By Topic

IEEE Micro

Issue 3 • Date May-June 2004

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (880 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • EIC's Message: General-purpose versus application-specific processors

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (59 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collecting patent infringement damages on unpatented products

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    The Federal Circuit - the federal appellate court that handles all patent appeals - has increasingly awarded patent owners damages based on profits that they might have made on products that their patents do not cover. Initially, the idea was that sometimes a patent "convoys" sales of related products. The recent Micro Chemical case- Micro Chemical, Inc. v. Lextron, Inc.-involved the application o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editor's Introduction: Application-Specific Processors

    Publication Year: 2004, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (284 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cost-sensitive partitioning in an architecture synthesis system for multicluster processors

    Publication Year: 2004, Page(s):10 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Application-specific instruction processors (ASIPs) have great potential to meet the challenging demands of pervasive systems. This hierarchical system automatically designs highly customized multicluster processors. In the first of two tightly coupled components, design space exploration heuristically searches the basic capabilities that define the processor's overall parallelism. In the second, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming binary code for low-power embedded processors

    Publication Year: 2004, Page(s):21 - 33
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Two program code transformation methodologies reduce the power consumption of instruction communication buses in embedded processors. Aimed at deep-submicron process technologies, these techniques offer an efficient solution for applications in which low power consumption is the key quality factor. We have developed two techniques for power minimization on the instruction bus of embedded processor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-throughput programmable cryptocoprocessor

    Publication Year: 2004, Page(s):34 - 45
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    High-speed Internet protocol security (IPsec) applications require high throughput and flexible security engines. A loosely coupled cryptocoprocessor based on the advanced encryption standard combines high throughput with programmability. using domain-specific instructions and design principles such as control hierarchy and block pipelining, the security engine supports Internet protocol security ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel processor architecture with exact tag-free pointers

    Publication Year: 2004, Page(s):46 - 55
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Along with the success of Java, garbage collection advances to embedded and real-time systems. In this paper a novel RISC processor architecture that lays the foundation for efficient real-time garbage collection in hardware and guarantees pointer integrity at the machine-code level is proposed. This article summarizes the most commonly used garbage collection methods and points out problems of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multilevel computing architecture for embedded multimedia applications

    Publication Year: 2004, Page(s):56 - 66
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    We have designed a new architecture that simplifies integration of heterogeneous IP for multimedia and streaming applications. The multilevel computing architecture (MLCA) is a template architecture featuring multiple processing units. This template architecture for SOC systems uses superscalar techniques to exploit task-level parallelism among different processing units. It supports a natural pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imitation happens [micro economics]

    Publication Year: 2004, Page(s):67 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    Imitation happens. Sometimes it is obvious when it happens, such as the resemblance of Internet Explorer 1.0 to Netscape Navigator 1.0. Sometimes it is vaguely in the details, such as the resemblance of the trash can in Windows to the same symbol in the Macintosh OS. A common perception is that there is more competitive imitation today than in the past. Is there truth to this perception? To unders... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back to the future

    Publication Year: 2004, Page(s):70 - 71
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Micro News

    Publication Year: 2004, Page(s): 72
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Micro addresses users and designers of microprocessors and microprocessor systems, including managers, engineers, consultants, educators, and students involved with computers and peripherals, components and subassemblies, communications, instrumentation and control equipment, and guidance systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Erik R. Altman
School of Electrical and Computer Engineering
IBM T.J. Watson Research Center