By Topic

Computers, IEEE Transactions on

Issue 1 • Date Jan 1988

Filter Results

Displaying Results 1 - 13 of 13
  • Distributed diagnosis and the system user

    Publication Year: 1988 , Page(s): 71 - 78
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (740 KB)  

    The problem of how a user incapable of performing tests can diagnose a system, given the results of the Kuhl and Reddy algorithm, (1980 [3 paper], 1981), is addressed. In particular, the authors provide optimal or near-optimal algorithms for this purpose under a variety of assumptions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A solution to a special case of the synchronization problem

    Publication Year: 1988 , Page(s): 123 - 125
    Cited by:  Papers (5)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (256 KB)  

    A synchronizer that exhibits an arbitrarily low failure rate and a short propagation delay for the special case of synchronizing a signal that is synchronous with some periodic signal is described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional description of connector-switch-attenuator networks

    Publication Year: 1988 , Page(s): 111 - 114
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (348 KB)  

    The switch-level abstraction of digital MOS circuits has been used primarily in simulators. In formal verification, a functional description must be first extracted from the switch network. It is shown here how the theory of characteristic functions can be applied to analyze such networks and to extract their functional description View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The reliability of single-error protected computer memories

    Publication Year: 1988 , Page(s): 114 - 119
    Cited by:  Papers (24)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (500 KB)  

    The lifetimes of computer memories which are protected with single-error-correcting-double-error-detecting (SEC-DED) codes are studies. The authors assume that there are five possible types of memory chip failure (single-cell, row, column, row-column and whole chip), and, after making a simplifying assumption (the Poisson assumption), have substantiated that experimentally. A simple closed-form ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partitioning problems in parallel, pipeline, and distributed computing

    Publication Year: 1988 , Page(s): 48 - 57
    Cited by:  Papers (83)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (948 KB)  

    The problem of optimally assigning the modules of a parallel program over the processors of a multiple-computer system is addressed. A sum-bottleneck path algorithm is developed that permits the efficient solution of many variants of this problem under some constraints on the structure of the partitions. In particular, the following problems are solved optimally for a single-host, multiple-satelli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A measure of guaranteed availability and its numerical evaluation

    Publication Year: 1988 , Page(s): 25 - 32
    Cited by:  Papers (25)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (652 KB)  

    A success (risk) measure of guaranteed availability is proposed. Using a genetic system model, the authors describe the measure and study the effects of the guaranteed level and the observation period on it. Furthermore, they introduce a numerical approach for continuous-time Markov chain models which allows component-level modeling, Coxian failure and repair distributions, time-dependent failure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FISHNET: a distributed architecture for high-performance local computer networks

    Publication Year: 1988 , Page(s): 119 - 123
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (452 KB)  

    FISHNET (facilities integrated in a shared habitat network) addresses the problem of effectively integrating a wide variety of computers, terminals, memory devices and computer peripherals in a local environment. High performance is achieved by effectively separating the high volume node-to-node data communications and the low-volume network control information. Data messages travel through point-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized layout of MOS cells

    Publication Year: 1988 , Page(s): 79 - 87
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (632 KB)  

    A design method using both logical optimization and optimized topological arrangements is described. Starting from a minimized Boolean function, a synthesis of an optimized well-structured network is obtained. The most original aspect of this approach is a transistor merging procedure leading to a nonseries-parallel network while maintaining a systematic layout. An extension to the synthesis of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multipipeline networking for compound vector processing

    Publication Year: 1988 , Page(s): 33 - 47
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1172 KB)  

    An efficient vector-processing technique is proposed; it is based on a novel concept of multipipeline networking, which is generalized from the techniques of pipeline chaining and systolization. The authors also present the design principles of pipeline nets and provide programming, compiling and run-time techniques for converting scientific programs into pipeline net implementations. Performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error secure/propagating concept and its application to the design of strongly fault-secure processors

    Publication Year: 1988 , Page(s): 14 - 24
    Cited by:  Papers (16)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (908 KB)  

    A concept of the error-secure and the error-propagating interfaces of the subsystems in a digital system is introduced, and shown to be useful for practical design and verification for a strongly fault-secure system which is known to achieve the totally self-checking (TSC) goal. A sufficient condition is shown for subsystem interfaces to meet for it to be possible to construct a strongly fault-sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput analysis of cache-based multiprocessors with multiple buses

    Publication Year: 1988 , Page(s): 58 - 70
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1048 KB)  

    The performance of cache-based multiprocessors for general-purpose computing and for multitasking is analyzed with simple throughput models. A private cache is associated with each processor, and multiple buses connect the processors to the shared, interleaved memory. Simple models based on dynamic instruction mix statistics are introduced to evaluate upper bounds on the throughput when independen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic learning automata solutions to the equipartitioning problem

    Publication Year: 1988 , Page(s): 2 - 13
    Cited by:  Papers (37)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (980 KB)  

    Three deterministic learning automata solutions to the problem of equipartitioning are presented. Although the first two are ε-optimal, they seem to be practically feasible only when a set of W objects is small. The last solution, which uses a novel learning automaton, demonstrates an excellent partitioning capability. Experimentally, this solution converges an order of magnitude fas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural yield optimization for WSI

    Publication Year: 1988 , Page(s): 88 - 110
    Cited by:  Papers (28)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1896 KB)  

    A novel methodology for investigating wafer-scale integration (WSI) designs is proposed. This methodology combines the results of work on integrated circuit yield modeling with a study of the effects of system architecture in large-area integrated circuit yield. This work provides a hierarchical framework in which computing structures may be analyzed to determine functionality on a wafer scale and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org