{"title":"Parallel Viterbi decoding by breaking the compare-select feedback bottleneck","authors":"G. Fettweis, H. Meyr","doi":"10.1109/ICC.1988.13656","DOIUrl":"https://doi.org/10.1109/ICC.1988.13656","url":null,"abstract":"A solution is presented for implementing the add-compare-select (ACS) unit of a Viterbi decoder by parallel hardware for high data rates. For a fixed processing speed of the given hardware it allows a linear increase in throughput rate by a linear increase in hardware complexity. Thus arbitrary throughput rates can be achieved by linearly adding more parallel hardware elements. A systolic-array implementation of this parallel ACS unit of a Viterbi decoder is presented.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Update on software quality of IBM System/370 products: a case study","authors":"F.H. Skidmore","doi":"10.1109/ICC.1988.13681","DOIUrl":"https://doi.org/10.1109/ICC.1988.13681","url":null,"abstract":"The software quality goal at IBM, i.e., to produce zero-defect code, is discussed. An overview is presented of the software development process at IBM and how quality is viewed and measured. The five key elements that combine to achieve the quality target are phase management, defect removal/prevention, testing procedures, maintenance, and process management.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129902323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis for a message priority based polling scheme","authors":"I. Rubin, Z. Tsai","doi":"10.1109/ICC.1988.13646","DOIUrl":"https://doi.org/10.1109/ICC.1988.13646","url":null,"abstract":"The authors consider a multiaccess communication channel, such as a token-based ring or bus network. A message priority based polling procedure is used to control access of messages onto the channel. This procedure requires the server to have no advance information concerning the number of messages resident at a station prior to its visit to the station. Messages arriving at each station belong to one of two priority classes: class-1 (high priority) and class-2 (low priority). Class-1 messages are served under an exhaustive service discipline while class-2 messages are served under a limited service discipline. Class-1 messages have nonpreemptive or preemptive-resume priority over class-2 messages resident at the same station. Two different schemes, corresponding to the nonpreemptive and preemptive-resume priority disciplines, respectively, are analyzed. Tight upper and lower bounds for the mean message waiting times for each individual message class are obtained.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123745787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Project Glass-testing networked video tape rentals","authors":"G. Bradley","doi":"10.1109/ICC.1988.13685","DOIUrl":"https://doi.org/10.1109/ICC.1988.13685","url":null,"abstract":"The author details aspects of a trial which provides network delivery of video tape programming via a fiber-optic/coaxial-cable hybrid. Originating subscriber identification and tape selections are carried on the public switched telephone network. Subsequent information on the time usage and identification of any individual subscriber is obtained by polling via a bridged private line telephone pair. The trial technology is presently under test with a full service start-up target of July 1988. The author discusses unique subscriber features, out-direction video carriage, out-direction video control, the database and back-direction usage carriage.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127296360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the performance study of several access control strategies in ISDN","authors":"X. Wang, S.C. Chang","doi":"10.1109/ICC.1988.13695","DOIUrl":"https://doi.org/10.1109/ICC.1988.13695","url":null,"abstract":"Several access control strategies are studied for handling a mixture of wideband and narrowband traffic over a common time-division-multiplexing communication link. The access control schemes are two-side moving-boundary strategies with blockable and queuable policies for wideband and narrowband messages. These strategies can provide some useful insight for the future broadband ISDN user access developments.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of expert systems to network control","authors":"E. Zakrzewski, Robert J Quillin","doi":"10.1109/ICC.1988.13842","DOIUrl":"https://doi.org/10.1109/ICC.1988.13842","url":null,"abstract":"Applications of expert systems within the design, testing, and operation of communication networks are discussed. The amenability of expert systems to support network monitoring, fault isolation, and system adaptation in degraded modes of operation is evaluated. Specific problems encountered in making network-wide control decisions, with only local or sector system status information that may be corrupted (including knowledge distorted by the presence of ambiguity, uncertainty, and incorrect or conflicting situation data) are presented. Examples of the design and operation of communication networks that use expert systems to support the network control function are discussed in case studies of three expert system projects under development and testing: EXACT (expert-system autonomous-control testbed), COMDAT (communications decision-aid tests), and FIESTA (fault-isolation expert system for TDRSS applications).<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concept prototyping a real time switch maintenance expert system","authors":"J. Fox, G.M. Slawsky","doi":"10.1109/ICC.1988.13791","DOIUrl":"https://doi.org/10.1109/ICC.1988.13791","url":null,"abstract":"The Bell Communications Research real-time expert-system (Bellcore-RTES) is a concept prototype expert system which monitors the output messages of digital switches, analyzes these messages, and recommends service protective and corrective actions to operations personnel. The processing information incorporates heuristics from operations personnel having extensive experience in troubleshooting problems associated with the digital switch selected for the Bellcore-RTES as source material for developing functional systems requirements. This project uses the combined efforts of systems engineers and knowledge engineers to: efficiently acquire troubleshooting data, laboratory test implementation scenarios, and efficiently transfer the expert knowledge as it exists in the concept prototype to a functional requirements format.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A random access algorithm for capture environments","authors":"D. Lyons, P. Papantoni-Kazakos","doi":"10.1109/ICC.1988.13556","DOIUrl":"https://doi.org/10.1109/ICC.1988.13556","url":null,"abstract":"The authors consider packet radio environments with capture, such that, given simultaneous transmission of k packets, a single packet is captured with probability pq/sup k-1/, where 1/3<p<or=1 and O<or=p<1. They assume ternary feedback broadcast per slot, and in the presence of capture, identification of the captured packet by all the users in the system. They also assume that a successfully received single transmission can not be distinguished from a capture in the presence of multiple transmissions. For the above environment, in conjunction with errorless feedback channel and absence of propagation delays in the feedback, the authors propose and analyze a simple full-feedback-sensing-window random-access algorithm. They compare the performance of their algorithm with an appropriate modification of the Capetanakis dynamic algorithm. The proposed algorithm demonstrates superior delay and throughput performance.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error rate considerations for 256-QAM systems in presence of adjacent channel interference","authors":"P. Mathiopoulos, K. Feher","doi":"10.1109/ICC.1988.13719","DOIUrl":"https://doi.org/10.1109/ICC.1988.13719","url":null,"abstract":"Performance degradation of 256-QAM systems in the presence of adjacent channel interference and thermal noise is studied. The authors consider two adjacent interferers of the same modulation format as the useful signal, placed symmetrically around it. The results are presented as equivalent carrier-to-noise (C/N) degradation for different channel spacings and carrier-to-interference (C/I) ratios. To allow easy comparison with 64-QAM systems, the authors present the degradation of these systems for the same values as those of the 256-QAM schemes. It is found that for C/I=0 dB and for a 256-QAM system using raised-cosine filters with alpha =0.5","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Nishisno, S. Abe, K. Ogasawara, K. Murano, K. Yamaguchi
{"title":"Broadband switching system configuration and access protocol","authors":"T. Nishisno, S. Abe, K. Ogasawara, K. Murano, K. Yamaguchi","doi":"10.1109/ICC.1988.13694","DOIUrl":"https://doi.org/10.1109/ICC.1988.13694","url":null,"abstract":"The authors analyze the service conditions that will be required for broadband ISDN (B-ISDN). They also study how to interconnect the B-ISDN with existing networks in the early stages. They examine a hybrid switching architecture using both asynchronous and high-speed synchronous transfer modes and an access protocol that meets the requirements.<<ETX>>","PeriodicalId":191242,"journal":{"name":"IEEE International Conference on Communications, - Spanning the Universe.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}