Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 1 • Jan. 1992

Filter Results

Displaying Results 1 - 5 of 5
  • Biting the silver bullet: toward a brighter future for system development

    Publication Year: 1992, Page(s):8 - 20
    Cited by:  Papers (96)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1484 KB)

    The author responds to two discouraging position papers by F.B. Brooks, Jr. (see ibid., vol.20, no.4, p 10-19, 1987) and D.L. Parnas (see Commun. ACM, vol.28, no.12, p.1326-35, 1985) regarding the potential of software engineering. While agreeing with most of the specific points made in both papers, he illuminates the brighter side of the coin, emphasizing developments in the field that were too r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 3DP: a processor architecture for three-dimensional applications

    Publication Year: 1992, Page(s):25 - 36
    Cited by:  Papers (4)  |  Patents (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1195 KB)

    The 3DP (3-Dimensional Processor), a parallel-computing architecture that targets problems that have a 3-D numerical structure and require numerous calculations on 3-D vectors, is described. The 3DP architecture differs from traditional scalar architectures in that it operates directly on vectors. It differs from general parallel architectures in that it can solve problems that predict the behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication for distributed systems

    Publication Year: 1992, Page(s):39 - 52
    Cited by:  Papers (59)  |  Patents (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1465 KB)

    A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-performance logic programming with the Aquarius Prolog compiler

    Publication Year: 1992, Page(s):54 - 68
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1529 KB)

    Aquarius Prolog, a high performance compiler designed and built to test the hypothesis that Prolog can be implemented as efficiently as an imperative language by compiling the more powerful features of logic programming only where they are needed, and then only in the simplest form, is described. The authors begin with some background on logic programming and then discuss the Prolog language in mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel-processing techniques for automatic test pattern generation

    Publication Year: 1992, Page(s):71 - 84
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1425 KB)

    Some of the more widely used serial automatic test pattern generation (ATPG) algorithms and their stability for implementation on a parallel machine are discussed. The basic classes of parallel machines are examined to determine what characteristics they require of an algorithm if they are to implement it efficiently. Several techniques that have been used to parallelize ATPG are presented. They f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org