Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Transactions on Computers

Issue 8 • Aug. 1978

Filter Results

Displaying Results 1 - 25 of 25
  • IEEE Transactions on Computers - Table of contents

    Publication Year: 1978, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (496 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1978, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (330 KB)
    Freely Available from IEEE
  • Realization of Boolean Expressions by Atomic Digraphs

    Publication Year: 1978, Page(s):681 - 688
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2199 KB)

    A theory relating certain labeled directed graphs and Boolean expressions over propositional variables is seen to have several interesting applcations in computer science, most notably to programming, compiling, and switching theory. The applications arise from the capability of realizing any Boolean expression by a member of the class of digraphs here considered, those we shall call "atomic." View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deductive Fault Simulation with Functional Blocks

    Publication Year: 1978, Page(s):689 - 695
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2418 KB)

    This paper presents a method of propagating the effects of faults through functional blocks using the deductive (fault list) technique. An extension of the method is shown to be effective for simulating internal faults in functional blocks. The techniques presented here have been used for implementing the functional simulation capability in the Logic Analysis for Maintenance Planning (LAMP) System... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Erasure and Error Decoding for Semiconductor Memories

    Publication Year: 1978, Page(s):696 - 705
    Cited by:  Papers (10)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2974 KB)

    In this paper we introduce and evaluate error correction methods which takes into account the special properties of failure modes in semiconductor memories. We assume that the memory faults are of the type stuck-to 1 or 0. Thus the fault, once it has occurred, is located to a specific position in a memory word. The position may be found and this fact makes it convenient to use erasure correction, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Working Set and Page Fault Frequency Paging Algorithms: A Performance Comparison

    Publication Year: 1978, Page(s):706 - 712
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2176 KB)

    Performance of a paged virtual memory computer system operating under working set (WS) and page fault frequency (PFF) paging algorithms is analyzed analytically. Performance sensitivity to program reference behavior and paging algorithm parameter is studied for the two paging algorithms. The results indicate that when performance with the two algorithms is compared, the WS algorithm is generally l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meet and Join Derivatives and Their Use in Switching Theory

    Publication Year: 1978, Page(s):713 - 720
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2138 KB)

    The theoretical concepts of meet and join derivatives and extended vector of Boolean functions are defined. These concepts give rise to new methods (using the Kronecker matrix product) for prime implicant and prime implicate extraction. An extensive comparison between meet and join derivatives and the consensus theory is made. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multifont Word Recognition System for Postal Address Reading

    Publication Year: 1978, Page(s):721 - 732
    Cited by:  Papers (21)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3475 KB)

    This paper describes the basic design principles of a multifont word recognition system developed for postal address reading. Of the three main subsystems, image preprocessing, single character recognition, and contextual postprocessing, the last two will be considered in detail. A multiple-channel/multiple-choice approach is taken in designing the overall system. The character images produced by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Functions for an Optical/Digital Processor

    Publication Year: 1978, Page(s):732 - 738
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5311 KB)

    The software and digital sections of a hybrid optical/digital processor are described with emphasis on the required operations, their realization, and the hierarchy of software and hardware used. Several applications of this interface are also included. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Texture Characterization and Texture-Based Image Partitioning Using Two-Dimensional Linear Estimation Techniques

    Publication Year: 1978, Page(s):739 - 745
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1084 KB)

    A new approach to texture characterization and texture-based image partitioning is presented. In this approach the gray level of each pixel of an image is estimated from a weighted sum of gray levels of its neighbor pixels. The weight coefficients are determined so that the mean square estimation error is minimized. The obtained two-dimensional estimator characterizes the texture of the sample and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Irrelevant Features in Pattern Recognition

    Publication Year: 1978, Page(s):746 - 749
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    The concept of irrelevant features in Bayesian models for pattern recognition is introduced, and its mathematical meaning is explained. A technique for computing the conditional probabilities of irrelevant features, if necessary, is described. The effect of irrelevant features on feature selection in sequential classification is discussed and illustrated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realization of Minimum Circuits with Two-Input Conservative Logic Elements

    Publication Year: 1978, Page(s):749 - 752
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB)

    This correspondence is concerned with the realization of logical functions by using two-input three-output conservative logic elements (CLE's) called IB. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Synthesizing Method for Large Parallel Counters with a Network of Smaller Ones

    Publication Year: 1978, Page(s):753 - 757
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB)

    This correspondence introduces an extended method of parallel counting which enables small parallel counters to generate larger ones. It is an extension of the Method of Carry Showers by Foster and Stockton to a (u,v)-counter network. A (u,v) counter is a small parallel counter with u inputs and v outputs, u = 2v− 1. It is shown that the counter delay is proportional to the log of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Fundamental Structure of Galois Switching Functions

    Publication Year: 1978, Page(s):757 - 762
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (705 KB)

    It is shown in this paper that the fundamental structure of Galois switching functions follows naturally from that of Boolean switching functions. An expanded formula for deriving multinomial Galois switching functions is provided with illustrations of its application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Implementation of a Two-Dimensional FIR Filter Using a Single Multiplier

    Publication Year: 1978, Page(s):762 - 764
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB)

    A general scheme for implementing a two-dimensional FIR filter using only one multiplier is outlined. The realization is based on sequentially multiplexing the multiplier inputs and is illustrated with the aid of a block diagram and the sequence of operations for a 3 x 3 filter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Multipliers for Number Theoretic Transforms

    Publication Year: 1978, Page(s):764 - 765
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB)

    When digital filters are implemented with number theoretic transforms (NTT's), the bulk of the computation usually corresponds to multiplications in residue arithmetic. We show that, with the most commonly used NTT's, multiplication can be speeded up at the expense of small additional storage requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some-Codes of Rahman and Blake for Computer Applications

    Publication Year: 1978, Page(s):765 - 767
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    By ordering the elements of GF(pn) lexicographically, rather than sequentially, the recently constructed codes of Rahman and Blake become attractive for ultra high-speed computer applications. The codes are based on supplementary difference sets. The whole procedure is illustrated in detail for the (75,50) double error correcting code. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Support for System Protection and Database Security

    Publication Year: 1978, Page(s):767 - 771
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1105 KB)

    A set of architectural extensions to a machine of the type of IBM System/370 is proposed. The proposal involves hardware/software interaction to constrain the execution-time behavior of application and higher authority programs. The extensions consist of new states of privilege, enforcement of disciplined transition between states, hardware distinction of information types, and a mechanism to cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Mean Accuracy of Hierarchical Classifiers

    Publication Year: 1978, Page(s):771 - 776
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB)

    A performance measure is derived for a multiclass hierarchical classifier under the assumption that a maximum likelihood rule is used at each node and the features at different nodes of the tree are class-conditionally statistically independent. The mean accuracy of an estimated hierarchical classifier is then defined as its performance averaged across all classification problems, when an estimate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Ellipses by a Modified Hough Transformation

    Publication Year: 1978, Page(s):777 - 781
    Cited by:  Papers (148)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1917 KB)

    The Hough transformation can detect straight lines in an edge-enhanced picture, however its extension to recover ellipses requires too long a computing time. This correspondence proposes a modified method which utilizes two properties of an ellipse in such a way that it iteratively searches for clusters in two different parameter spaces to find almost complete ellipses, then evaluates their parame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Universal Single Transition Time Asynchronous State Assignments

    Publication Year: 1978, Page(s):781 - 782
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB)

    One of two constructive procedures for universal single transition time (STT) state assignments presented in the paper [1] by Friedman et al. is not correct. A correct constructive procedure can be obtained by simply modifying the procedure of the literature with an additional restriction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions On Software Engineering

    Publication Year: 1978, Page(s): 782
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Advance Program Announcement

    Publication Year: 1978, Page(s): 782
    Request permission for commercial reuse | PDF file iconPDF (1299 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1978, Page(s): 782
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1978, Page(s): 782
    Request permission for commercial reuse | PDF file iconPDF (1434 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org