By Topic

IEE Proceedings E - Computers and Digital Techniques

Issue 3 • Date May 1991

Filter Results

Displaying Results 1 - 8 of 8
  • Simple but effective modification to a multiplicative congruential random-number generator

    Publication Year: 1991, Page(s):121 - 122
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (132 KB)

    A popular form of random-number generator uses the recurrence sk=(Ask-1 mod 2e) with A and sO odd to produce a pseudo-random sequence of integers in the range 0 to 2e-1. The authors give a simple modification which increases the guaranteed period by an enormous factor with only a small computational overhead. The recurrence is changed to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote password authentication with smart cards

    Publication Year: 1991, Page(s):165 - 168
    Cited by:  Papers (44)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (236 KB)

    A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of smart cards and the identity-based signature scheme introduced by Shamir (1984) are employed in this phase. Ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The fast Tamari transform

    Publication Year: 1991, Page(s):147 - 153
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (332 KB)

    The fast Tamari transform (FTT), which is suitable to obtain some properties of p-valued digital functions and networks (p being the power of a prime) is presented. A systematic procedure to calculate the FTT is defined, and an expression for the complexity of calculation, and flow-graphs and networks for the calculation of the FTT are also presented. All aspects are illustrated with several examp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fine grain mapping strategy for multiprocessor systems

    Publication Year: 1991, Page(s):109 - 120
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (840 KB)

    A fine grain mapping strategy for multiprocessor systems especially suitable for RISC and VLIW type MIMD computers is described. The objective of the strategy is to minimise the total execution time of the application algorithms that are to be executed on the target systems. An application algorithm which has been coded as a straight line program is compiled to generate intermediate codes. This co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On nonuniform packet switched delta networks and the hot-spot effect

    Publication Year: 1991, Page(s):123 - 130
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (540 KB)

    The author analyses the performance of a multistage interconnection network (MIN) with a packet-switching protocol, embedded in a closed network of processors. First, the expected value of transmission time through a delta-2 type of MIN is determined. A formula for its probability density function is obtained from which the variance and higher moments follow. Previously densities have only been es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient techniques in the sizing and constrained optimisation of CMOS combinational logic circuits

    Publication Year: 1991, Page(s):154 - 164
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (720 KB)

    Two techniques are proposed which enhance the optimisation efficiency of CMOS combinational logic circuits. One uses transition times (rise and fall times) of each gate as variables of the optimisation process. The other technique uses the optimal characteristic waveform synthesising method (OCWSM) to obtain the initial guess for the optimisation process. The optimisation process, with these two t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approach for the reconfiguration of multipipeline arrays

    Publication Year: 1991, Page(s):131 - 137
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (492 KB)

    A new approach for reconfiguring multipipeline arrays from two-dimensional arrays is analysed. The proposed reconfiguration approach is fully characterised and the conditions for switching and routing are given. A polynomial time complexity algorithm is proposed for the reconfiguration of multipipeline arrays. This algorithm is based on a novel divide-and-conquer technique; this technique is based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLSI implementation of Tausworthe random number generator for parallel processing environment

    Publication Year: 1991, Page(s):138 - 146
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (712 KB)

    A fast Tausworthe-type random number generator has been implemented as a VLSI circuit on silicon for Monte-Carlo simulation purposes in a parallel multiprocessor system environment. The generator, which has uniform distribution, has been constructed for use as a peripheral device to be connected with each processor unit. General considerations for parallel random number generation are discussed an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.