A Health Care Establishment (HCE) is an establishment where medical services are rendered. The above services are provided by the health care personnel. The infrastructure of a HCE may include Information Technology (...
详细信息
作者:
POND, LCLI, VOKCommunication Sciences
Electrical Engineering Systems University of Southern California Los Angeles CA 90089-2565 U.S.A. Lawrence C. Pond received the M.Sc. and Ph.D. degrees in electrical engineering from the University of Southern California in 1983 and 1990
respectively. Dr. Pond is currently a scientist at Hughes Space and Communications Company having joined in 1980. He has worked in the fields of communication system design mobile communication network and spacecraft payload design. He is currently working on the development of satellite-based ATM transport and switching architectures for BISDN and Defense Information System Network amlications. Dr. Pond is a member of IEEE. Victor O. K. Li was born in Hong Kong in 1954. He received his SB
SM and Sc.D. degrees in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology Cambridge Massachusetts in 1977 1979 and 1981 respectively. Since February 1981 he has been with the University of Southern California (USC) LOS Angeles California where he is Professor of Electrical Engineering and Director of the USC Communication Sciences Institute. He has published 150 technical papers and has lectured and consulted extensively around the world. His research interests include high-speed communication networks personal communication networks intelligent networks distributed databases queueing theory graph theory and applied probability. Dr. Li is very active in the Institute of Electrical and Electronic Engineers (IEEE) having been a member of the Computer Communications Technical Committee since 1983 and having served as Chairman from 1987–1989. He served as Chairman of the Los Angeles Chapter of the IEEE Information Theory Group from 1983–1985. He is the Steering Committee Chair of the International Conference on Computer Communications and Networks (IC3 N) General Chair of the 1st Annual IC3N held in San Diego California in June 1992 General Chair and Technical Program Chair of the 4th IEEE Workshop on Comp
In this, the second part of a two-part paper, the required time for establishing a mobile packet radio network using the virtual circuit and time division multiple access protocol developed in Part 1 is analysed. Tool...
详细信息
In this, the second part of a two-part paper, the required time for establishing a mobile packet radio network using the virtual circuit and time division multiple access protocol developed in Part 1 is analysed. Tools are developed to determine the virtual circuit and network set-up times in terms of the channel bandwidth allocated to establish and maintain the network. The tools are then extended to include the effects of user mobility. Then these results are combined with the network capacity results of Part 1 to analyse the trade-off between the data rate and set-up time of the network. Next a hierarchical architecture is proposed and the network data rate versus set-up time trade-off of this architecture is analysed using these tools. This architecture is shown to both provide a higher data rate and establish faster than flat networks of the same number of nodes.
The implementation of a distributed digital logic simulation algorithm on a network of workstations is presented. The simulation of digital circuits is done using a demand driven approach. The simulation is performed ...
详细信息
The implementation of a distributed digital logic simulation algorithm on a network of workstations is presented. The simulation of digital circuits is done using a demand driven approach. The simulation is performed ...
详细信息
The implementation of a distributed digital logic simulation algorithm on a network of workstations is presented. The simulation of digital circuits is done using a demand driven approach. The simulation is performed on a network of workstations using the Parallel Virtual Machine (PVM) software. The use of the PVM as a platform for parallel and distributed applications is assessed in the light of the test results. The feasibility of running parallel logical simulation algorithms on such platform is considered.< >
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management system...
详细信息
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management systems. These are examined in tum to give the reader an overview of the state-of-the-art in security management. The ISO OSI Reference Model is used as a basis to present the security threats, security services and mechanisms which have to be managed. Telecommunications management networks are used as an example of management applications which both provide management and require the provision of security and security management services. The OSI approach to network management is examined in detail. This is followed by a survey of the categories of OSI security management activities, and a discussion of the security management needs of various common security services. The need for security for network management systems is examined.
Contents and implementation of a computer laboratory for undergraduate electromagnetics are described. The laboratory consists of four 3-hour sessions covering vector calculus, Maxwell's equations (integral and di...
Contents and implementation of a computer laboratory for undergraduate electromagnetics are described. The laboratory consists of four 3-hour sessions covering vector calculus, Maxwell's equations (integral and differential forms), wave propagation in materials, and wave behavior at planar interfaces. Each session contains theory (in the Help file), animations (where relevant) and a quiz. The program runs on IBM compatible 486-based PCs in a Windows environment and uses the Borland C ++ 4.0 compiler.
This paper summarizes the key requirements for the system, presents an object‐oriented model of the heterogeneous networks, and gives a brief description of the main functional parts of the system. The model discusse...
This paper presents the Secure Environment for Information systems in Medicine (SEISMED) project which is funded by the Commission of the European Commzlnities (CEC) under the Advance Informatics in Medicine (AIM) pro...
详细信息
In the paper, dataflow architecture with multiple tokens is proposed. By supporting nodes with several inputs and more than two successors, with by-reference data access, the redundant synchronization is eliminated, w...
详细信息
暂无评论