R. Hess, T. Hutschenreuther, R. Lehmann, A. Schill
{"title":"Architecture and implementation for scalable transfer of live videos in multimedia applications","authors":"R. Hess, T. Hutschenreuther, R. Lehmann, A. Schill","doi":"10.1109/EURMIC.1996.546484","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546484","url":null,"abstract":"Todays networks are characterized by heterogeneous environments. Various transmission techniques coexist and offer different bandwidths at different costs. Because of videoconferences and similar applications becoming more and more important this paper presents the architecture of the video communication system \"XNetvideo\" which is scalable in terms of SNR (signal to noise ratio)-scaling, image size and frame rate. Xnetvideo is a tool for video transmission over IP-networks and especially ATM, that was developed at our Institute. The description of this architecture, and the discussion of implementation issues and performance results are the major topics of this contribution. Moreover a brief survey of existing tools and architectures in this area is given.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experience of adaptive replication in distributed file systems","authors":"Giacomo Cabri, Antonio Corradi, F. Zambonelli","doi":"10.1109/EURMIC.1996.546470","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546470","url":null,"abstract":"The paper focuses on distributed file systems and presents a system to transparently manage file replication through a network of workstations. The system integrates an adaptive file replication policy that is capable of reacting to changes in the patterns of access to the file system by dynamically creating or deleting replicas. The paper evaluates the efficiency of the system in several situations and shows its effectiveness.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel circuit extraction tool based on X-Spans and Y-Spans","authors":"J. Alcântara, C. E. T. Oliveira, M. L. Anido","doi":"10.1109/EURMIC.1996.546370","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546370","url":null,"abstract":"This paper presents a novel circuit extraction tool using a data structure based on maximally-horizontal layout regions termed X-spans and on contiguous vertical regions termed Y-spans. The paper also discusses the characteristics required by the extractor structure to properly support the required tasks such as the numeration of nodes and the extraction of transistors. Most of the primitive operations which are necessary to support a circuit extractor based on a layout representation using X and Y spans are presented and special attention is paid to the solution of the difficult problem of consolidating the node table.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preliminary analysis cycle for B-method software development","authors":"S. Taouil-Traverson, Sylvie Vignes","doi":"10.1109/EURMIC.1996.546397","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546397","url":null,"abstract":"The main benefit of using formal specifications early in the software life-cycle is to allow a priori errors detection. More precisely, incompleteness and inconsistency deficiencies can be detected very early and confidence resulting from correctness proofs increases. Thus, formal methods fit into the Verification and Validation activities, relieving but not replacing Software Testing. In the present state of the art, many tools and techniques for formal methods are fairly strong on formal aspects, but weak on methodological aspects. Likewise, there is a lack of support for the testing process. Within the framework of our case study we give guidelines to construct formal specifications, especially for B-method. In this paper we describe our method to develop a formal specification and show how the produced documents could be inputs to the testing process.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116902676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algorithm for scheduling prioritized tasks in a hard real-time environment","authors":"J. Etkin, J. Fridman","doi":"10.1109/EURMIC.1996.546367","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546367","url":null,"abstract":"This paper addresses the problem of dynamically scheduling a set of prioritized tasks in a Hard Real-Time environment. Since optimal solutions have exponential complexity in the general case, our solution relies on a heuristic search over a set of prioritized tasks. The most important aspect of the proposed algorithm is that it incorporates the priority ordering of the task set while exploring the search tree, Our main objective is to evaluate, through event-driven simulation, a scheme that integrates priority ordering in the search by considering the priority of a task at every level of the search tree. Results show that our approach provides the short and long term adaptability required in large dynamic systems, and overcomes some of the limitations of previously proposed solutions.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128867262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Separating application functionality from the user interface in a distributed environment","authors":"N. Dlodlo, C. Bamford","doi":"10.1109/EURMIC.1996.546389","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546389","url":null,"abstract":"This paper describes a project whose aim is to design a user interface management system (UIMS) to support a distributed environment. The goal requires an architecture that separates the application from the user interface. After defining the role played by UIMSs, Middleware and the Object Bequest Broker (ORE) in separating the application components from their supporting user interfaces in a distributed environment an architecture for a UIMS in a distributed environment is introduced. The architecture facilitates the separation of the application from the user interface by attaching abstract data types to both the user interface manager and the application. Operations on the abstract data types within the application trigger user interface activities, while those operations on abstract data types within the user interface manager trigger application activities.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel approaches to the segmentation of free-hand drawings","authors":"R. Canham, S. Smith, A. Tyrrell","doi":"10.1109/EURMIC.1996.546480","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546480","url":null,"abstract":"This paper describes the initial steps in the development of a parallel approach to the segmentation of free-hand drawings as part of a subject's neuropsychological assessment. The drawings to be segmented are responses to the widely used Rey-Osterrieth Complex Figure Test which comprises a number of simple geometric shapes such as rectangles and triangles with connecting lines. The need for a parallel approach in the segmentation of the drawings is discussed and a hierarchical solution proposed which reduces substantially the processing time required to perform the operation. Results are presented for a first approach to the segmentation and identification of substructures within the drawing based on a modified simple template matching algorithm. The results are promising but underline the complexity of segmenting such freehand line drawings.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast capability extension to a RISC architecture","authors":"K. Ghose, Pavel Vasek","doi":"10.1109/EURMIC.1996.546488","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546488","url":null,"abstract":"The concept of capability-based addressing originated in the 60's a means of promoting security and information sharing in computer systems; however, poor performance of early capability-based machines prevented it from becoming widespread. We describe a capability-based architecture implemented as a fairly straightforward extension of a conventional RISC architecture. Without compromising the security aspect, the capability mechanism was simplified to allow for an implementation that does not stretch the cycle time of the core architecture. Simulated executions of benchmark programs show that the performance penalty of using the capability mechanism is in the range of 16% to 19%, an acceptable price to pay for security. The proposed architecture can thus be a viable solution for meeting the increased demands for security as information sharing becomes pervasive.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133166396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Connection rerouting method for general application to connection-oriented mobile communication networks","authors":"Min-ho Song, Yanghee Choi, Chongsang Kim","doi":"10.1109/EURMIC.1996.546465","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546465","url":null,"abstract":"Various connection rerouting methods have been proposed for connection-oriented mobile networks. The previous methods, however, are limited to specific topologies or environments. In this paper, we propose a new connection rerouting method based on connection information. In the method when a connection is established between two mobile hosts, the connection information about the connection is provided to the mobile hosts through connection recording. When a mobile host has moved into a new area during a communication, it provides its connection information to its new mobile host agent, and then the mobile host agent selects the mobility-handling router closest to it among the ones included in the connection information for the rerouting point of the connection. This method requires neither a specific topology nor a complex connection, guarantees fast rerouting time, and provides very short reroute distance and acceptable route optimality. These features enable the method to be widely applicable to various connection-oriented mobile networks.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Causal modeling of a video-on-demand system using predicate/transition net formalism","authors":"T. Pyssysalo, L. Ojala","doi":"10.1109/EURMIC.1996.546490","DOIUrl":"https://doi.org/10.1109/EURMIC.1996.546490","url":null,"abstract":"We give a high-level net model for a specific video on demand system. This system has some very interesting modeling features: FIFO queues, the bunching property, parallel machine scheduling and a complicated resource allocation mechanism. The bunching property is the feasibility of several requests being served together by one resource. The resource allocation mechanism for this video on demand system has a special refusal by choice feature which means that the resource is not necessarily allocated even though it is available. The predicate/transition net formalism has been used in the modeling and reachability analysis in studying the properties of the model. The causal model developed here allows a natural extension for the use of time or stochastic net theoretical methods for performance analysis.","PeriodicalId":311520,"journal":{"name":"Proceedings of EUROMICRO 96. 22nd Euromicro Conference. Beyond 2000: Hardware and Software Design Strategies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}