Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1998

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 121 - 150 of 163

Full-Text Articles in Computer Engineering

Buckets: Aggregative, Intelligent Agents For Publishing, Michael L. Nelson, Kurt Maly, Stewart N. T. Shen, Mohammad Zubair Jan 1998

Buckets: Aggregative, Intelligent Agents For Publishing, Michael L. Nelson, Kurt Maly, Stewart N. T. Shen, Mohammad Zubair

Computer Science Faculty Publications

Buckets are an aggregative, intelligent construct for publishing in digital libraries. The goal of research projects is to produce information. This information is often instantiated in several forms, differentiated by semantic types (report, software, video, datasets, etc.). A given semantic type can be further differentiated by syntactic representations as well (PostScript version, PDF version, Word version, etc.). Although the information was created together and subtle relationships can exist between them, different semantic instantiations are generally segregated along currently obsolete media boundaries. Reports are placed in report archives, software might go into a software archive, but most of the data and …


Tcp/Ip Implementation With Endsystem Qos, Sherlia Y. Shi, Gurudatta M. Parulkar, R. Gopalakrishnan Jan 1998

Tcp/Ip Implementation With Endsystem Qos, Sherlia Y. Shi, Gurudatta M. Parulkar, R. Gopalakrishnan

All Computer Science and Engineering Research

This paper presents a Real-time Upcall (RTU) [1] based TCP/IP implementation that guarantees throughput for continuous media applications and ensures low latency bounds for interactive applications. RTU is an endsystem rate-based scheduling mechanism that provides quality of service (QoS) in terms of CPU cycles, to applications. We restructured the existing NetBSD TCP/IP implementation to exploit the RTU concurrency model and to provide predictable performance. Our experimental results show that on two 200 MHz NetBSD PCs connected by a 155Mbps ATM link, the RTU based kernel TCP/IP implementation provides excellent throughput guarantees for periodic connections regardless the system or network load. …


Integrating A Constraint Mechanism With The Javabeans Model, William M. Shapiro Jan 1998

Integrating A Constraint Mechanism With The Javabeans Model, William M. Shapiro

All Computer Science and Engineering Research

The JavaBeans component model allows users to plug together software components to create Java applications by specifying simple relationships between component events and properties. This paper describes work on augmenting the simple JavaBeans model with a multi-way constraint mechanism that allows users to graphically specify more complex multi-way contraints, resolve cyclical constraints between bean properties and graphically layout bean components. We also discuss weaknesses in the JavaBeans model and Java Abstract Windowing Toolkit (AWT) that were discovered while integrating a constraint mechanism with JavaBeans.


Routing Table Compression Using Binary Tree Collapse, Jonathan Turner, Qiyong Bian, Marcel Waldvogel Jan 1998

Routing Table Compression Using Binary Tree Collapse, Jonathan Turner, Qiyong Bian, Marcel Waldvogel

All Computer Science and Engineering Research

This paper describes an algorithm which can roughly halve the size of the current Internet routing tables. This algorithm is based on the radix trie representation of routing tables, which was firstly used in the BSD Unix distributions. The binary tree representation, which is a simplified case of radix tree, does well at showing the relationships among all routing table entries and provides us a way to build a collapse algorithm based on its internal structure. The binary tree collapse algorithm consists of three techniques, with the first two quite intuitive while the third is a bit more elaborate. All …


Congestion Control In Multicast Transport Protocols, Rajib Ghosh, George Varghese Jan 1998

Congestion Control In Multicast Transport Protocols, Rajib Ghosh, George Varghese

All Computer Science and Engineering Research

We discuss congestion control mechanisms in multicast transport protocols and we propose TCP-M - a TCP-friendly Multicast transport protocol. TCP-M uses IP multicast to deliver data packets and acknowledgements to provide reliability. Ack implosion at the source is prevented by fusing acknowledgements at some intermediate routers. TCP-M reacts to network congestion exactly like TCP by having the sender emulate a TCP sender.


Modeling Mobile Ip In Mobile Unity, Peter J. Mccann, Gruia-Catalin Roman Jan 1998

Modeling Mobile Ip In Mobile Unity, Peter J. Mccann, Gruia-Catalin Roman

All Computer Science and Engineering Research

With recent advances in wireless communication technology, mobile computing is an increasingly important area of research. A mobile system is one where independently executing components may migrate through some space during the course of the computation, and where the pattern of connectivity among the components changes as they move in and out of proximity. Mobile UNITY is a notation and proof logic for specifying and reasoning about mobile systems. In this paper it is argued that Mobile UNITY contributes to the modular development of system specifications because of the declarative fashion in which coordination among components is specified. The packet …


Terabit Burst Switching Progress Report (6/98-9/98), Jonathan S. Turner Jan 1998

Terabit Burst Switching Progress Report (6/98-9/98), Jonathan S. Turner

All Computer Science and Engineering Research

This report summarizes progress on the Terabit Burst Switching Project at Washington University for the period from June 15, 1998 through September 15, 1998.


Terabit Burst Switching Progress Report (12/97-2/98), Jonathan S. Turner Jan 1998

Terabit Burst Switching Progress Report (12/97-2/98), Jonathan S. Turner

All Computer Science and Engineering Research

This report summarizes progress on the Terabit Burst Switching Project at Washington University for the period from December 15, 1997 through March 15, 1998. Efforts during this period have concentrated on working out details of the burst switch architecture, evaluating a variety of implementation alternatives and developing the physical design of the 160 Gb/s ATM switch to allow demonstration of the burst switch within a realistic network context.


Diagnostic Screening Of Digital Mammograms Using Wavelets And Neural Networks To Extract Structure, Barry L. Kalman, Stan C. Kwasny, William R. Reinus Jan 1998

Diagnostic Screening Of Digital Mammograms Using Wavelets And Neural Networks To Extract Structure, Barry L. Kalman, Stan C. Kwasny, William R. Reinus

All Computer Science and Engineering Research

As the primary tool for detecting breast carcinoma, mammography provides visual images from which a trained radiologist can identify suspicious areas that suggest the presence of cancer. We describe an approach to image processing that reduces an image to a small number of values based on its structural characteristics using wavelets and neural networks. To illustrate its utility, we apply this methodology to the automatic screening of mammograms for mass lesions. Our results approach performance levels of trained human mammographers.


Learning From Examples With Unspecified Attribute Values, Sally A. Goldman, Stephen S. Kwek, Stephen D. Scott Jan 1998

Learning From Examples With Unspecified Attribute Values, Sally A. Goldman, Stephen S. Kwek, Stephen D. Scott

All Computer Science and Engineering Research

We introduce the UAV learning model in which some of the attributes in the examples are unspecified. In our model, an example x is classified positive (resp., negative) if all possible assignments for the unspecified attributes result in a positive (resp., negative) classification. Otherwise the classificatoin given to x is "?" (for unknown). Given an example x in which some attributes are unspecified, the oracle UAV-MQ responds with the classification of x. Given a hypothesis h, the oracle UAV-EQ returns an example x (that could have unspecified attributes) for which h(x) is incorrect. We show that any class learnable in …


Algorithms For Message Delivery In A Micromobility Environment, Amy L. Murphy, Gruia-Catalin Roman, George Varghese Jan 1998

Algorithms For Message Delivery In A Micromobility Environment, Amy L. Murphy, Gruia-Catalin Roman, George Varghese

All Computer Science and Engineering Research

As computing components get smaller and people become accustomed to having computational power at their disposal at any time, mobile computing is developing as an important research area. One of the fundamental problems in mobility is maintaining connectivity through message passing as the user moves through the network. This is usually accomplished in one of two ways: search or tracking. In search, an algorithm hunts the mobile unit through the network each time a message is to be delivered, while in tracking, a specific home keeps up to date information about the current location of the mobile unit. Our paper …


Application Development And Management In The Programmers' Playground, T. Paul Mccartney, E.F. Berkley Shands, Kenneth J. Goldman, William M. Shapiro Jan 1998

Application Development And Management In The Programmers' Playground, T. Paul Mccartney, E.F. Berkley Shands, Kenneth J. Goldman, William M. Shapiro

All Computer Science and Engineering Research

Application management refers to the process of making software applications available to end-users and providing automated mechanisms for launching and joining such applications. The Programmers' Playground is a computing environment for creating distributed applications from modular, reusable components. This paper discusses a set of tools that enable application developers to: (1) design and debug Playground distributed applications from existing "off-the-shelf" components using a visual configuration tool, (2) make new application components available on the Internet through a "launcher" service, and (3) make complete distributed applications available via a World Wide Web interface, enabling end-users to launch and join the applications …


On-Line Scheduling With Hard Deadlines, Sally A. Goldman, Jyoti Parwatikar, Subhash Suri Jan 1998

On-Line Scheduling With Hard Deadlines, Sally A. Goldman, Jyoti Parwatikar, Subhash Suri

All Computer Science and Engineering Research

We study non-preemptive, online admission control in the hard deadline model: each job must be either serviced prior to its deadline, or be rejected. Our setting consists of a single resource that services an online sequence of jobs; each job has a length indicating the length of time for which it needs the resource, and a delay indicating the maximum time it can wait for the service to be started. The goal is to maximize total resource utilization. The jobs are non-preemptive and exclusive, meaning once a job begins, it runs to completion, and at most one job can use …


Agnostic Learning Of Geometric Patterns, Sally A. Goldman, Stephen S. Kwek, Stephen D. Scott Jan 1998

Agnostic Learning Of Geometric Patterns, Sally A. Goldman, Stephen S. Kwek, Stephen D. Scott

All Computer Science and Engineering Research

Goldberg, Goldman, and Scott demonstrated how the problem of recognizing a landmark from a one-dimensional visual image can be mapped to that of learning a one-dimensional geometric pattern and gave a PAC algorithm to learn that class. In this paper, we present an efficient on-line agnostic learning algorithm for learning the class of constant-dimension geometric patterns. Our algorithm can tolerate both classification and attribute noise. By working in higher dimensional spaces we can represent more features from the visual image in the geometric pattern. Our mapping of the data to a geometric pattern, and hence our learning algorithm, is applicable …


Search And Tracking Algorithms For Rapidly Moving Mobiles, Amy L. Murphy, Gruia-Catalin Roman, George Varghese Jan 1998

Search And Tracking Algorithms For Rapidly Moving Mobiles, Amy L. Murphy, Gruia-Catalin Roman, George Varghese

All Computer Science and Engineering Research

With the advent of wireless technology and laptops, mobility is an important area of research. A fundamental problem in this area is the delivery of messages to a moving mobile. Current solutions work correctly only for slowly moving nodes that stay in one location long enough for tracking to stabilize. In this paper we consider the problem of message delivery to rapidly moving mobile units. With these algorithms, we introduce a new method for designing algorithms based on the paradigm of considering a mobile unit as a message, and adapting traditional message passing algorithms to mobility. Our first algorithm is …


An Interoperability Infrastructure For Developing Multidatabase Systems, Asuman Doğac, Gökhan Özhan, Ebru Kılıç, Fatma Özcan, Sena Nural, Sema Mancuhan, Cevdet Dengi, Pınar Köksal, Uğur Halıcı, Budak Arpınar, Cem Evrendilek, Vahid Sadjadi Jan 1998

An Interoperability Infrastructure For Developing Multidatabase Systems, Asuman Doğac, Gökhan Özhan, Ebru Kılıç, Fatma Özcan, Sena Nural, Sema Mancuhan, Cevdet Dengi, Pınar Köksal, Uğur Halıcı, Budak Arpınar, Cem Evrendilek, Vahid Sadjadi

Turkish Journal of Electrical Engineering and Computer Sciences

A multidatabase system (MDBS) allows the users to simultaneously access autonomous, heterogeneous databases using a single data model and a query language. This provides for achieving interoperability among heterogeneous, federated DBMSs. In this paper, we describe the interoperability infrastructure of a multidatabase system, namely METU Interoperable DBMS (MIND). The architecture of MIND is based on OMG distributed object management model. It is implemented on top of a CORBA compliant ORB, namely, ObjectBroker. The interface of the generic database object is defined in CORBA IDL and multiple implementations of this interface, one for each component DBMSs, namely, Oracle 7, Sybase, Adabas …


Object-Oriented Computer Simulations Of Physical Systems Using Dual Reciprocity Boundary Element Methodology, J. Friedrich Jan 1998

Object-Oriented Computer Simulations Of Physical Systems Using Dual Reciprocity Boundary Element Methodology, J. Friedrich

Turkish Journal of Electrical Engineering and Computer Sciences

Models of physical systems are essential in every engineering field. This work deals with computer simulations of physical systems that can be mathematically modelled by differential equations together with sufficient boundary conditions. The computer simulations are based on object-oriented technology and the dual reciprocity boundary element method which is a universal solution scheme for various types of partial differential equations (e.g. Laplace, Poisson, diffusion, convection-diffusion, and steady Navier-Stokes equation). This technique fulfills efficiency criteria like precision, robustness, versatility, programmability, user-friendliness, need of computational time and computer memory to a very high degree. This is demonstrated by three examples: Laplace's solution …


Performance Of Prefiltered Model-Based Frequency Estimators, Mustafa A. Altınkaya, Bülent Sankur, Emin Anarım Jan 1998

Performance Of Prefiltered Model-Based Frequency Estimators, Mustafa A. Altınkaya, Bülent Sankur, Emin Anarım

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, the performance improvement due to prefiltering of inputs in model-based frequency estimators is investigated based on simulation experiments. Initial estimates on the tone frequency locations, which are obtained via DFT peak picking type preanalysis, are used to design a prefilter to remove noise and interference. The simulations indicate that prefiltering can improve the accuracy of Pisarenko and AR frequency estimators and MUSIC and KT frequency estimators with low subspace order significantly. The SNR thresholds of model-based frequency estimators are lowered by prefiltering. Additionally, interesting trade-offs between prefiltering gain and the gain due to subspace noise filtering have …


Distribution System Planning Usign Mixed Integer Programming, Belgin Türkay Jan 1998

Distribution System Planning Usign Mixed Integer Programming, Belgin Türkay

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents an improved mathematical model to optimise the size and locations of substations and the network routing problem. The model was formulated to minimise the total cost of the network by determining the optima of the substation locations and power, the load transfers between the demand centers, the feeder routes and the load flow in the network subject to a set of constraints. The computational results of a devised sample problem indicate that the developed optimisation model and its code are adequate for computer aided planning of distribution systems.


Analysis Of Nonlinear Sustained Oscillations In Discrete Systems With Backlash And Resolution By Using A Discretization-Oriented Describing Function, M. De La Sen, A. Pena, J. Esnaola Jan 1998

Analysis Of Nonlinear Sustained Oscillations In Discrete Systems With Backlash And Resolution By Using A Discretization-Oriented Describing Function, M. De La Sen, A. Pena, J. Esnaola

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a discretization-oriented describing function is derived for nonlinear devices combining backlash and quantization (resolution) while being subject to discretization through a sampler and zero-order hold. Such a describing function is frequency-dependent so that the overall nonlinearity, which includes both resolution and backlash, is interpreted as possessing nonlinear inertia. That nonlinear inertia is generated by the sampling process, since it does not appear if the system is continuous. The presence of nonlinear sustained oscillations (limit cycles) is investigated through simulations.


Adaptive Shape From Shading, Ati̇lla Gülteki̇n, Muhi̇tti̇n Gökmen Jan 1998

Adaptive Shape From Shading, Ati̇lla Gülteki̇n, Muhi̇tti̇n Gökmen

Turkish Journal of Electrical Engineering and Computer Sciences

Extracting surface orientation and surface depth from one or more images is one of the classic problems in computer vision. Shape-from-shading (SFS) deals with the recovery of 3-D shape from a single shaded image. The shape is recovered by minimizing an energy functional involving constraints such as smoothness. In this constrained problem, although the smoothness constraint helps to stabilize the minimization process, it pushes the reconstruction toward a smooth surface. In this paper, we present a new adaptive shape-from-shading method which reduces this oversmoothing by controlling the smoothness spatially over the image space. In order to improve the quality of …


Analysis Of Images Of Cells With Neurites, Florence Cloppet, Georges Stamon Jan 1998

Analysis Of Images Of Cells With Neurites, Florence Cloppet, Georges Stamon

Turkish Journal of Electrical Engineering and Computer Sciences

This study is concerned with the segmentation of cytological images and extraction of cellular entities in order to provide quantitative data about the number of cells in culture (statistical tests, morphology, model of evolution, etc). This quantitative supply is useful in biology to evaluate the consequences of the application of active substances on morphological changes and cellular viability. It is related to the conception of a system dedicated to automatic analysis of cell images, in order to evaluate the effects of drugs on the morphology of neuronal cells. We use a cooperative region / contour segmentation, which gives closed polygonal …


Hierarchical Interconnection Network Architecture For Real-Time Systems, Bülent Örenci̇k Jan 1998

Hierarchical Interconnection Network Architecture For Real-Time Systems, Bülent Örenci̇k

Turkish Journal of Electrical Engineering and Computer Sciences

A hierarchical network suitable for interconnection of real-time client processes in a distributed multiprocessor environment is presented in this paper. A multi-layer {\it Communication Unit} (CU) prototype is developed for this purpose. This unit offers the client processes communication services for real-time operation. These services are structured in such a way that they do not depend on the characteristics of the communication medium. The basic hardware of the CU consists of a PC compatible card connected to the VME Bus. Client processes run on target cards (Motorola MVME-162) which are attached to the same bus. Target cards together with a …


Imaging Electrical Current Density Using Nuclear Magnetic Resonance, B. Murat Eyüpoğlu, Ravinder Reddy, John S. Leigh Jan 1998

Imaging Electrical Current Density Using Nuclear Magnetic Resonance, B. Murat Eyüpoğlu, Ravinder Reddy, John S. Leigh

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, images of nonuniform and uniform electric current density in conductor phantoms, which contain magnetic resonance active nuclei, are produced using Magnetic Resonance Imaging (MRI). A standard spin echo pulse sequence is used, with the addition of a bipolar current pulse. The flux density parallel to the main magnetic field, generated by the current pulse, is encoded in the phase of the complex MR image. The spatial distribution of magnetic flux density is extracted from the phase image. Current density is calculated using the magnetic flux density. This fairly recent technique is known as Magnetic Resonance Current Density …


Use Of The Magnetic Field Generated By The Internal Distribution Of Injected Currents For Electrical Impedance Tomography (Mr-Eit), Y. Zi̇ya İder, Özlem Bi̇rgül Jan 1998

Use Of The Magnetic Field Generated By The Internal Distribution Of Injected Currents For Electrical Impedance Tomography (Mr-Eit), Y. Zi̇ya İder, Özlem Bi̇rgül

Turkish Journal of Electrical Engineering and Computer Sciences

In two dimensional conventional Electrical Impedance Tomography (EIT), volume conductor is probed by means of injected currents, and peripheral voltage measurements are used as input to the reconstruction algorithm. The current that flows in the 2D object creates magnetic fields that are perpendicular to the plane of imaging. Such magnetic fields can be measured using magnetic resonance tomography. In this study, use of this magnetic field generated by the injected currents, for the purpose of reconstructing the conductivity distribution, is studied. Sensitivity matrix relating the magnetic field to the element conductivities is calculated using the Finite Element Method and Biot-Savart …


Fdtd Evaluation Of The Sar Distribution In A Human Head Near A Mobile Cellular Phone, Selçuk Paker, Levent Sevgi̇ Jan 1998

Fdtd Evaluation Of The Sar Distribution In A Human Head Near A Mobile Cellular Phone, Selçuk Paker, Levent Sevgi̇

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, Finite-Difference Time-Domain (FDTD) method is used to calculate the Specific Absorbtion Rate (SAR; defined as the power absorbed by unit mass of the tissue) distribution in a human head near a hand-held cellular phone. A three dimensional FDTD algorithm is built in cartesian coordinates. A discrete human head model, derived from a Nuclear Magnetic Resonance (NMR) image by semi-automatic algorithm, is located within FDTD volume together with a discrete hand-held receiver model. FDTD simulations are carried out for both european GSM (operating at 900MHz) and DECT (operating at 1.8GHz) systems with a quarter-wavelength antenna, mounted on top …


Functional Radionuclide Imaging Algorithm Based On The Appended Curve Deconvolution Technique And Its Use In The Diagnosis Of Renovascular Hypertension, İrfan Karagöz, Hi̇kmet Bayhan Jan 1998

Functional Radionuclide Imaging Algorithm Based On The Appended Curve Deconvolution Technique And Its Use In The Diagnosis Of Renovascular Hypertension, İrfan Karagöz, Hi̇kmet Bayhan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a new method called the pixel basis functional radionuclide imaging (PBFRI) algorithm based on the appended curve deconvolution technique, in order to be able to increase the medical diagnostic capability of a conventional gamma camera, is presented together with the clinical results. In the PBFRI method, retention function of each pixel is obtained from the renograms and cardiac curves generated by processing the filtered segments of the kidney and heart, using a special deconvolution method. The deconvolution operation is done by using the Fourier transform technique. High frequency artifacts presented by the Fourier transform are removed by …


Signal Injection With Perceptual Criteria, T. Engi̇n Tuncer Jan 1998

Signal Injection With Perceptual Criteria, T. Engi̇n Tuncer

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a novel method for increasing the coding performance and information transmission capacity is presented. This method is mainly based on perceptual modelling of input signal such as speech or audio. Presented approach may be seen as an alternative to transforms which dynamically change analysis window for better energy compaction. A perceptual model is established in order to obtain a global masking threshold in frequency below which sounds become inaudible. Certain criteria are developed for identifying the signal injection bands. A new multiband filter design method which is a generalization of windowing method is used to separate the …


A Parallel Pipelined Computer Architecture For Digital Signal Processing, Haluk Gümüşkaya, Bülent Örenci̇k Jan 1998

A Parallel Pipelined Computer Architecture For Digital Signal Processing, Haluk Gümüşkaya, Bülent Örenci̇k

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a parallel pipelined computer architecture and its six network configurations targeted for the implementation of a wide range of digital signal processing (DSP) algorithms described by both atomic and large grain data flow graphs. The proposed architecture is considered together with programmability, yielding a system solution that combines extensive concurrency with simple programming. It is an SSIMD (Skewed Single Instruction Multiple Data) or MIMD (Multiple Instruction Multiple Data) machine depending on the algorithms implemented and the programming methodologies. The concurrency that can be exploited by the algorithms using this Parallel pipelined architecture is both temporal and spatial …


Cardiac Passive Acoustic Localization: Cardiopal, Yildirim Bahadirlar, Hali̇l Özcan Gülçür Jan 1998

Cardiac Passive Acoustic Localization: Cardiopal, Yildirim Bahadirlar, Hali̇l Özcan Gülçür

Turkish Journal of Electrical Engineering and Computer Sciences

A novel non-invasive system is proposed as an adjunct diagnostic tool for cardiac disorders, which is based on processing of the heart sounds acquired using a specially designed 2-D passive acoustic array. In addition to the acoustic array, the system consists of a personal computer, specially developed instrumentation and interface hardware and an adaptive array processing scheme. A signal model is constructed in accordance with the basic assumptions made for very near-field low frequency sources. The multiple signal characterization (MUSIC) method together with the model is used for the localization of assumed point sources in the heart. Locations of the …