By Topic

Computer

Issue 2 • Date Feb. 1991

Filter Results

Displaying Results 1 - 6 of 6
  • Pseudorandom bit generators in stream-cipher cryptography

    Publication Year: 1991, Page(s):8 - 17
    Cited by:  Papers (38)  |  Patents (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Progress in the design and analysis of pseudorandom bit generators over the last decade is surveyed. Background information is provided, and the linear feedback shift registers that serve as building blocks for constructing the generators are examined. Three methods for attacking keystream generators are reviewed, and three techniques for designing them are considered, focusing on how they fail or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative evaluation of expert system tools

    Publication Year: 1991, Page(s):19 - 31
    Cited by:  Papers (29)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1396 KB)

    The results of an assessment of the functionality and performance of tools with different architectural approaches are presented. The goal was to gain insight into the advantages and disadvantages of the various architectures. The tools evaluated in the study were (1) the Automated Reasoning Tool for Information Management (ARTIM), (2) the C Language Integrated Production System (CLIPS), (3) the K... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paradigm: a highly scalable shared-memory multicomputer architecture

    Publication Year: 1991, Page(s):33 - 46
    Cited by:  Papers (27)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1614 KB)

    Paradigm (parallel distributed global memory), a shared-memory multicomputer architecture that is being developed to show that one can build a large-scale machine using high-performance microprocessors, is discussed. The Paradigm architecture allows a parallel application program to execute any of its tasks on any processor in the machine, with all the tasks in a single address space. The focus is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying and qualifying reusable software components

    Publication Year: 1991, Page(s):61 - 70
    Cited by:  Papers (104)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1022 KB)

    Identification and qualification of reusable software based on software models and metrics is explored. Software metrics provide a way to automate the extraction of reusable software components from existing systems, reducing the amount of code that experts must analyze. Also, models and metrics permit feedback and improvement to make the extraction process fit a variety of environments. Some case... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated voice-data communication over high-speed fiber optic networks

    Publication Year: 1991, Page(s):49 - 58
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB)

    Voice-data integration over emerging high-speed fiber-optic LANs and MANs employing unidirectional buses for information transfer is addressed. Packet voice characteristics and requirements are examined, as are the characteristics of fiber-optic networks. Both train-oriented and non-train-oriented protocols are discussed and compared.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards-ethics and the safety of computer systems

    Publication Year: 1991, Page(s):72 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The issue of responsibility for computer failures in critical systems is addressed, taking medical information systems as an example. Three basic modes of ethical analysis are defined and used to analyze the ethical questions raised for such systems. The first, called normative ethics, seeks to develop and justify rules for right conduct. The second, called the ethics of virtue, asks what kind of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com