Int (switch interlock) subject of the UGC software formally specified in a CSP-like real-time process algebra embedded in HOL by Peters (see IEEE Wescon/94, Anaheim, CA, September 27-29, 1994). The behavior of the Swi-Int manager is specified graphically in a knowledge graph and as a process algebra formula written in HOL. In an effort to avoid the possibility of livelock in the behavior of the manager, timing constraints are introduced into the design of the manager. As a result, the parallel behavior of the Swi-Int in Peters is refined to incorporate the refinement of the behavior of the manager.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}