By Topic

IEE Proceedings - Computers and Digital Techniques

Issue 3 • Date May 1999

Filter Results

Displaying Results 1 - 6 of 6
  • Integrated approach for fault tolerance and digital signature in RSA

    Publication Year: 1999, Page(s):151 - 159
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (360 KB)

    Data security and fault tolerance are two important issues in modern communications. In most cases, they are studied and implemented separately. The author proposes an integrated approach for both fault tolerance and digital signature in the RSA implementation. It shares the same computations required by the hash function, which is the major part of the digital signature and error detections and c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytic modelling of locking protocols in database systems

    Publication Year: 1999, Page(s):161 - 167
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (360 KB)

    The consistency of the database for concurrent transaction processing in database systems is guaranteed by concurrency control protocols which are normally implemented by two phase locking. Queuing network models are used to study two important locking protocols namely, the static and dynamic two phase locking protocols. Using simple combinatorial arguments and elementary probability theory, an ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Encoding in Roth-Karp decomposition with application to two-output LUT architecture

    Publication Year: 1999, Page(s):131 - 138
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (460 KB)

    Roth-Karp decomposition is a classical functional decomposition technique; because it can decompose a node into a set of nodes with fewer numbers of fanins, it is one of the most popular techniques for look-up table (LUT)-based field-programmable gate array technology mapping. The compatible-class encoding problem in Roth-Karp decompositions is discussed in the paper. It is shown how to formulate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of BAG3 network architecture

    Publication Year: 1999, Page(s):139 - 150
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (592 KB)

    The architecture of a hierarchical network suitable for interconnection of real-time client processes in a distributed multiprocessor environment is presented in the paper. A three-layer communication unit (CU) prototype is developed to offer the client processes communication services for real-time operation. The basic hardware of the CU consists of a PC compatible card connected at the VME bus. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of failure recovery schemes for distributed shared-memory systems

    Publication Year: 1999, Page(s):125 - 130
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (336 KB)

    Checkpoint and rollback recovery is a technique used to minimise the loss of computation when failures occur. When a process rolls back and re-executes from the last checkpoint, the cost (loss) incurred by redoing the lost computation may be larger than that to execute the original computation. In addition to completion time delay, other performance metrics (e.g. user's satisfaction in real-time o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient algorithms for binary logarithmic conversion and addition

    Publication Year: 1999, Page(s):168 - 172
    Cited by:  Papers (9)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (272 KB)

    The logarithm number system is an attractive alternative to the conventional number systems when data needs to be manipulated at a very high rate over a wide range. The major problem is deriving logarithms and antilogarithms quickly and accurately enough to allow conversions to and from conventional number representations. Efficient algorithms that convert the conventional number representation to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.