Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185902
M. Weber, I. Andrisek, I. Pandzic
We present LiveMail, prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a snapshot of someone's face - a friend, famous person, themselves, even a pet - using the mobile phone's camera. After a quick manipulation on the phone, a 3D model of that face is created and can be animated simply by typing in some text. Speech and appropriate animation of the face are created by speech synthesis. Animations can be sent to others as short videos in MMS. They can be used as fun messages, greeting cards etc. The system is based on a client/server communication model. The clients are mobile devices or web clients so messages can be created, sent and received on the mobile phone or on a web page. The client has a user interface that allows the user to input a facial image and place a simple mask on it to mark the main features. The client then sends this data to the server that builds a personalized face model. The client also provides an interface that lets the user request the creation of animated messages using speech synthesis. The animations are created on the server. It is planned to have several versions of the client: Symbian, midlet-based, web-based, wap-based, etc. The server, Symbian client, midlet-based client and the web client have been implemented as prototypes. We present the system architecture and the experience gained building such a system.
{"title":"Mobile entertainment using personal avatars","authors":"M. Weber, I. Andrisek, I. Pandzic","doi":"10.1109/CONTEL.2005.185902","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185902","url":null,"abstract":"We present LiveMail, prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a snapshot of someone's face - a friend, famous person, themselves, even a pet - using the mobile phone's camera. After a quick manipulation on the phone, a 3D model of that face is created and can be animated simply by typing in some text. Speech and appropriate animation of the face are created by speech synthesis. Animations can be sent to others as short videos in MMS. They can be used as fun messages, greeting cards etc. The system is based on a client/server communication model. The clients are mobile devices or web clients so messages can be created, sent and received on the mobile phone or on a web page. The client has a user interface that allows the user to input a facial image and place a simple mask on it to mark the main features. The client then sends this data to the server that builds a personalized face model. The client also provides an interface that lets the user request the creation of animated messages using speech synthesis. The animations are created on the server. It is planned to have several versions of the client: Symbian, midlet-based, web-based, wap-based, etc. The server, Symbian client, midlet-based client and the web client have been implemented as prototypes. We present the system architecture and the experience gained building such a system.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185804
K. Valavanis
Heterogeneous system design, modeling and testing requires that concepts and ideas from the diverse disciplines of Distributed Artificial Intelligence, Multi Agent Systems and Generalized System Theory be brought together under a common framework. Multi layer, hybrid, open architectures need be designed to manage distributed objects, services and modules between system components and support overall system functionality. Issues that need be addressed include, among others, individual component control, component coordination and communication, as well as overall system functionality in the presence of communication failures. This presentation considers the case of heterogeneous teams of unmanned ground - aerial robots operating in uncertain / hostile environments. It discusses aspects of distributed system architecture; it addresses fundamental control and communication problems and recommended solutions to distributed task allocation using unmanned ground - aerial vehicles; it examines asset recruitment with and without communication failures. Experimental studies and demos related to demining applications and traffic monitoring and emergency response have been conducted and they will be discussed.
{"title":"Heterogeneous system challenges in control, coordination, and communication - a case study with unmanned ground - aerial vehicles","authors":"K. Valavanis","doi":"10.1109/CONTEL.2005.185804","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185804","url":null,"abstract":"Heterogeneous system design, modeling and testing requires that concepts and ideas from the diverse disciplines of Distributed Artificial Intelligence, Multi Agent Systems and Generalized System Theory be brought together under a common framework. Multi layer, hybrid, open architectures need be designed to manage distributed objects, services and modules between system components and support overall system functionality. Issues that need be addressed include, among others, individual component control, component coordination and communication, as well as overall system functionality in the presence of communication failures. This presentation considers the case of heterogeneous teams of unmanned ground - aerial robots operating in uncertain / hostile environments. It discusses aspects of distributed system architecture; it addresses fundamental control and communication problems and recommended solutions to distributed task allocation using unmanned ground - aerial vehicles; it examines asset recruitment with and without communication failures. Experimental studies and demos related to demining applications and traffic monitoring and emergency response have been conducted and they will be discussed.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185994
M. Negoita
Artificial Immune Systems (AIS) are sometimes still considered with an attitude of reserve by most practitioners in Computational Intelligence (CI), much more, some of them even considering this emergent computing paradigm to be in an infancy stage. Recently, however, a lot of basic models and algorithms based on components of the artificial immune-based systems have been developed and are used in a variety of applications. Further on, the focusing of Computational Intelligence on the emerging field of the AIS led to very effective hybrid intelligent systems of AIS with other CI paradigms. This tutorial will present why AIS are of interest, starting from the real- world of applications asking for a radical change of the information systems framework. The component-based framework is replaced with an agent- based one, where the system complexity requires that any agent be clearly featured by its autonomy. The AIS methods build adaptive large-scale multi- agent systems that are open to the environment, systems that are not at all fixed just after the design phase, but are real-time adaptive to unpredictable situations and malicious defects. The AIS perform the defence of a complex system against malicious defects achieving its survival strategy by extension of the concept of organization of multicellular organisms to the information systems. The main behavioural features of the AIS - as self-maintenance, distributed and adaptive computational systems - are defined and described in relation to the Immune System as an information system. A comparison of the AIS methodology with other Intelligent Technologies is another point of the tutorial. The overview of some actual AIS applications is made using a practical engineering design strategy that views AIS as very effective software with agent-based architecture.
{"title":"Artificial immune systems - a new emerging technology of computational intelligence - implications on development of the autonomous intelligent systems, data mining and other hybrid intelligent systems","authors":"M. Negoita","doi":"10.1109/CONTEL.2005.185994","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185994","url":null,"abstract":"Artificial Immune Systems (AIS) are sometimes still considered with an attitude of reserve by most practitioners in Computational Intelligence (CI), much more, some of them even considering this emergent computing paradigm to be in an infancy stage. Recently, however, a lot of basic models and algorithms based on components of the artificial immune-based systems have been developed and are used in a variety of applications. Further on, the focusing of Computational Intelligence on the emerging field of the AIS led to very effective hybrid intelligent systems of AIS with other CI paradigms. This tutorial will present why AIS are of interest, starting from the real- world of applications asking for a radical change of the information systems framework. The component-based framework is replaced with an agent- based one, where the system complexity requires that any agent be clearly featured by its autonomy. The AIS methods build adaptive large-scale multi- agent systems that are open to the environment, systems that are not at all fixed just after the design phase, but are real-time adaptive to unpredictable situations and malicious defects. The AIS perform the defence of a complex system against malicious defects achieving its survival strategy by extension of the concept of organization of multicellular organisms to the information systems. The main behavioural features of the AIS - as self-maintenance, distributed and adaptive computational systems - are defined and described in relation to the Immune System as an information system. A comparison of the AIS methodology with other Intelligent Technologies is another point of the tutorial. The overview of some actual AIS applications is made using a practical engineering design strategy that views AIS as very effective software with agent-based architecture.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185875
M. Banek, Z. Skocir, B. Vrdoljak
Data warehouse is a database that collects and integrates data from heterogeneous sources in order to support a decision making process. Data exchanged over the Internet and intranets has recently become an important data source, having XML as a standard format for exchange. The possibility of integrating available XML data into data warehouses plays an important role in providing enterprise managers with up-to-date and relevant information about their business domain. We have developed a methodology for data warehouse design from the source XML Schemas and conforming XML documents. As XML data is semi-structured, data warehouse design from XML brings many particular challenges. In this paper the final steps of deriving a conceptual multidimensional scheme are described, followed by the logical design, where a set of tables is created according to the derived conceptual scheme. A prototype tool has been developed to test and verify the proposed methodology. Data warehousing system is a set of technologies and tools that enable decision-makers (managers and analysts) to acquire, integrate and flexibly analyze information coming from different sources. The central part of the system is a large database specialized for complex analysis of historical data, called a data warehouse. The process of building a data warehousing system includes analysis of the data sources, design of a warehouse model that can successfully integrate them and later the construction of the warehouse according to the proposed model. Decision-makers use OLAP (OnLine Analytical Processing) tools to put queries against the warehouse in a quick, intuitive and interactive way. OLAP tools use the multidimensional data model, which enables focusing on small pieces of data, generally a few numerical parameters, that are most interesting for the decision making process. Other data in the warehouse are organized hierarchically into several independent groups, called dimensions, and used to perform calculations with the few important parameters. Data warehouses, owned by big enterprises and organizations, integrate data from heterogeneous sources: relational databases or other legacy database models, semi-structured data and different file formats. Recently, the World Wide Web, Web services and different information systems for exchanging data over the Internet and private networks have become an important data source.
{"title":"Logical design of data warehouses from XML","authors":"M. Banek, Z. Skocir, B. Vrdoljak","doi":"10.1109/CONTEL.2005.185875","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185875","url":null,"abstract":"Data warehouse is a database that collects and integrates data from heterogeneous sources in order to support a decision making process. Data exchanged over the Internet and intranets has recently become an important data source, having XML as a standard format for exchange. The possibility of integrating available XML data into data warehouses plays an important role in providing enterprise managers with up-to-date and relevant information about their business domain. We have developed a methodology for data warehouse design from the source XML Schemas and conforming XML documents. As XML data is semi-structured, data warehouse design from XML brings many particular challenges. In this paper the final steps of deriving a conceptual multidimensional scheme are described, followed by the logical design, where a set of tables is created according to the derived conceptual scheme. A prototype tool has been developed to test and verify the proposed methodology. Data warehousing system is a set of technologies and tools that enable decision-makers (managers and analysts) to acquire, integrate and flexibly analyze information coming from different sources. The central part of the system is a large database specialized for complex analysis of historical data, called a data warehouse. The process of building a data warehousing system includes analysis of the data sources, design of a warehouse model that can successfully integrate them and later the construction of the warehouse according to the proposed model. Decision-makers use OLAP (OnLine Analytical Processing) tools to put queries against the warehouse in a quick, intuitive and interactive way. OLAP tools use the multidimensional data model, which enables focusing on small pieces of data, generally a few numerical parameters, that are most interesting for the decision making process. Other data in the warehouse are organized hierarchically into several independent groups, called dimensions, and used to perform calculations with the few important parameters. Data warehouses, owned by big enterprises and organizations, integrate data from heterogeneous sources: relational databases or other legacy database models, semi-structured data and different file formats. Recently, the World Wide Web, Web services and different information systems for exchanging data over the Internet and private networks have become an important data source.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185973
B. Vlaovič, A. Vreže, Z. Brezočnik, T. Kapus
This paper presents our research in the do- main of mechanical extraction of a model from an SDL (Specification and Description Language) specification of a system. We use formal verification tool Spin (Simple Promela Interpreter) and Promela (Process Meta-Language) language for the description of the model. With the model checking technique the model's accordance with the system correctness requirements can be established with mathema- tical accuracy. The model can be generated manually or mechanically. If it is to be prepared manually, we will need an expert with the detailed knowledge of the system and both languages. The quality of the model is directly influenced by the expert. The process is prone to the incorrect modelling of the system's properties. In this paper we present the most critical parts of mechanical creation of the models in Promela. Additionally, we present challenges, research directions and some solutions for the automatic generation of models from an SDL specification.
{"title":"Toward automatic generation of promela models from SDL specification","authors":"B. Vlaovič, A. Vreže, Z. Brezočnik, T. Kapus","doi":"10.1109/CONTEL.2005.185973","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185973","url":null,"abstract":"This paper presents our research in the do- main of mechanical extraction of a model from an SDL (Specification and Description Language) specification of a system. We use formal verification tool Spin (Simple Promela Interpreter) and Promela (Process Meta-Language) language for the description of the model. With the model checking technique the model's accordance with the system correctness requirements can be established with mathema- tical accuracy. The model can be generated manually or mechanically. If it is to be prepared manually, we will need an expert with the detailed knowledge of the system and both languages. The quality of the model is directly influenced by the expert. The process is prone to the incorrect modelling of the system's properties. In this paper we present the most critical parts of mechanical creation of the models in Promela. Additionally, we present challenges, research directions and some solutions for the automatic generation of models from an SDL specification.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185828
R. Bults, K. Wac, Halteren van Aart, V. Nicola, D. Konstantas
The introduction of third generation (3G) public wireless network infrastructures, such as the Universal Mobile Telecommunications System (UMTS), enable the development of innovative mobile services. For example, deploying m-health services which embed tele-monitoring and tele-treatment services become feasible with the role-out of 3G networks. These services allow healthcare professionals to monitor a mobile patient’s vital signs and provide feedback to this patient anywhere and any time. The performance of m-health services perceived by endusers depends on the serviceableness of 3G networks to support these services. Hence, the performance of 3G networks is a critical factor for successful development of m-health services. In this paper, we present a methodology for measurements-based performance assessment of 3G networks that aim to support m-health services. This methodology has been applied to evaluate end-user perceived service performance, in relation to the performance (i.e. serviceableness) of a 3G network. In addition, we analyse the measurements with the purpose to improve the end-to-end delay characteristics of the telemonitoring service as well as optimize the (derived) goodput behaviour of this 3G network. Our results show that the goodput behaviour is asymmetric and depends on a bearer assignment policy of the network. Based on our results we provide guidelines for the design of application protocols for m-health services and how these protocols deal with the changing performance behaviour of 3G networks.
{"title":"Goodput analysis of 3G wireless networks supporting m-health services","authors":"R. Bults, K. Wac, Halteren van Aart, V. Nicola, D. Konstantas","doi":"10.1109/CONTEL.2005.185828","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185828","url":null,"abstract":"The introduction of third generation (3G) public wireless network infrastructures, such as the Universal Mobile Telecommunications System (UMTS), enable the development of innovative mobile services. For example, deploying m-health services which embed tele-monitoring and tele-treatment services become feasible with the role-out of 3G networks. These services allow healthcare professionals to monitor a mobile patient’s vital signs and provide feedback to this patient anywhere and any time. The performance of m-health services perceived by endusers depends on the serviceableness of 3G networks to support these services. Hence, the performance of 3G networks is a critical factor for successful development of m-health services. In this paper, we present a methodology for measurements-based performance assessment of 3G networks that aim to support m-health services. This methodology has been applied to evaluate end-user perceived service performance, in relation to the performance (i.e. serviceableness) of a 3G network. In addition, we analyse the measurements with the purpose to improve the end-to-end delay characteristics of the telemonitoring service as well as optimize the (derived) goodput behaviour of this 3G network. Our results show that the goodput behaviour is asymmetric and depends on a bearer assignment policy of the network. Based on our results we provide guidelines for the design of application protocols for m-health services and how these protocols deal with the changing performance behaviour of 3G networks.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"64 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122894116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185940
Y. Khlifi, A. Lazzez, S. Guemara El Fatmi, N. Boudriga
Among the promising solutions for next generation Internet backbone, one can consider the optical packet and burst switching technologies. These technologies do not provide, however, suitable contention resolution and QoS support. We propose in this paper a novel node architecture allowing better QoS provision for packet and burst switching and allowing a prioritized buffering technique for contention resolution. We also develop a theoretical model for evaluating its performance based on a new conservation law and a queuing network model to help an efficient mathematical analysis. Finally, a simulation activity is performed to validate the proposed schemes.
{"title":"Optical packet and burst switching node architecture: modeling and performance analysis","authors":"Y. Khlifi, A. Lazzez, S. Guemara El Fatmi, N. Boudriga","doi":"10.1109/CONTEL.2005.185940","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185940","url":null,"abstract":"Among the promising solutions for next generation Internet backbone, one can consider the optical packet and burst switching technologies. These technologies do not provide, however, suitable contention resolution and QoS support. We propose in this paper a novel node architecture allowing better QoS provision for packet and burst switching and allowing a prioritized buffering technique for contention resolution. We also develop a theoretical model for evaluating its performance based on a new conservation law and a queuing network model to help an efficient mathematical analysis. Finally, a simulation activity is performed to validate the proposed schemes.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132732405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185829
L. Hribar, D. Burić, A. Bulic
Architecture of the next generation telecommunication network is based on the separation of functionality into independent layers: control layer, a connectivity layer and an application layer. BICC and other Call Control Protocols share the resources in the connectivity layer. The connectivity layer handles the transport and manipulation of user and control data and comprises transport backbone elements and Media Gateways. Media Gateways have been introduced to provide bearer control function and media mapping/switching functions. Resource reservation for Bearer Independent Call Control protocol has most important role in the call set-up. The paper gives a detailed overview of bearer set-up procedures in ATM and IP networks based on BICC ITU-T recommendations.
{"title":"Network resource reservation in the next generation networks using BICC as a call control protocol","authors":"L. Hribar, D. Burić, A. Bulic","doi":"10.1109/CONTEL.2005.185829","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185829","url":null,"abstract":"Architecture of the next generation telecommunication network is based on the separation of functionality into independent layers: control layer, a connectivity layer and an application layer. BICC and other Call Control Protocols share the resources in the connectivity layer. The connectivity layer handles the transport and manipulation of user and control data and comprises transport backbone elements and Media Gateways. Media Gateways have been introduced to provide bearer control function and media mapping/switching functions. Resource reservation for Bearer Independent Call Control protocol has most important role in the call set-up. The paper gives a detailed overview of bearer set-up procedures in ATM and IP networks based on BICC ITU-T recommendations.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185929
S. Golubić
Now days, the achieving the high software product quality is the most important issue in the software engineering. The software quality improvement has become the most important goal. The problem is that term quality is still interpreted and understood in many different ways in the whole software industry and as well in telecomm world. There is not clear recipe how to produce the high quality product. It is generally accepted that product quality could be improved through improvement of development process. There are parallel researches in universities projects and attempts in software companies to find out and implement the best solutions. The companies are striving for the operational excellence to satisfy customer needs. In this paper one model for achieving this goal is proposed based on ETK's experiences and the research results.
{"title":"Influence of software development process capability on product quality","authors":"S. Golubić","doi":"10.1109/CONTEL.2005.185929","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185929","url":null,"abstract":"Now days, the achieving the high software product quality is the most important issue in the software engineering. The software quality improvement has become the most important goal. The problem is that term quality is still interpreted and understood in many different ways in the whole software industry and as well in telecomm world. There is not clear recipe how to produce the high quality product. It is generally accepted that product quality could be improved through improvement of development process. There are parallel researches in universities projects and attempts in software companies to find out and implement the best solutions. The companies are striving for the operational excellence to satisfy customer needs. In this paper one model for achieving this goal is proposed based on ETK's experiences and the research results.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185939
G. Basharin, E. A. Savochkin
We present an approximate analytical method to calculate the blocking probabilities of a linear fragment in wavelength routed networks with multiclass unicast and multicast calls. A mathematical model accounting for multiclass unicast and multicast calls is introduced. It is shown that the Markov process describing the functioning of a linear fragment is not time-reversible. For the special case of a two-hop linear fragment, we show that it is possible to approximate its functioning by a Markov process defined over the same state space, but with slightly modified transition rates. The constructed Markov process is shown to have a product-form solution for equilibrium distribution
{"title":"Calculating blocking probabilities in linear fragment of wavelength routed networks with multiclass unicast and multicast calls","authors":"G. Basharin, E. A. Savochkin","doi":"10.1109/CONTEL.2005.185939","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185939","url":null,"abstract":"We present an approximate analytical method to calculate the blocking probabilities of a linear fragment in wavelength routed networks with multiclass unicast and multicast calls. A mathematical model accounting for multiclass unicast and multicast calls is introduced. It is shown that the Markov process describing the functioning of a linear fragment is not time-reversible. For the special case of a two-hop linear fragment, we show that it is possible to approximate its functioning by a Markov process defined over the same state space, but with slightly modified transition rates. The constructed Markov process is shown to have a product-form solution for equilibrium distribution","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}