By Topic

Computers, IEEE Transactions on

Issue 4 • Date April 1998

Filter Results

Displaying Results 1 - 12 of 12
  • Guest Editor's Introduction [The 17th IEEE International Conference of Distributed Computing Systems]

    Publication Year: 1998, Page(s):369 - 370
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Accuracy vs. precision in digital VLSI architectures for signal processing

    Publication Year: 1998, Page(s):472 - 477
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    The paper provides a sensitivity analysis to measure the loss in accuracy induced by perturbations affecting acyclic computational flows composed of linear convolutions and nonlinear functions. We do not assume a large number of coefficients or input independence for the convolution module, nor strict requirements on the nonlinear function. The analysis is tailored to digital VLSI implementations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput analysis of B-networks

    Publication Year: 1998, Page(s):482 - 485
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    In this paper, the throughput of B-networks is investigated. In the previous analysis by Lee and Yoon (1990), a systematic imbalance of internal link traffic was overlooked. By taking this into account, our analysis yields a more accurate prediction of the throughput of B-networks. The packet arrival rates at the links within the network are derived mathematically and solved using iterations. Thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining strong cache consistency in the World Wide Web

    Publication Year: 1998, Page(s):445 - 457
    Cited by:  Papers (61)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    As the Web continues to explode in size, caching becomes increasingly important. With caching comes the problem of cache consistency. Conventional wisdom holds that strong cache consistency is too expensive for the Web, and weak consistency methods, such as Time-To-Live (TTL), are most appropriate. This study compares three consistency approaches: adaptive TTL, polling-every-time and invalidation,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCm codes for constructing t-EC/AUED codes

    Publication Year: 1998, Page(s):492 - 495
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    A common method for constructing t-error correcting/all unidirectional error detecting (t-EC/AUED) codes is to append a tail to t-EC code, where the tail is a function of the weight of the codeword. Here, we present a method to reduce the weight distribution of t-EC codes by using a DCm(k+d, k) code as the input of t-EC code where a DCm(k+d, k) code is of length k+dnd 2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring and optimizing CORBA latency and scalability over high-speed networks

    Publication Year: 1998, Page(s):391 - 413
    Cited by:  Papers (40)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1784 KB)

    There is increasing demand to extend object-oriented middleware, such as OMG CORBA, to support applications with stringent quality of service (QoS) requirements. However, conventional CORBA Object Request Broker (ORE) implementations incur high latency and low scalability when used for performance-sensitive applications. These inefficiencies discourage developers from using CORBA for mission/life-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prioritized Petri net model and its application in distributed multimedia systems

    Publication Year: 1998, Page(s):477 - 481
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The achievement of media synchronization has been dealt with in the Object Composition Petri Net (OCPN) model and the extended OCPN (XOCPN) model. Yet these two models are not enough for synchronization of computers in a distributed environment. This paper proposes a new Petri Net model-Prioritized Petri Net (P-net). The modeling power and properties of P-nets are analyzed. We apply the P-net mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Salvaging test windows in BIST diagnostics

    Publication Year: 1998, Page(s):486 - 491
    Cited by:  Papers (9)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    This paper uses the STUMPS architecture to study the properties of a new diagnostic procedure. According to the old procedure, the process stops at the end of each test window to compare the measured signature against its precomputed value. The old procedure also calls for the abandonment of all future test windows after the first failing one is encountered. This is due to the unavailability of ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrency control and view notification algorithms for collaborative replicated objects

    Publication Year: 1998, Page(s):458 - 471
    Cited by:  Papers (11)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    This paper describes algorithms for implementing a high-level programming model for synchronous distributed groupware applications. In this model, several application data objects may be atomically updated, and these objects automatically maintain consistency with their replicas using an optimistic algorithm. Changes to these objects may be optimistically or pessimistically observed by view object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical, adaptive cache consistency in a page server OODBMS

    Publication Year: 1998, Page(s):427 - 444
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Due to its simplicity and communication efficiency, many client-server object-oriented database systems are based on the basic page server architecture-pages serve as their smallest unit of data transfer, client caching, and concurrency control. In an earlier paper, we showed how to extend this architecture to permit object-level callback locking, and we showed through simulations that significant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of connection rerouting on application performance in mobile networks

    Publication Year: 1998, Page(s):371 - 390
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with ubiquitous access to multimedia information in the near future. One of the key problems in building connection-oriented ATM networks that support host mobility is designing mechanisms for rerouting virtual circuits to mainta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Per-node multithreading and remote latency

    Publication Year: 1998, Page(s):414 - 426
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    This paper evaluates the use of per-node multithreading to hide remote memory and synchronization latencies in software DSMs. As with hardware systems, multithreading in software systems can be used to reduce the costs of remote requests by running other threads when the current thread blocks. We added multithreading to the CVM software DSM and evaluated its impact on the performance of a suite of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org