ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (3,151)
  • Other Sources
  • Springer  (3,151)
  • National Academy of Sciences
  • 2020-2024
  • 1995-1999  (3,151)
  • 1998  (3,151)
  • Computer Science  (3,151)
Collection
  • Articles  (3,151)
  • Other Sources
Years
  • 2020-2024
  • 1995-1999  (3,151)
Year
Journal
  • 1
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 17-33 
    ISSN: 1436-4646
    Keywords: Dual simplex method ; Maximum flow ; Strongly polynomial ; Preflow algorithm ; Valid distance labels
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract This paper presents dual network simplex algorithms that require at most 2nm pivots and O(n 2 m) time for solving a maximum flow problem on a network ofn nodes andm arcs. Refined implementations of these algorithms and a related simplex variant that is not strictly speaking a dual simplex algorithm are shown to have a complexity of O(n 3). The algorithms are based on the concept of apreflow and depend upon the use of node labels that are underestimates of the distances from the nodes to the sink node in the extended residual graph associated with the current flow. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 35-61 
    ISSN: 1436-4646
    Keywords: Graph partitioning ; Linear programming ; Bundle method ; Parallel optimization
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract This paper describes heuristics for partitioning a generalM × N matrix into arrowhead form. Such heuristics are useful for decomposing large, constrained, optimization problems into forms that are amenable to parallel processing. The heuristics presented can be easily implemented using publicly available graph partitioning algorithms. The application of such techniques for solving large linear programs is described. Extensive computational results on the effectiveness of our partitioning procedures and their usefulness for parallel optimization are presented. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 129-160 
    ISSN: 1436-4646
    Keywords: Semidefinite programming ; Infeasible-interior-point method ; Predictor—correctormethod ; Superlinear convergence ; Primal—dual nondegeneracy
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract An example of an SDP (semidefinite program) exhibits a substantial difficulty in proving the superlinear convergence of a direct extension of the Mizuno—Todd—Ye type predictor—corrector primal-dual interior-point method for LPs (linear programs) to SDPs, and suggests that we need to force the generated sequence to converge to a solution tangentially to the central path (or trajectory). A Mizuno—Todd—Ye type predictor—corrector infeasible-interior-point algorithm incorporating this additional restriction for monotone SDLCPs (semidefinite linear complementarity problems) enjoys superlinear convergence under strict complementarity and nondegeneracy conditions. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 161-169 
    ISSN: 1436-4646
    Keywords: Variational inequalities ; Complementarity problems ; Walrasian equilibrium ; Computational general equilibrium
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract This paper explains a method by which the number of variables in a variational inequality having a certain form can be substantially reduced by changing the set over which the variational inequality is posed. The method applies in particular to certain economic equilibrium problems occurring in applications. We explain and justify the method, and give examples of its application, including a numerical example in which the solution time for the reduced problem was approximately 2% of that for the problem in its original form. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 81 (1998), S. 201-214 
    ISSN: 1436-4646
    Keywords: Integer programming ; Cutting planes ; Cover inequalities ; Lifting ; Gomory mixed integer cuts ; Cut-and-branch
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract We investigate the use of cutting planes for integer programs with general integer variables. We show how cutting planes arising from knapsack inequalities can be generated and lifted as in the case of 0–1 variables. We also explore the use of Gomory's mixed-integer cuts. We address both theoretical and computational issues and show how to embed these cutting planes in a branch-and-bound framework. We compare results obtained by using our cut generation routines in two existing systems with a commercially available branch-and-bound code on a range of test problems arising from practical applications. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 81 (1998), S. 229-256 
    ISSN: 1436-4646
    Keywords: Branch-and-cut algorithm ; Clustering ; Compiler design ; Equipartitioning ; Finite element method ; Graph partitioning ; Layout of electronic circuits ; Separation heuristics
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract In this paper we consider the problem ofk-partitioning the nodes of a graph with capacity restrictions on the sum of the node weights in each subset of the partition, and the objective of minimizing the sum of the costs of the edges between the subsets of the partition. Based on a study of valid inequalities, we present a variety of separation heuristics for cycle, cycle with ears, knapsack tree and path-block cycle inequalities among others. The separation heuristics, plus primal heuristics, have been implemented in a branch-and-cut routine using a formulation including variables for the edges with nonzero costs and node partition variables. Results are presented for three classes of problems: equipartitioning problems arising in finite element methods and partitioning problems associated with electronic circuit layout and compiler design. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 81 (1998), S. 327-347 
    ISSN: 1436-4646
    Keywords: Convex composite function ; Second-order global optimality ; Second-order duality ; Variational inequality
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract In recent years second-order sufficient conditions of an isolated local minimizer for convex composite optimization problems have been established. In this paper, second-order optimality conditions are obtained of aglobal minimizer for convex composite problems with a non-finite valued convex function and a twice strictly differentiable function by introducing a generalized representation condition. This result is applied to a minimization problem with a closed convex set constraint which is shown to satisfy the basic constraint qualification. In particular, second-order necessary and sufficient conditions of a solution for a variational inequality problem with convex composite inequality constraints are obtained. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 1-1 
    ISSN: 1436-4646
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 3-12 
    ISSN: 1436-4646
    Keywords: Symmetric submodular function minimization ; Submodular function minimization ; Symmetric submodular functions ; Submodular functions ; Submodular systems
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract We describe a purely combinatorial algorithm which, given a submodular set functionf on a finite setV, finds a nontrivial subsetA ofV minimizingf[A] + f[V ∖ A]. This algorithm, an extension of the Nagamochi—Ibaraki minimum cut algorithm as simplified by Stoer and Wagner [M. Stoer, F. Wagner, A simple min cut algorithm, Proceedings of the European Symposium on Algorithms ESA '94, LNCS 855, Springer, Berlin, 1994, pp. 141–147] and by Frank [A. Frank, On the edge-connectivity algorithm of Nagamochi and Ibaraki, Laboratoire Artémis, IMAG, Université J. Fourier, Grenbole, 1994], minimizes any symmetric submodular function using O(|V|3) calls to a function value oracle. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 41-81 
    ISSN: 1436-4646
    Keywords: Random sampling ; Greedy algorithm ; Matroid basis ; Matroid partitioning
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract Random sampling is a powerful tool for gathering information about a group by considering only a small part of it. We discuss some broadly applicable paradigms for using random sampling in combinatorial optimization, and demonstrate the effectiveness of these paradigms for two optimization problems on matroids: finding an optimum matroid basis and packing disjoint matroid bases. Application of these ideas to the graphic matroid led to fast algorithms for minimum spanning trees and minimum cuts. An optimum matroid basis is typically found by agreedy algorithm that grows an independent set into an optimum basis one element at a time. This continuous change in the independent set can make it hard to perform the independence tests needed by the greedy algorithm. We simplify matters by using sampling to reduce the problem of finding an optimum matroid basis to the problem of verifying that a givenfixed basis is optimum, showing that the two problems can be solved in roughly the same time. Another application of sampling is to packing matroid bases, also known as matroid partitioning. Sampling reduces the number of bases that must be packed. We combine sampling with a greedy packing strategy that reduces the size of the matroid. Together, these techniques give accelerated packing algorithms. We give particular attention to the problem of packing spanning trees in graphs, which has applications in network reliability analysis. Our results can be seen as generalizing certain results from random graph theory. The techniques have also been effective for other packing problems. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    ISSN: 1436-4646
    Keywords: Quadratic assignment ; Special cases ; Polynomially solvable ; Anti-Monge matrices ; Toeplitz matrices
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract This paper investigates a restricted version of the Quadratic Assignment Problem (QAP), where one of the coefficient matrices is an Anti-Monge matrix with non-decreasing rows and columns and the other coefficient matrix is a symmetric Toeplitz matrix. This restricted version is called the Anti-Monge—Toeplitz QAP. There are three well-known combinatorial problems that can be modeled via the Anti-Monge—Toeplitz QAP: (Pl) The “Turbine Problem”, i.e. the assignment of given masses to the vertices of a regular polygon such that the distance of the center of gravity of the resulting system to the center of the polygon is minimized. (P2) The Traveling Salesman Problem on symmetric Monge distance matrices. (P3) The arrangement of data records with given access probabilities in a linear storage medium in order to minimize the average access time. We identify conditions on the Toeplitz matrixB that lead to a simple solution for the Anti-Monge—Toeplitz QAP: The optimal permutation can be given in advance without regarding the numerical values of the data. The resulting theorems generalize and unify several known results on problems (P1), (P2), and (P3). We also show that the Turbine Problem is NP-hard and consequently, that the Anti-Monge—Toeplitz QAP is NP-hard in general. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 125-125 
    ISSN: 1436-4646
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 91-123 
    ISSN: 1436-4646
    Keywords: Complexity of linear programming ; Interior point methods ; Conditioning ; Error analysis
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract In this paper we study the complexity of solving linear programs in finite precision arithmetic. This is the normal setup in scientific computation, as digital computers work in finite precision. We analyze two aspects of the complexity: one is the number of arithmetic operations required to solve the problem approximately, and the other is the working precision required to carry out some critical computations safely. We show how the “conditioning” of the problem instance affects the working precision required and the computational requirements of a classical logarithmic barrier algorithm to approximate the optimal value of the problem within a given tolerance. Our results show that these complexity measures depend linearly on the logarithm of a certain condition measure. We carry out the analysis by looking at how well Newton's Method can follow the central trajectory of the feasible set, and computing error bounds in terms of the condition measure. These results can be interpreted as a theoretical indication of “good” numerical behavior of the logarithmic barrier method, in the sense that a problem instance “twice as hard” as the other from the numerical point of view, requires only at most twice as much precision to be solved. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 213-237 
    ISSN: 1436-4646
    Keywords: Maximum satisfiability ; Horn clauses ; Directed hypergraphs ; Minimum cut ; Generalized set covering
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract In this paper we consider the Maximum Horn Satisfiability problem, which is reduced to the problem of finding a minimum cardinality cut on a directed hypergraph. For the latter problem, we propose different IP formulations, related to three different definitions of hyperpath weight. We investigate the properties of their linear relaxations, showing that they define a hierarchy. The weakest relaxation is shown to be equivalent to the relaxation of a well known IP formulation of Max Horn SAT, and to a max-flow problem on hypergraphs. The tightest relaxation, which is a disjunctive programming problem, is shown to have integer optimum. The intermediate relaxation consists in a set covering problem with a possible exponential number of constraints. This latter relaxation provides an approximation of the convex hull of the integer solutions which, as proven by the experimental results given, is much tighter than the one known in the literature. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 21-28 
    ISSN: 1435-5655
    Keywords: Ecology ; Organisational design ; Production ; Quality of work
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Produktion 2000 is a German federal framework programme which supports the development of technology, organisation and qualification for production in industry. The Programme was launched in 1995 in view of the urgent need for improvement felt by industry itself after a very careful analysis and definition phase. The Programme is managed by a special Agency on behalf of the Federal Ministry. Their staff offers support in defining, implementing, running and controlling collaborative industry-driven projects and by awarding financial grants to the project partners. Strategic projects and first results are reported.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 48-54 
    ISSN: 1435-5655
    Keywords: Clean technology ; Environmental protection ; Sustainable development ; Industrial production
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Environmental protection activities in industry have rapidly increased in number over the last years. Additionally, surveys of environmental activities have identified a change in the kind or in the approaches used to environmental problem solving. A new paradigm ‘Clean Technology’ has been developed which gradually seems to replace the ‘Clean-up Technology’ paradigm and the older ‘Dilute and Disperse’ paradigm. The new ‘Clean Technology’ paradigm brings with it not only a new way of looking at environmental protection, but also a range of ‘rules’ guiding the application of technology and the design of technological systems. This paper presents a few case studies highlighting and evaluating Clean Technology activities.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 38-47 
    ISSN: 1435-5655
    Keywords: Computer Supported Cooperative Work (CSCW) ; Groupware ; Workflow management technology ; Business process re-engineering (BPR) ; Human centred computer integrated manufacturing (HC-CIM) ; Concurrent engineering ; Production planning and control (PPC)
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Computer Integrated Manufacturing (CIM) is faced with issues which are crucial to Computer Supported Cooperative Work (CSCW). However, despite the large amount of work on Enterprise Integration and its obvious links to the CSCW field, this domain is almost totally absent in the work of the CSCW community. Therefore, this paper is intended to contribute to the discussion on the relevance of CSCW in manufacturing and to combine new concepts for cooperative work with requirements for information system design in production. Production related models, e.g., an order-driven mode of coordination, can be augmented with mechanisms of interaction for coordination, collaboration and co-decision and the design of customer/supplier chains. It is suggested, as one example, to use workflow management technology in advanced manufacturing for shop-floor production planning and control (PPC). The proposed enterprise model and support technology is especially useful for small-batch production.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 71-77 
    ISSN: 1435-5655
    Keywords: Human-centred design ; Learning systems ; Real-time tasks ; Simulators ; Variability
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Uses of stored skill-models to accelerate simulator-based real-time training in a control skill are discussed. A real-time coach must deliver advice at three levels: (1) what to do next, (2) what to watch for, and (3) what went wrong. Human learning and machine learning results are presented using different screen representations of a pole-and-cart balancing task.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 97-104 
    ISSN: 1435-5655
    Keywords: Discontinuous control ; Human-computer interface ; Fault dectection ; Linguistic support ; Logical control ; Magic manipulation ; Man-machine interface ; Password ; Robot control
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Human-computer interaction today has got a touch of magic: Without understanding the causal coherence, using a computer seems to become the art to use the right spell with the mouse as the magic wand — the sorcerer's staff. Goethes's poem admits an allegoric interpretation. We explicate the analogy between using a computer and casting a spell with emphasis on teaching magic skills. The art to create an ergonomic user interface has to take care of various levels of skills for the human operators. The problem of logical discontinuities as opposed to continuous control is the most serious obstacle for human-computer interaction.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 105-108 
    ISSN: 1435-5655
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 134-154 
    ISSN: 1435-5655
    Keywords: Learning ; Tradition based learning ; Bureaucratic learning ; Transformative learning ; Creativity ; Environment ; Organisational development
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract For a variety of reasons, learning should be studied as a cultural phenomenon. The task of the first part of this article is to clear up the terminological questions about various ideal types of learning cultures, and how ideal type analysis may be used to study value and knowledge transfer and knowledge acquirement in various types of organisations. The important task of the second part is to analyse how implementation of environmental management systems, like BS-7750, contribute to a certain learning practice. Moreover the task is to evaluate and discuss supplementing or alternative modes of learning to just formalisation of knowledge transfer.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 155-184 
    ISSN: 1435-5655
    Keywords: Cultural metaphors ; Culture and change ; Diagnosing culture ; Dynamics of culture ; Emic and etic ; National culture ; Organisational culture
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The interface between cultural anthropology, cross-cultural psychology, cultural psychology and indigenous psychology provides a rich context for examining recent developments within the field of organisational culture, both from a societal (national) and a cross-cultural perspective. It is argued in this paper that cultural patterns in society impact deeply on cultural patterns in organisations. In other words, organisational culture reflects the way in which the societal context shapes the organisational context, which in turn moulds the beliefs, attitudes and behaviour of its members — individuals and groups. It is further posited that organisational cultural and societal culture recursively mirror one another. The complexity of the interdependence between societal culture and organisational culture will be traced, drawing on the evolving nature of the construct culture within the traditions of anthropology, cross-cultural psychology, indigenous psychology and organisational psychology. The hidden source of cultural elements embedded in the organisational domain will be examined from the perspective of an appreciation of diversity and a recognition of the need to support and encourage the variations that add to our creativity as well astosystem/organisational effectiveness.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 231-238 
    ISSN: 1435-5655
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    ISSN: 1435-5655
    Keywords: Education ; Human-centred systems ; Learning System ; Participation ; Post-industrial society ; Public and private sector
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Japan's educational system has some major problems. The most important among these concerns is the basic concept of the educational process and the goal of education. The old concept of public educational systems has become outdated in today's Japanese society, although this concept had supported social and spiritual faith, ‘economic success’ and ‘selfless devotion to one's country’ for more than 100 years. Now, Japanese people need a new concept of the educational process and the goal of education for the twenty-first century. The paper proposes a value chain of educational and learning systems aimed at building a network consisting of multiple fields for fostering future human resources.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 296-303 
    ISSN: 1435-5655
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 304-314 
    ISSN: 1435-5655
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 322-327 
    ISSN: 1435-5655
    Keywords: Communicative positioning ; Intentionality ; Information visuality ; Textual perception ; Textual resolution enhancement
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The present paper is meant to summarise and enlighten the theoretical implications of the twin theories of text comprehension and of text compression. Compatibility and non-exclusiveness of particle-like analysis of language and wave-like analysis of intentionality are also demonstrated within the newly established quantum linguistics framework. The informative state of language is viewed as being relatively stable; once activated and subject to motion, therefore reaching a communicative state, different phenomena occur, which may be observed, analysed and visualised through CPP-TRS observational devices. Relativity theory may therefore be organised in terms of quanta with continuity and no contradiction.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Electronic Resource
    Electronic Resource
    Springer
    AI & society 12 (1998), S. 315-321 
    ISSN: 1435-5655
    Keywords: Intelligence ; Loebner competition ; Turing test
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The Turing Test (TT) is criticised for various reasons, one being that it is limited to testing only human-like intelligence. We can read, for example, that ‘TT is testing humanity, not intelligence,’ (Fostel, 1993), that TT is ‘a test for human intelligence, not intelligence in general,’ (French, 1990), or that a perspective assumed by TT is parochial, arrogant and, generally, ‘massively anthropocentric’ (Hayes and Ford, 1996). This limitation presumably causes a basic inadequacy of TT, namely that it misses a wide range of intelligence by focusing on one possibility only, namely on human intelligence. The spirit of TT enforces making explanations of possible machine intelligence in terms of what is known about intelligence in humans, thus possible specificity of the computer intelligence is ruled out from the oælset. This approach causes ire in some interpreters of the test and leads them to desire to create a theory of intelligence in general, thereby overcoming the limitations imposed by merely human intelligence. At times it is an emotion-laden discussion that does not hesitate to impute chauvinism in those limiting themselves to human-type intelligence.1 This discussion is, by the way, not unlike the rhetoric used by some defenders of animal rights, who insist that an expression of superiority of men over animals is a token of speciesism, and ‘speciesism is just a moral mistake of the same sort as racism and sexism’.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Electronic Resource
    Electronic Resource
    Springer
    Engineering with computers 14 (1998), S. 14-22 
    ISSN: 1435-5663
    Keywords: NC machining ; Offset surfaces ; Self-intersections ; Trimmed offset
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Notes: Abstract The paper investigates self-intersections of offsets of implicit quadratic surfaces. The quadratic surfaces are the simplest curved objects, referred to as quadrics, and are widely used in mechanical design. In an earlier paper, we have investigated the self-intersections of offsets of explicit quadratic surfaces, such as elliptic paraboloid, hyperbolic paraboloid and parabolic cylinder, since not only are they used in mechanical design, but also any regular surface can be locally approximated by such explicit quadratic surfaces. In this paper, we investigate the rest of the quadrics whose offsets may degenerate, i.e. the implicit quadratic-surfaces (ellipsoid, hyperboloid, elliptic cone, elliptic cylinder and hyperbolic cylinder). We found that self-intersection curves of offsets of all the implicit quadratic surfaces are planar implicit conics and their corresponding curve on the progenitor surface can be expressed as the intersection curve between an ellipsoid, whose semi-axes are proportional to the offset distance, and the implicit quadratic surfaces themselves.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Electronic Resource
    Electronic Resource
    Springer
    Engineering with computers 14 (1998), S. 36-47 
    ISSN: 1435-5663
    Keywords: Discretised surfaces ; Intersections ; Mesh generation ; Solid objects ; Topology
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Notes: Abstract Triangulation of complex three-dimensional objects is a time-consuming process, and the boundary surfaces of the object have to be checked very carefully to ensure no crror is made. With the increased use of computer graphics in the generation of complicated object shapes, such as aircraft, space vessels, machine parts, physical models, etc., visual inspection alone is not good enough to affirm the validity of the object, and a thorough verification of the output from a CAD system is necessary to ensure that the object is well defined and complies with the input requirements of the mesh generator. This paper describes such a data verification procedure for general curved surfaces and objects defined by the boundary surface modelling technique. The quality of individual elements, the overall topological structures, and geometrical correctness in terms of intersections, close touches and sharp angles will all be studied and verified. Several engineering objects are analysed to illustrate the practical applications of the procedure.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Electronic Resource
    Electronic Resource
    Springer
    Engineering with computers 14 (1998), S. 59-72 
    ISSN: 1435-5663
    Keywords: Distributed computing ; Finite element analysis ; Object-oriented analysis/design ; Parallel processing
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Notes: Abstract An object-oriented parallel finite element framework has been developed to facilitate rapid prototyping of a wide variety of parallel finite element computations. Parallel computing and object-oriented technologies are integrated to achieve efficiency in both computation and software development. The paper presents various reusable and extensible components that constitute the parallel finite element architecture.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Electronic Resource
    Electronic Resource
    Springer
    Engineering with computers 14 (1998), S. 73-80 
    ISSN: 1435-5663
    Keywords: Critical point ; Data interpolation ; Finite element method ; Irregular volume ; Scientific visualisation ; Spatial point location ; Volume visualisation
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Notes: Abstract Two techniques are presented for specifying seed points, which are the starting points for streamlines, in an irregular volume. One is an interactive seed specification technique, in which efficient data probing is achieved by traversing the adjacency graph of the volume. The other is an automatic seed specification technique. A seed point is placed near a critical point, where the velocity vector is zero. Efficient algorithms are given for finding and classifying the critical point by using a tetrahedral cell. A successful application of these techniques to a problem in a clean room is also described.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Electronic Resource
    Electronic Resource
    Springer
    Engineering with computers 14 (1998), S. 81-92 
    ISSN: 1435-5663
    Keywords: Mechanical analysis ; Design process ; Geometric modelling ; Multi-representations ; Integration ; Object-oriented approach
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics , Technology
    Notes: Abstract Here we present the high-level operators of the Mechanical Analysis Module, which is a software architecture dedicated to a better integration of the structural analysis phase within an integrated Computer-Aided Design environment. This generic module is independent of the mechanical analysis method used, and takes place in a distributed software architecture of an integrated design environment. The paper shows that the mechanical operators defined are split among geometric and mechanical treatments in order to enforce this distributed architecture. Thus, the interface between the geometric treatments and the mechanical analysis environment shows the adequacy of the boolean operators when used with mechanical analysis treatments. However, this is demonstrated for a restricted domain of the mechanical analysis, and open ended questions still exist as to when the geometry of the models is diversified. Also, requirements for new geometric treatments and extensions of the current geometric representation are listed.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 253-264 
    ISSN: 1436-4646
    Keywords: Independence number of a graph ; Semi-definite programming ; Approximation algorithms
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract We describe an approximation algorithm for the independence number of a graph. If a graph onn vertices has an independence numbern/k + m for some fixed integerk ⩾ 3 and somem 〉 0, the algorithm finds, in random polynomial time, an independent set of size $$\tilde \Omega (m^{{3 \mathord{\left/ {\vphantom {3 {(k + 1)}}} \right. \kern-\nulldelimiterspace} {(k + 1)}}} )$$ , improving the best known previous algorithm of Boppana and Halldorsson that finds an independent set of size Ω(m 1/(k−1)) in such a graph. The algorithm is based on semi-definite programming, some properties of the Lovászϑ-function of a graph and the recent algorithm of Karger, Motwani and Sudan for approximating the chromatic number of a graph. If theϑ-function of ann vertex graph is at leastMn 1−2/k for some absolute constantM, we describe another, related, efficient algorithm that finds an independent set of sizek. Several examples show the limitations of the approach and the analysis together with some related arguments supply new results on the problem of estimating the largest possible ratio between theϑ-function and the independence number of a graph onn vertices. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 80 (1998), S. 315-380 
    ISSN: 1436-4646
    Keywords: Discontinuous optimization ; Non-differentiable optimization ; Piecewise-linear programming ; Active-set approach ; Projected-gradient direction ; Degeneracy ; Exact penalty method
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract A theoretical framework and a practical algorithm are presented to solve discontinuous piecewise linear optimization problems dealing with functions for which theridges are known. A penalty approach allows one to consider such problems subject to a wide range of constraints involving piecewise linear functions. Although the theory is expounded in detail in the special case of discontinuous piecewiselinear functions, it is straightforwardly extendable, using standard nonlinear programming techniques, tononlinear (discontinuous piecewise differentiable) functions. The descent algorithm which is elaborated uses active-set and projected gradient approaches. It is a generalization of the ideas used by Conn to deal with nonsmoothness in thel 1 exact penalty function, and it is based on the notion ofdecomposition of a function into a smooth and a nonsmooth part. The constrained case is reduced to the unconstrained minimization of a (piecewise linear)l 1 exact penalty function. We also discuss how the algorithm is modified when it encounters degenerate points. Preliminary numerical results are presented: the algorithm is applied to discontinuous optimization problems from models in industrial engineering. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 81 (1998), S. 37-53 
    ISSN: 1436-4646
    Keywords: Majorization ; Polyhedra
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract For integersk andn withk ⩽ n a vectorx ∈ ℝ n is said to be weaklyk-majorized by a vectorq ∈ ℝ k if the sum of ther largest components ofx does not exceed the sum of ther largest components ofq, forr = 1,⋯,k. For a givenq the set of vectors weaklyk-majorized byq defines a polyhedronP(q; k). We determine the vertices of bothP(q; k) and its integer hullQ(q; k). Furthermore a complete and nonredundant linear description ofQ(q; k) is given. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 81 (1998), S. 89-102 
    ISSN: 1436-4646
    Keywords: Global optimisation ; Adaptive search ; Simulated annealing ; Hesitation
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract Pure adaptive search is a stochastic algorithm which has been analysed in distinct ways for finite and continuous global optimisation. In this paper, motivated by the behaviour of practical algorithms such as simulated annealing, we extend these ideas. We present a unified theory which yields both the finite and continuous results for pure adaptive search. At the same time, we allow our extended algorithm to “hesitate” before improvement continues. Results are obtained for the expected number of iterations to convergence for such an algorithm. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 81 (1998), S. 103-125 
    ISSN: 1436-4646
    Keywords: Variational inequality problems ; Strongly monotone functions ; Monotone functions ; Continuation methods ; Interior-point methods
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract We consider the variational inequality problem, denoted by VIP(X, F), whereF is a strongly monotone function and the convex setX is described by some inequality (and possibly equality) constraints. This problem is solved by a continuation (or interior-point) method, which solves a sequence of certain perturbed variational inequality problems. These perturbed problems depend on a parameterμ 〉 0. It is shown that the perturbed problems have a unique solution for all values ofμ 〉 0, and that any sequence generated by the continuation method converges to the unique solution of VIP(X,F) under a well-known linear independence constraint qualification (LICQ). We also discuss the extension of the continuation method to monotone variational inequalities and present some numerical results obtained with a suitable implementation of this method. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 199-223 
    ISSN: 1436-4646
    Keywords: Scheduling ; Preemptive scheduling ; Average weighted completion time ; Approximation algorithms ; Relaxations ; Linear programming
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract A natural and basic problem in scheduling theory is to provide good average quality of service to a stream of jobs that arrive over time. In this paper we consider the problem of schedulingn jobs that are released over time in order to minimize the average completion time of the set of jobs. In contrast to the problem of minimizing average completion time when all jobs are available at time 0, all the problems that we consider are NP-hard, and essentially nothing was known about constructing good approximations in polynomial time. We give the first constant-factor approximation algorithms for several variants of the single and parallel machine models. Many of the algorithms are based on interesting algorithmic and structural relationships between preemptive and nonpreemptive schedules and linear programming relaxations of both. Many of the algorithms generalize to the minimization of averageweighted completion time as well. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 225-234 
    ISSN: 1436-4646
    Keywords: On-line algorithms ; Preemptive scheduling ; Uniform machines
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract We consider the following on-line scheduling problem. We have to schedulen independent jobs, wheren is unknown, onm uniform parallel machines so as to minimize the makespan; preemption is allowed. Each job becomes available at its release date, and this release date is not known beforehand; its processing requirement becomes known at its arrival. We show that if only a finite number of preemptions is allowed, there exists an algorithm that solves the problem if and only ifs i−1/si ⩽ si/si+1 for alli = 2,⋯,m − 1, wheres i denotes theith largest machine speed. We also show that if this condition is satisfied, then O(mn) preemptions are necessary, and we provide an example to show that this bound is tight. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 273-289 
    ISSN: 1436-4646
    Keywords: Machine scheduling problems ; Mathematical formulation ; Positional completion times ; Batching ; Flow shop scheduling ; Total completion time ; Lagrangian relaxation
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract We consider a scheduling problem introduced by Ahmadi et al., Batching and scheduling jobs on batch and discrete processors, Operation Research 40 (1992) 750–763, in which each job has to be prepared before it can be processed. The preparation is performed by a batching machine; it can prepare at mostc jobs in each run, which takes an amount of time that is independent of the number and identity of the jobs under preparation. We present a very strong Lagrangian lower bound by using the new concept of positional completion times. This bound can be computed in O(n logn) time only, wheren is the number of jobs. We further present two classes of O(n logn) heuristics that transform an optimal schedule for the Lagrangian dual problem into a feasible schedule. Any heuristic in one class has performance guarantee of 3/2. We further show that even the most naive heuristic in this class has a compelling empirical performance. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Electronic Resource
    Electronic Resource
    Springer
    Mathematical programming 82 (1998), S. 413-448 
    ISSN: 1436-4646
    Keywords: Sequential quadratic programming ; SQP method ; Nonlinear programming
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract In this paper we describe a new version of a sequential equality constrained quadratic programming method for general nonlinear programs with mixed equality and inequality constraints. Compared with an older version [P. Spellucci, Han's method without solving QP, in: A. Auslender, W. Oettli, J. Stoer (Eds), Optimization and Optimal Control, Lecture Notes in Control and Information Sciences, vol. 30, Springer, Berlin, 1981, pp. 123–141.] it is much simpler to implement and allows any kind of changes of the working set in every step. Our method relies on a strong regularity condition. As far as it is applicable the new approach is superior to conventional SQP-methods, as demonstrated by extensive numcrical tests. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 1-10 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  It is shown that if G is a tripartite graph such that the maximum size of a set of pairwise edge-disjoint triangles is , then there is a set C of edges of G of size at most , such that for every triangle T of G, where . This improves the previous bound of due to Tuza [6].
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 25-36 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  The Sperner product of the digraphs and is the digraph whose vertex set is the Cartesian product of the vertex set of the two, while there is an arc in pointing from to if either or both of the relations and hold. We study the growth of the largest transitively oriented clique in the Sperner powers of a fixed graph G and derive the first non-trivial upper bounds on the Sperner capacity of arbitrary digraphs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 37-44 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Let G be a finite group and let Cay( ) be a Cayley graph of G. The graph Cay( ) is called a CI-graph of G if, for any for some Aut(G) only when Cay Cay( ). In this paper, we study the isomorphism problem of connected Cayley graphs: to determine the groups G (or the types of Cayley graphs for a given group G) for which all connected Cayley graphs for G are CI-graphs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 75-80 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  We shall prove that for any spatial graph H, there exists a pair of positive integers such that any spatial embedding of the complete bipartite graph whose projection consists of only straight edges contains a subgraph which is ambient isotopic to H.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 321-343 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Let Y=(X,{R i }0≤i≤D) denote a symmetric association scheme with D≥3, and assume Y is not an ordinary cycle. Suppose Y is bipartite P-polynomial with respect to the given ordering A 0, A 1,…, A D of the associate matrices, and Q-polynomial with respect to the ordering E 0, E 1,…,E D of the primitive idempotents. Then the eigenvalues and dual eigenvalues satisfy exactly one of (i)–(iv). (i) (ii) D is even, and (iii) θ* 0〉θ0, and (iv) θ* 0〉θ0, D is odd, and
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 345-350 
    ISSN: 1435-5914
    Keywords: Key words and phrases. Diameter of graphs ; digraphs ; crossintersecting families. ; The research of the first author was supported in part by the Hungarian National Science Foundation under grant OTKA 016389 ; and by a National Security Agency grant No. MDA904-95-H-1045. The research of the second author was supported by a Kuwait University grant SM-168.
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Let f(n) be the minimum number of arcs among oriented graphs of order n and diameter 2. Here it is shown for n〉8 that (1−o(1))n log n≤f(n)≤n log n−(3/2)n.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 351-362 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Let G and H be two graphs. We say that G is homomorphic with H if there is a mapping g from V(G) to V(H) such that g(v)g(u)∈E(H) if vu∈E(G). The odd girth of a graph is the shortest length of odd cycles of the graph.  In this paper, we shall show that every graph G of order n with the odd girth at least 7 and minimum degree greater than n/4 is homomorphic with C 7.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 11-24 
    ISSN: 1435-5914
    Keywords: Key Words and Phrases: resolvable; balanced incomplete block design; free difference family; frame; (modified) group divisible design; difference matrix; perfect Mendelsohn design.
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  In [14], D.K. Ray-Chaudhuri and R.M. Wilson developed a construction for resolvable designs, making use of free difference families in finite fields, to prove the asymptotic existence of resolvable designs with index unity. In this paper, generalizations of this construction are discussed. First, these generalizations, some of which require free difference families over rings in which there are some units such that their differences are still units, are used to construct frames, resolvable designs and resolvable (modified) group divisible designs with index not less than one. Secondly, this construction method is applied to resolvable perfect Mendelsohn designs. Thirdly, cardinalities of such sets of units are investigated. Finally, composition theorems for free difference families via difference matrices are described. They can be utilized to produce some new examples of resolvable designs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 45-58 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  In this paper, we show the following two results. (1). Let G be a 3-connected claw-free graph and H a subgraph of G with . Then G is H-connected (i.e., for any two vertices u and v in G, G has a path connecting u and v and containing all vertices of H). This result generalizes the result of Wu, Cha and Jin that G is Hamiltonian connected if the degree sum of any pairwise nonadjacent vertices is at least . (2). Every k-connected claw-free graph on at most vertices is Hamiltonian connected. This result further extends the result of Z. Wu, Q. Cha and Y. Jin.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 59-73 
    ISSN: 1435-5914
    Keywords: Key words: Thickness ; maximum planar subgraph ; branch and cut
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  We give a state-of-the-art survey of the thickness of a graph from both a theoretical and a practical point of view. After summarizing the relevant results concerning this topological invariant of a graph, we deal with practical computation of the thickness. We present some modifications of a basic heuristic and investigate their usefulness for evaluating the thickness and determining a decomposition of a graph in planar subgraphs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 97-107 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Spherical t-designs are Chebyshev-type averaging sets on the d-sphere which are exact for polynomials of degree at most t. This concept was introduced in 1977 by Delsarte, Goethals, and Seidel, who also found the minimum possible size of such designs, in particular, that the number of points in a 3-design on S d must be at least . In this paper we give explicit constructions for spherical 3-designs on S d consisting of n points for d=1 and ; d=2 and ; d=3 and ; d=4 and ; and odd or even. We also provide some evidence that 3-designs of other sizes do not exist. We will introduce and apply a concept from additive number theory generalizing the classical Sidon-sequences. Namely, we study sets of integers S for which the congruence mod n, where and , only holds in the trivial cases. We call such sets Sidon-type sets of strength t, and denote their maximum cardinality by s(n, t). We find a lower bound for s(n, 3), and show how Sidon-type sets of strength 3 can be used to construct spherical 3-designs. We also conjecture that our lower bound gives the true value of s(n, 3) (this has been verified for n≤125).
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 131-142 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  A quasi-progression of diameter n is a finite sequence for which there exists a positive integer L such that for . Let be the least positive integer such that every 2-coloring of will contain a monochromatic k-term quasi-progression of diameter n. We give a lower bound for in terms of k and i that holds for all . Upper bounds are obtained for in all cases for which . In particular, we show that . Exact formulae are found for and . We include a table of computer-generated values of , and make several conjectures.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 143-153 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Gate matrix layout is an NP-complete combinatorial problem. The related fixed-parameter decision problem has been thoroughly studied for small values of k in recent years. We chose to investigate a more difficult circular version of the fixed-parameter decision problem. We have identified a major group of obstructions to the circular 3-track layout problem. These obstructions all contain a bridge which separates sufficiently large subgraphs; they are called the bridge obstructions. The complete set of circular-3-GML bridge obstructions contains 336 graphs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 163-179 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  The classes of near-regular and -matroids arise in the study of matroids representable over GF(3) and other fields. For example, a matroid is representable over all fields except possibly GF(2) if and only if it is near-regular, and a matroid is representable over GF(3) and GF(4) if and only if it is a -matroid. This paper determines the maximum sizes of a simple rank-r near-regular and a simple rank-r -matroid and determines all such matroids having these sizes.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 181-200 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Erdös and Moser posed the problem of determining, for each integer n〉0, the greatest integer v(n) such that all tournaments of order n contain the transitive subtournament of order v(n) (denoted TT v(n)). It is known that v(n)=3 for , v(n)=4 for , v(n)=5 for , and for n〉27. Moreover, the uniqueness of the tournaments free of TT 4 of orders 6 and 7, and free of TT 5 and TT 6 of orders 13 and 27, respectively, has been established. Here we prove that the tournaments of orders 12 and 26, free of TT 5 and TT 6, respectively, are also unique. Then, we see that all tournaments of order 54 contain TT 7 (improving the best lower bound known for v(n)). Finally, with the aid of a computer, we obtain the orders cv(r) and gv(s) of the biggest transitive tournaments contained, respectively, in all circulant tournaments of order r≤55 and in each Galois tournament of order s〈1000, i.e., in the tournament with set of vertices the Galois field of order s (whenever it exists) and edge directions induced by the quadratic residues. We get better upper bounds of v(n), for n≤991.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 209-221 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Sein Win [5] obtained some degree conditions for the existence of a spanning tree with bounded maximum degree in a graph. Y. Caro, I. Krasikov and Y. Roditty [2], and, I. Krasikov and Y. Roditty [4] extended his results giving lower bounds for the size of largest tree with bounded maximum degree. We further extend the results by considering all trees with bounded maximum degree which are maximal with respect to the inclusion of vertex set. We then characterize the graphs which meet the bounds. Also, we obtain lower bounds for all maximal trees with bounded maximum degree in the graphs which satisfy a certain structure condition, as a generalization of G. Fan's condition [3] for hamiltonicity.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 223-239 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  The ℱ Hypergraph Sandwich Problem (ℱHSP) is introduced here as follows: Given two hypergraphs H 1=(X,ℰ1) and H 2=(X,ℰ2) where ℰ1={E 1 1,…,E m 1}, ℰ2={E 1 2,…,E m 2} and E i 1⊆E i 2 for all 1≤i≤m, is there a hypergraph H=(X,ℰ) with ℰ={E 1,…,E m } such that E i 1⊆E i ⊆E i 2 for all 1≤i≤m which belongs to a specified hypergraph family ℱ? Hypergraph sandwich problems for several properties studied here occur in a variety of important applications.  We prove the NP-completeness of the Interval HSP and the Circular-arc HSP. This corresponds to the problem of deciding whether a partially specified (0,1)-valued matrix can be filled in such that the resulting 0/1 matrix has the consecutive ones property, (resp., circular ones property). The consecutive ones property arises in databases and in DNA physical mapping. Further results shown are a set of conditions relating interval hypergraphs with acyclic hypergraphs.  Finally, the k-tree graph sandwich problem is studied. The general problem is shown to be NP-complete and the fixed k version is given a polynomial algorithm. Both problems are based on solutions to the corresponding partial k-tree recognition problems.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 305-311 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract. It is shown that every finite modular lattice L with |L|≥2 contains a join-irreducible element x∈L such that at most |L|/2 elements y∈L satisfy y≥x.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 275-304 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract.  Let Γ=(X,R) denote a distance-regular graph with diameter D≥2 and distance function δ. A (vertex) subgraph Ω⊆X is said to be weak-geodetically closed whenever for all x,y∈Ω and all z∈X, We show that if the intersection number c 2〉1 then any weak-geodetically closed subgraph of X is distance-regular. Γ is said to be i-bounded, whenever for all x,y∈X at distance δ(x,y)≤i,x,y are contained in a common weak-geodetically closed subgraph of Γ of diameter δ(x,y). By a parallelogram of length i, we mean a 4-tuple xyzw of vertices in X such that δ(x,y)=δ(z,w)=1, δ(x,w)=i, and δ(x,z)=δ(y,z)=δ(y,w)=i−1. We prove the following two theorems. Theorem 1. LetΓdenote a distance-regular graph with diameter D≥2, and assume the intersection numbers c 2〉1, a 1≠0. Then for each integer i (1≤i≤D), the following (i)–(ii) are equivalent. (i)*Γis i-bounded. (ii)*Γcontains no parallelogram of length≤i+1. Restricting attention to the Q-polynomial case, we get the following stronger result. Theorem 2. Let Γ denote a distance-regular graph with diameter D≥3, and assume the intersection numbers c 2〉1, a 1≠0. Suppose Γ is Q-polynomial. Then the following (i)–(iii) are equivalent. (i)*Γcontains no parallelogram of length 2 or 3. (ii)*Γis D-bounded. (iii)*Γhas classical parameters (D,b,α,β), and either b〈−1, or elseΓis a dual polar graph or a Hamming graph.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 313-319 
    ISSN: 1435-5914
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract. We discuss two-way designs with special emphasis on the notion of adjusted orthogonality. A restriction on the parameters of adjusted orthogonal two-way designs is obtained. We also exploit the cyclotomy of squares and fourth powers in finite fields to construct an infinite series of adjusted orthogonal two-way designs both of whose marginals are duals of 2-designs.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Electronic Resource
    Electronic Resource
    Springer
    Graphs and combinatorics 14 (1998), S. 363-375 
    ISSN: 1435-5914
    Keywords: Key words: Intersection multigraph ; uniform hypergraphs ; cliques ; recognition algorithm.
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mathematics
    Notes: Abstract. The intersection multigraph of a simple hypergraph H=(V, {X i /i∈I}) has {x i /i∈I} as vertex set. Two distinct vertices x i ≠x j are joined by |X i ∩X j | parallel edges. It is shown how to recognize intersection multigraphs of 3-uniform, 3-conformal hypergraphs in polynomial time and reveal the (essentially unique) root hypergraph. For integers k≥4, intersection multigraphs of k-uniform, k-conformal hypergraphs with one additional property can be recognized.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract This paper reports on European Commission sponsored research within the EXODUS project. The project carries out research in the context of the evolution towards UMTS and performs personal and terminal multimedia mobility experiments using fixed and wide-band radio access in an international ATM network. After introducing the EXODUS platform and services, the paper presents an IN-based functional model which is suitable for support of mobile multimedia services in ATM networks. Interworking and mobility management issues are discussed, and information flows for call handling are presented. The paper includes a presentation of the mobility management and enhanced INAP protocols which have been developed by the EXODUS project.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 189-201 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract This paper presents a performance study of a mobile multicast protocol called MoM, which is designed to support IP multicast for mobile hosts in an IP internetwork. The protocol uses the basic unicast routing capability of IETF Mobile IP, and leverages existing IP multicast to provide multicast services for mobile hosts as well. A key feature of the MoM protocol is the use of designated multicast service providers (DMSPs) to improve the scalability of mobile multicast. Discrete-event simulation is used in the performance evaluation of the protocol. The performance study focuses on the scalability, routing efficiency, fairness, and overhead of the MoM protocol, as well as on DMSP selection policies and the deliverability of multicast messages. The simulation results suggest distinct performance advantages for the MoM protocol over other approaches for mobile multicast, such as bi-directional tunnelling, particularly as the number of mobile group members increases. Furthermore, even simple policies for choosing a DMSP from possible candidates provide reasonable tradeoffs between handoff rates, routing efficiency, deliverability of messages, and protocol overhead.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 293-306 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Extension of multimedia services and applications offered by ATM networks to wireless and mobile users has captured a lot of recent research attention. Research prototyping of wireless ATM networks is currently underway at many leading research and academic institutions. Various architectures have been proposed depending on the intended application domain. Successful implementation of wireless connectivity to ATM services is significantly dependent on the medium access control (MAC) protocol, which has to provide support for multimedia traffic and for quality‐of‐service (QoS) guarantees. The objective of this paper is to investigate the comparative performance of a set of access protocols, proposed earlier in the literature, with more realistic source traffic models. Data traffic is modeled with self‐similar (fractal) behavior. Voice traffic is modeled by a slow speech activity detector (SAD). Video traffic is modeled as a H.261 video teleconference, where the number of ATM cells per video frame is described by a gamma distribution and a first‐order discrete autoregressive process model. A comparison of the protocols based on simulation data is presented. The goal of the paper is to identify appropriate techniques for effectively and efficiently supporting multimedia traffic and QoS. Simulation results show that boundaries between different types of services are necessary for multimedia traffic. Reservation for certain traffic type especially video can significantly improve its quality. Reducing the number of collisions is an important issue for wireless networks since contentions lead not only to potentially high delay but also result in high power consumption.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 189-198 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Some next‐generation personal communication systems propose the use of satellite systems for extending geographical coverage of cellular service. We pursue the idea of using satellite capacity to offload congestion within the area serviced by the terrestrial network. An integrated satellite‐cellular network configuration is considered. The performance of this system is evaluated by means of an analytical model for a one‐dimensional (highway) cellular system overlaid with satellite footprints and by means of simulation for a planar cellular network with satellite spot beam support. Under certain re‐use assumptions, an improvement is found in the blocking performance of the integrated system over the Erlang‐B blocking of a purely cellular circuit switched systems. This is achieved by efficient partitioning (static) of the total bandwidth into space and terrestrial segments. Major factors that influence performance, such as different reuse considerations on the satellite and cellular systems, cell size to footprint size ratios, admission control and call management policies, and changes in traffic patterns, are also investigated.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 119-213 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Low earth orbit satellite (LEOS) systems promise to provide global communication, including voice and data services from Iridium and high capacity broadband services from Teledesic. In design of LEOS systems, the choice of satellite altitude is an important consideration, which has a significant impact on system performance. Among the factors affected by satellite altitude choice are system capacity, user‐to‐user delay, power system design and communication services that can be offered. This paper analyzes the effects of satellite altitude on quality of service, frequency reusability and power system sizing. It is found that a choice of low altitude has a positive impact on system capacity and power system requirements. As a consequence, satellite mass and launch cost can be reduced for satellites in lower orbits due to the lower power requirements. In terms of user‐to‐user delay, the results are in favor of medium altitudes, while very high altitudes are not a good choice relative to these measures.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 291-295 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract The contribution of this paper is in applying parameter replacement techniques to speech that is compressed by the Federal Standard 1016 CELP speech coder, protected by Reed–Solomon codes, and transmitted over a wireless channel. The parameter replacement results in significant improvement in speech quality without any increase in bit rate.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 325-340 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract We propose a dynamic load balancing scheme for the tele-traffic hot spot problem in cellular networks. A tele-traffic hot spot is a region of adjacent hot cells where the channel demand has exceeded a certain threshold. A hot spot is depicted as a stack of hexagonal ‘Rings’ of cells and is classified as complete if all cells within it are hot. Otherwise it is termed incomplete. The rings containing all cold cells outside the hot spot are called ‘Peripheral Rings’. Our load balancing scheme migrates channels through a structured borrowing mechanism from the cold cells within the ‘Rings’ or ‘Peripheral Rings’ to the hot cells constituting the hot spot. A hot cell in ‘Ring i’ can only borrow a certain fixed number of channels from adjacent cells in ‘Ring i+1’. We first propose a load balancing algorithm for a complete hot spot, which is then extended to the more general case of an incomplete hot spot. In the latter case, by further classifying a cell as cold safe, cold semi-safe or cold unsafe, a demand graph is constructed which describes the channel demand of each cell within the hot spot or its ‘Peripheral Rings’ from its adjacent cells in the next outer ring. The channel borrowing algorithm works on the demand graph in a bottom up fashion, satisfying the demands of the cells in each subsequent inner ring until ‘Ring 0’ is reached. A Markov chain model is first developed for a cell within a hot spot, the results of which are used to develop a similar model which captures the evolution of the entire hot spot region. Detailed simulation experiments are conducted to evaluate the performance of our load balancing scheme. Comparison with another well known load balancing strategy, known as CBWL, shows that under moderate and heavy tele-traffic conditions, a performance improvement as high as 12% in terms of call blockade is acheived by our load balancing scheme.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 79-85 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract This paper presents an overview of the evolution of frequency synthesizers based on phase-locked loops (PLLs). The main limitations of the digital PLLs are described, and the consequent necessity of using fractional-N techniques is justified. The origin of the typical spurious noise lines on the sidelobes of the synthesized frequency is explained. It is shown how to eliminate these spurious noise lines by using digital ΔΣ modulators to control the frequency division value. Finally, the implications of using digital ΔΣ modulators together with fractional-N PLLs on the output phase noise are analysed.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 87-97 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Circuit solutions of various types of gain controlled IF amplifiers with digital and analog gain control are described. Advantages and disadvantages of the different solutions are shown. Requirements for low‐power, low‐voltage, low noise, high gain and linearity at high IF‐frequencies from the system point of view are worked out. Solutions will be presented to optain optimum performance by technology and circuit design technique for digital wireless telephone systems used for GSM and PCN systems.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract A dynamic routing scheme for public switched telephone networks is introduced which employs satellite broadcast to distribute network load data. The proposed network architecture closely resembles the IN (Intelligent Network) architecture, whereby the IN SCPs (Service Control Points) serve as so‐called Routing Control Points (RCPs). The key functions of an RCP are (i) to execute the routing algorithm and issue routing instructions in response to routing queries it receives from its associated switches for calls which overflow from the default network links, and (ii) to monitor and evaluate the pattern of received routing queries to obtain an estimate for the traffic loads present in each RCP's domain of associated switches. Satellite broadcast is used to distribute the load information among all RCPs in the network in a periodic fashion. This paper also reports on the results of extensive call‐by‐call simulations. The objective of the simulations was to validate this new routing scheme and compare its performance with well‐known existing schemes. Real traffic and network data as measured in the Austrian PSTN were used in the simulations. The main results are that, under all realistic network and traffic conditions including link and node failures, the proposed scheme yields lower blocking rates and significantly less routing and crankback attempts than the existing dynamic routing schemes. Note that this is achieved in the absence of any load measurements within the switches. As regards the periodic satellite based RCP‐RCP broadcast for the PSTN studied, it was shown that an update period of 10 seconds yields an excellent routing performance which is close to the limit of a vanishing update period.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 429-445 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Current implementation of IS-95 based systems is performance limited due to the use of a “conventional” detection scheme, which is susceptive to inter-user interference. We focus on the uplink, and try to examine the performance enhancement achieved by a suboptimal linear multiuser MMSE pre-filter, applied in front of the “standard” detection mechanism. We demonstrate the limitations of this relatively simple approach, and the constellations in which it may show improved performance.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 471-478 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Increasingly, spread spectrum systems are being proposed which support a range of data rates and traffic types in a band limited environment. One way to achieve a range of data rates with fixed bandwidth is to allow the use of different processing gains. If the range of data rates supported is large, the lower bound on the processing gain can become quite small. Receivers based on LMMSE algorithms offer high efficiency for CDMA systems through interference suppression, however at small processing gains, the sequence set correlation properties prove to be a significant limitation on the system efficiency. This paper provides examples of sets of short length spreading sequences which have good auto-correlation (AC) and cross-correlation (CC) properties which are essential to allow relatively high system efficiency. A CDMA system using an LMMSE receiver is examined with selected short length sets to demonstrate the application of the sequences. The sets proposed are compared to system performance when using well known sequence families.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 101-107 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract This paper discusses the evolution of communication satellite systems and communications satellite technology from the 1960's to the 1990's. The paper identifies the key attributes of satellite communications that has driven this evolution and now drives the future directions such systems will take. The paper then discusses the future direction of communication satellite systems including DBS, MSS, FSS and hybrid satellite/terrestrial systems. The paper points to the continued evolution of the satellite payload to use of spot beams, onboard processing and switching, and intersatellite links, with capability for higher EIRPs. The paper also identifies the earth station trends to more compact, lower cost stations, produced in higher volumes, with the handheld phone for MSS operation being the prime example of this trend. The paper then points to some revolutionary trends in satellite communication networks being proposed for MSS and FSS applications involving fleets of NGSO satellites combined with more extensive ground networks involving new networking concepts, new services (such as multimedia) and new hybrid configurations working with terrestrial networks, involving a host of new network issues and operations.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 319-324 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract In recent years, a great deal of research has been performed on methods of alleviating the performance degradations suffered by code division multiple access (CDMA) systems due to multiple access interference. In this paper, we consider a multistage detector for noncoherent CDMA using M-ary orthogonal signals. Using a decorrelating detector as its first stage, the detector iteratively estimates the multiple access interference affecting the desired signal, subtracts the estimated interference, and forms symbol estimates for each of K users. Through numerical examples, the bit error performance of the proposed detector is demonstrated to be superior to that of previous detectors for the same signalling scheme.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 353-364 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract In mobile communication networks operating in unreliable physical transmission, random access protocol with the collision resolution (CR) scheme is more attractive than the ALOHA family including carrier sense multiple access (CSMA) [IEEE Networks (September 1994) 50–64], due to likely failure on the channel sensing. Being a member of CR family schemes, a protocol known as non-preemptive priority multiple access (NPMA) is utilized in a new high-speed wireless local area network, HIPERLAN, standardized by European Telecommunication Standard Institute (ETSI). A conceptually three-layer CR multiple access protocol generalized from NPMA, supporting single type of traffic, is thus presented and analyzed in this paper. The CR capability of such a protocol (and hence NPMA) is proved to be significant by numerical substantiation that additional collision detection schemes are dispensable; also its throughput/delay performance is excellent when the proportion of the transmission phase to a channel access cycle is large enough (i.e., the winner of contention should transmit all of its packets successively). On the other hand, the simulated performance of NPMA serving integrated traffic is not fully satisfactory, primarily due to its distributed control mode and distinguishing traffic types only by the prioritization process.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 389-400 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Traffic analysis for third generation mobile telecommunication systems should take into account a variety of services (e.g., voice, data, video) and “environments” (private, public outdoor, public indoor) as well as the user mobility behavior. The analytical traffic model presented in this paper incorporates all the above mentioned features. The model utilizes a set of simplifying assumptions regarding the distribution of certain random time intervals (e.g., call duration and “cell residence time”) and the handover arrival process. The core of the model focuses on the estimation of the cell border crossing rate and the time it takes a busy mobile user to leave a cell area. This allows for the estimation of the handover rate and the call duration within a cell, which in turn, utilizing an iterative method, allows for the calculation of the offered traffic load per cell. The major advantages of the model are: (a) the simple closed form solutions, (b) its independence from the applied radio resource management scheme, and (c) its accuracy. The latter is validated via a simulation tool, which accommodates different cell-layout scenarios over a geographical area, representing a ‘typical’ city center, modeled as a Manhattan grid.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Electronic Resource
    Electronic Resource
    Springer
    Wireless networks 4 (1998), S. 489-496 
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Power control algorithms assume that the receiver structure is fixed and iteratively update the transmit powers of the users to provide acceptable quality of service while minimizing the total transmitter power. Multiuser detection, on the other hand, optimizes the receiver structure with the assumption that the users have fixed transmitter powers. In this study, we combine the two approaches and propose an iterative and distributed power control algorithm which iteratively updates the transmitter powers and receiver filter coefficients of the users. We show that the algorithm converges to a minimum power solution for the powers, and an MMSE multiuser detector for the filter coefficients.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    ISSN: 1572-8080
    Keywords: embedded systems ; rapid prototyping ; hardware/software co-design ; field-programmable inter-connect ; software synthesis ; automotive electronics
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract This paper describes a flexible board-level rapid-prototyping environment for embedded control applications. The environment is based on an APTIX board populated by Xilinx FPGA devices, a 68HC11 emulator, and APTIX programmable interconnect devices. Given a design consisting of logic and of software running on a micro-controller that implement a set of tasks, the prototype is obtained by programming the FPGA devices, the micro-controller emulator and the APTIX devices. This environment being based on programmable devices offers the flexibility to perform engineering changes, the performance needed to validate complex systems and the hardware setup for field tests. The key point in our approach is the use of results of our previous research on software and hardware synthesis as well as of some commercial tools to provide the designer with fast programming data from a high-level description of the algorithms to be implemented. We demonstrate the effectiveness of the approach by showing a close-to real-life example from the automotive world.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    ISSN: 1572-8080
    Keywords: co-simulation ; heterogeneous systems ; VHDL ; electromechanical system controllers
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The design of embedded processor circuits for the control of electromechanical systems, in a unified environment, offers many advantages including reduced system design and debug cycles and shorter time to market. Simulation plays a very important role in such a design methodology. In this paper, we will present, a brief description of the design methodology of our research team which focuses on the co-simulation of various heterogeneous parts. More specifically, we will present a couple of flexible interfaces that have been implemented for bridging VHDL with Physical Systems Simulators as well as VHDL simulators with the application programs that control the digital circuit simulated in VHDL. The basic concepts and features used for these implementations are characterised by increased portability, while other significant advantages of the proposed schemes are their speed, their flexibility in supporting various communication protocols and the simplified and fully automated simulation procedure which is transparent to the user.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Electronic Resource
    Electronic Resource
    Springer
    Design automation for embedded systems 3 (1998), S. 199-217 
    ISSN: 1572-8080
    Keywords: codesign ; distributed systems ; multi-language simulation
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract For functional validation of heterogeneous embedded systems, hardware/software (Hw/Sw) cosimulation methodology is mandatory. This paper deals with a distributed cosimulation environment for heterogeneous systems prototyping. The cosimulation environment allows handling all kinds of distributed architectures regardless the communication scheme used, cosimulation at different levels of abstraction and smooth transition to the cosynthesis process. The approach can handle any number of hardware modules, software modules, and debugging tools, which can be used simultaneously. This flexibility is obtained thanks to an automatic cosimulation interface generation tool, which creates links between Hw and Sw simulation environments. The resulting environment is very easy to use and our cosimulation model has been validated on very large industrial examples. The experiments show that VHDL-C cosimulation is faster than classical simulation approaches.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    ISSN: 1572-8080
    Keywords: rapid prototyping ; embedded system design ; wearable computers
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The Wearable Computer Project is a testbed integrating research on rapid design and prototyping. Based on representative examples from six generations of wearable computers, the paper focuses on the differences in rapid prototyping using custom design versus off-the-shelf components. The attributes characterizing these two design styles are defined and illustrated by experimental measurements. The off-the-shelf approach required ten times the overhead, 30% more cost, fifty times the storage resources, 20% more effort, five times more power, but 30% less effort to port software than the embedded approach. An evaluation of the VuMan 3 design is presented to show its superior advantages in comparison to the off-the-shelf approach.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Electronic Resource
    Electronic Resource
    Springer
    Design automation for embedded systems 3 (1998), S. 115-116 
    ISSN: 1572-8080
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Electronic Resource
    Electronic Resource
    Springer
    Design automation for embedded systems 3 (1998), S. 239-253 
    ISSN: 1572-8080
    Keywords: Discrete-event systems ; mutable system configuration ; mobile cellular networks ; network design process
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract In this paper we introduce a discrete-event-based simulation technology suitable to model cellular mobile radio systems with respect to their dynamic behavior. The latter results in the need for simulation tools which support mutable system configurations. The problems encountered when modeling mutable system configurations using conventional discrete-event simulators are discussed. In order to show a possible solution to this problem we introduce configuration events and configuration objects into the theory of discrete-event simulations. We demonstrate how configuration objects can be implemented in a discrete-event simulator using a dynamic map-function, hereby extending a definition of higher order functions. We apply the configuration objects in a Multiple Layer Model for modeling an entire mobile cellular radio network in a discrete-event simulator as an application for the extended theory. In this model we use the configuration objects to change the network's configuration during runtime. We show that this solution—combined with an object-oriented software design and, possibly, a visual programming language—is a powerful tool for the simulation of the dynamic aspects of mobile cellular radio networks. The software technology presented will be applied by the German cellular network operator Mannesmann Mobilfunk to model dynamic features applicable to the radio resource management of mobile radio networks and to access their performance by simulation.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Electronic Resource
    Electronic Resource
    Springer
    Design automation for embedded systems 3 (1998), S. 291-309 
    ISSN: 1572-8080
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract We present the systems requirements generation and executable specification capture of a single chip LAN Adapter for communicating using the IEEE 1394 Serial Bus Protocol. The requirements generation starts with high level performance simulation and then passes to an executable specification suitable for implementation using a hardware/software co-design tool. The reuse of pre-existing components is supported, as well as synthesis of the system interface, but only after much work is done to program the hardware/software co-design tool. The actual design flow described allows feedback among all design levels, e.g. from implementation up to requirements, throughout the process.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    ISSN: 1572-8080
    Keywords: Methodology ; DVB ; algorithm and architecture design ; performance analysis ; verification
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract This contribution describes design methodology and implementation of a single-chip timing and carrier synchronizer and channel decoder for digital video broadcasting over satellite (DVB-S). The device consists of an A /D converter with AGC, timing and carrier synchronizer with matched filter, Viterbi decoder including node synchronization, byte and frame synchronizer, convolutional de-interleaver, Reed Solomon decoder, and a descrambler. The system was designed in accordance with the DVB specifications. It is able to perform Viterbi decoding at data rates up to 56 Mbit /s and to sample the analog input values with up to 88 MHz. The chip allows automatic acquisition of the convolutional code rate and the position of the puncturing mask. The symbol synchronization is performed fully digitally by means of interpolation and controlled decimation. Hence, no external analog clock recovery circuit is needed. For algorithm design, system performance evaluation, co-verification of the building blocks, and functional hardware verification an advanced design methodology and the corresponding tool framework are presented which guarantee both short design time and highly reliable results. The chip has been fabricated in a 0.5 µm CMOS technology with three metal layers. A die photograph is included.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Electronic Resource
    Electronic Resource
    Springer
    Formal methods in system design 13 (1998), S. 235-253 
    ISSN: 1572-8102
    Keywords: ordered binary decision diagram ; zero-suppressed binary decision diagram ; decomposition rules ; generic synthesis algorithm ; trade-offs ; knight's problem
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Zero-suppressed binary decision diagrams (ZBDDs) have been introduced by Minato [14–17] who presents applications for cube set representations, fault simulation, timing analysis and the n-queens problem. Here the structural properties of ZBDDs are worked out and a generic synthesis algorithm is presented and analyzed. It is proved that ZBDDs can be at most by a factor n + 1 smaller or larger than ordered BDDs (OBDDs) for the same function on n variables. Using ZBDDs the best known upper bound on the number of knight's tours on an 8 × 8 chessboard is improved significantly.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Electronic Resource
    Electronic Resource
    Springer
    Formal methods in system design 13 (1998), S. 127-158 
    ISSN: 1572-8102
    Keywords: carry lookahead adder ; ripple carry adder ; generic adders ; parallel prefix ; formal verification ; automatic verification ; proof by induction ; divide and conquer ; powerlists
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract A methodology for mechanically verifying generic adder circuits is proposed using the rewrite-rule based theorem prover Rewrite Rule Laboratory (RRL). Proofs of properties of adder circuit descriptions are done by rewriting and induction. Carry lookahead adder circuit is described using powerlists, a data structure introduced by Misra to support divide-and-conquer strategy used for designing data-parallel algorithms. This description uses an algorithm for parallel prefix computation on powerlists due to Adams. Reasoning about properties of this algorithm can be of independent interest since parallel prefix operator has been found useful in many data-parallel algorithms. The correctness of the carry-lookahead adder (i.e., the adder indeed implements addition on numbers) is established by showing its equivalence to a recursive description of the ripple-carry adder, which is shown to correctly implement addition on natural numbers. The ripple carry adde r circuit is described in two different but equivalent ways: using powerlists employing the divide-and-conquer strategy, as well as using linear lists employing the linear decomposition strategy. The description of the ripple carry adder using powerlists is useful for showing equivalence of its input-output behavior to that of carry lookahead adder, whereas the description using linear lists is useful for showing its correctness with respect to addition on natural numbers. Descriptions of adder circuits using powerlists are based on Adams' work who also gave a hand proof of their correctness using the powerlist algebra. The emphasis in this paper is to generate proofs mechanically by a theorem prover . RRL exploits the algebraic laws of the powerlist algebra as rewrite rules, and uses heuristics for mechanizing proofs by induction using the cover set method to generate such proofs. The regularity in hardware circuits gets refl ected in compact descriptions generated using the divide-and-conquer strategy as well as in mechanically generated proofs by induction. Mechanical proofs generated by RRL closely follow the well-crafted hand-proofs which is quite encouraging. A comparison with Adams' hand generated proof is also made. There is strong evidence that the proposed methodology for generating proofs should scale up for large circuits exhibiting regularity that can be described using divide-and-conquer strategy in terms of powerlists.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Electronic Resource
    Electronic Resource
    Springer
    International journal of speech technology 2 (1998), S. 187-200 
    ISSN: 1572-8110
    Keywords: human-machine ; interface ; conversation ; speech ; language ; adaptive
    Source: Springer Online Journal Archives 1860-2000
    Topics: Linguistics and Literary Studies , Computer Science
    Notes: Abstract This paper proposes a method of designing human-computer speech interfaces based on principles of human conversation. It argues that conversation is the primary mode of language use and that it is fundamentally collaborative. Speech interfaces should therefore be designed to recreate the collaborative nature of natural conversations. The paper presents five strategies for designingcollaborative conversational interfaces, and it describes the principles of human-language use that underly these strategies. The paper also argues that collaborative conversational interfaces have a crucial advantage over other kinds of interfaces in that they are readily adaptive to different levels of experience and styles of use. The paper gives examples of collaborative conversational interfaces that we have developed, and discusses the ways in which these interfaces have been made adaptive.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Electronic Resource
    Electronic Resource
    Springer
    International journal of speech technology 2 (1998), S. 215-225 
    ISSN: 1572-8110
    Keywords: very low-rate speech coding ; pitch detection ; pitch interpolation ; temporal decomposition
    Source: Springer Online Journal Archives 1860-2000
    Topics: Linguistics and Literary Studies , Computer Science
    Notes: Abstract A new method for predicting pitch contour of a speech signal using a small number of pitch values is addressed, for the application of very low rate speech coding, relying on the correlation between phonetic evolution and pitch variations during voiced speech segments. To track the phonetic evolution and specify perceptually significant time points, Temporal Decomposition (TD) is used. TD provides information required for both determination of critical pitch values and estimation of pitch contour by detecting event functions, as interpolation paths, and their centroids, as the most steady points, in the spectral parameters space. It is shown that the proposed method reduces the amount of pitch information to about one-tenth of that in conventional frame-by-frame based techniques with less than 5% error in pitch approximation.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Electronic Resource
    Electronic Resource
    Springer
    International journal of speech technology 2 (1998), S. 241-248 
    ISSN: 1572-8110
    Keywords: speech recognition ; dynamic recognition neural network (DRNN) ; adaptive neural networks ; accumulative learning ; hidden Markov model
    Source: Springer Online Journal Archives 1860-2000
    Topics: Linguistics and Literary Studies , Computer Science
    Notes: Abstract In this paper, we present an on-line learning neural network model, Dynamic Recognition Neural Network (DRNN), for real-time speech recognition. The property of accumulative learning of the DRNN makes it very suitable for real-time speech recognition with on-line learning. A comparison between the DRNN and Hidden Markov Model (HMM) shows that the computational complexity of the former is lower than that of the latter in both training and recognition. Encouraging results are obtained when the DRNN is tested on a BUPT digit database (Mandarin) and on the on-line learning of twenty isolated English computer command words.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 175-188 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract In this paper we examine the problem of group-based multicast communication in the context of mobile computing with wireless communication technology. We propose a protocol in which group members may be mobile computers and such that the group membership may change dynamically. Multicasts are delivered in the same order at all group members (totally-ordered multicast). Mobile computers are resource-poor devices that communicate with a wired network through a number of spatially limited cells defining wireless links. The spatial coverage provided by wireless links may be either complete or incomplete, which makes the overall system model both general and realistic. The proposed protocol is simple and does not require any hand-off in the wired network upon movements of group members. Moreover, there is no part of the protocol requiring that group members do not move during its execution. This feature leads to mobility assumptions that are practical because they involve only the global movement of group members, e.g., assumptions of the form “a group member does not move very fast all the time”.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 123-141 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Wireless networks are characterized by simple end devices and limited bandwidth. One solution to address these and other limitations of the wireless mobile environment that has been widely pursued is the placement of proxies, or agents, inside the network to assist with application processing that would normally take place on end devices. These agents can additionally manipulate data to reduce bandwidth requirements and assist in providing services. The design and implementation of a user agent is heavily impacted by the application it supports. In this paper we present our experiences with user agents in two different types of applications: telephony-based Personal Communication Services (PCS) and two-way messaging. To provide low latency service, the PCS user agents are mobile so that they may be kept close to their end devices. The design of the PCS agents limits migration overhead to the transfer of approximately 100 bytes of information in about 150 milliseconds. To provide advanced messaging services, the messaging user agent supports flexible messages while limiting air interface bandwidth usage. The messaging agents reduce uplink bandwidth usage by approximately 35% when applied to a cellular PCS system, and reduce message payloads by 97%.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 221-234 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The Group Allocation Multiple Access with Packet-Sensing (GAMA-PS) protocol for scheduling real-time and datagram traffic in a wireless LAN is specified and analyzed. By maintaining a dynamically-sized cycle that changes in length depending on the amount of network traffic, GAMA-PS is able to efficiently control channel access while ensuring that there are no collisions of data packets. Each cycle contains a contention period and a group-transmission period; a station with data to send competes for membership in the “transmission group” by using packet sensing to successfully complete an RTS/CTS message exchange during the contention period. Once a station is a member of the transmission group, it is able to transmit a collision-free data packet during each cycle; as long as a station has data to send, it maintains its position in the group.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 261-273 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract This paper presents a Wireless Virtual Local Area Network (WVLAN) to support mobility in IP‐over‐ATM local area networks. Mobility is handled by a joint ATM‐layer handoff for connection rerouting and MAC‐layer handoff for location tracking, such that the effects of mobility are localized and transparent to the higher‐layer protocols. Different functions, such as Address Resolution Protocol (ARP), mobile location, and ATM connection admission are combined to reduce protocol overhead and front‐end delay for connectionless packet transmission in connection‐oriented ATM networks. The proposed WVLAN, through the use of ATM technology, provides a scalable wireless virtual LAN solution for IP mobile hosts.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 101-119 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract MMWN is a modular system of adaptive link- and network-layer algorithms that provides a foundation on which to build mechanisms for quality-of-service provision in large, multihop mobile wireless networks. Such networks are a practical means for creating a communications infrastructure where none yet exists or where the previously existing infrastructure has been severely damaged. These networks provide communications for such diverse purposes as tactical maneuvering and strategic planning on the battlefield, emergency relief in an area afflicted by a natural disaster, and field studies conducted by a team of scientists in a remote location. In this paper, we describe three key components of the MMWN system: the clustering procedures for defining a virtual, hierarchical control structure superimposed on a large network of mobile switches and endpoints; the location management procedures for determining the current locations of mobile endpoints relative to the hierarchical control structure; and the virtual circuit management procedures for setting up and repairing virtual circuits as switches and endpoints move. We also provide simulation results that illustrate the robustness of each of these components with respect to a broad spectrum of transmission ranges and relative mobility of switches and endpoints.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 73-87 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Coupled with the growing interest in the Universal Mobile Telecommunication System (UMTS) as a standard for future mobile communications, the need for a set of functions to effectively support multimedia teleservices in such an environment is also increasing. Starting from the idea that multimedia means the integrated manipulation of different information and hence the independent handling of separate information is not satisfactory, an enhanced protocol architecture for the support of multimedia teleservices in Wireless Personal Communication Systems based on UMTS is proposed. It involves Physical, MAC, Data Link, and Network layers. A Synchronisation Sub-Layer is introduced on the MAC level with the main aim of assuring a rough multimedia inter-stream synchronisation over the air interface, which is a first step prior to a fine end-to-end synchronisation performed by higher layers. Proposed functions, their basic algorithms, their location in the protocol stack, as well as the signalling exchange among modules implementing them, on network and user sides, are described in detail in the paper. The resulting architecture well fits the demanding nature of multimedia services and can be easily interfaced with the wired backbone of the system.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Electronic Resource
    Electronic Resource
    Springer
    Mobile networks and applications 3 (1998), S. 157-173 
    ISSN: 1572-8153
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Location-aware applications are becoming increasingly attractive due to the widespread dissemination of wireless networks and the emergence of small and cheap locating technologies. We developed a location information server that simplifies and speeds up the development of these applications by offering a set of generic location retrieval and notification services to the application. The data model and the access protocols of these services are based on the X.500 directory service and the lightweight directory access protocol LDAP since these are becoming the standard attribute-value-pair retrieval mechanisms for Internet and Intranet environments. This approach establishes a smooth migration path from conventional to location-aware applications. The paper presents the location information server concepts, defines its directory data model and access services, and discusses the implementation options of the location information server.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...