Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Transactions on Computers

Issue 1 • Jan. 1985

Filter Results

Displaying Results 1 - 21 of 21
  • IEEE Transactions on Computers - Table of contents

    Publication Year: 1985, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (431 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1985, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Editor's Notice

    Publication Year: 1985, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Membership Application

    Publication Year: 1985, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Finite Precision Rational Arithmetic: Slash Number Systems

    Publication Year: 1985, Page(s):3 - 18
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4057 KB)

    Fraction number systems characterized by fixed-slash and floating-slash formats are specified. The structure of arithmetic over such systems is prescribed by the rounding obtained from "best rational approximation." Multitiered precision hierarchies of both the fixed-slash and floating-slash type are described and analyzed with regards to their support of both exact rational and approximate real c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Diagnosis in Distributed Systems

    Publication Year: 1985, Page(s):19 - 32
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3749 KB)

    This paper deals with computer system diagnosis that is performed by a system itself, rather than by an outside mechanism. The devices performing the diagnosis and the devices communicating diagnostic information are included in the system model and may be potentially faulty. This paper differs from previous work in several ways. A more general diagnostic model is used that permits analysis of a l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-Tolerant Multiprocessor Link and Bus Network Architectures

    Publication Year: 1985, Page(s):33 - 45
    Cited by:  Papers (63)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3327 KB)

    This paper presents a general class of regular networks which provide optimal (near-optimal) fault tolerance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Loop Topologies for Large Local Computer Networks

    Publication Year: 1985, Page(s):46 - 55
    Cited by:  Papers (75)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2906 KB)

    Single-loop networks tend to become unreliable when the number of nodes in the network becomes large. Reliability can be improved using double loops. In this paper a highly reliable and efficient double-loop network architecture is proposed and analyzed. This network is based on forward loop backward hop topology, with a loop in the forward direction connecting all the neighboring nodes, and a bac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Coherence Problem in a Multicache System

    Publication Year: 1985, Page(s):56 - 65
    Cited by:  Papers (29)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3350 KB)

    A coherence problem may occur in a multicache system as soon as data inconsistency exists in the private caches and the main memory. Without an effective solution to the coherence problem, the effectiveness of a multicache system will be inherently limited. The problem is closely examined in this paper and previous solutions, both centralized approaches and distributed approaches, are analyzed bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Optimal Systolic Arrays

    Publication Year: 1985, Page(s):66 - 77
    Cited by:  Papers (140)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3703 KB)

    Conventional design of systolic arrays is based on the mapping of an algorithm onto an interconnection of processing elements in a VLSI chip. This mapping is done in an ad hoc manner, and the resulting configuration usually represents a feasible but suboptimal design. In this paper, systolic arrays are characterized by three classes of parameters: the velocities of data flows, the spatial distribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boolean Integral Calculus for Digital Systems

    Publication Year: 1985, Page(s):78 - 81
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB)

    The concept of Boolean integration is introduced and developed. When the changes in a desired function are specified in terms of changes in its arguments, then ways of "integrating" (i.e., realizing) the function, if it exists, are presented. Boolean integral calculus has applications in design of logic circuits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decrypting a Class of Stream Ciphers Using Ciphertext Only

    Publication Year: 1985, Page(s):81 - 85
    Cited by:  Papers (132)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    Pseudonoise sequences generated by linear feedback shift registers [1] with some nonlinear combining function have been proposed [2]–[5] for cryptographic applications as running key generators in stream ciphers. In this correspondence it will be shown that the number of trials to break these ciphers can be significantly reduced by using correlation methods. By comparison of computer simulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Strategy and Technique for Macro-Based Circuits

    Publication Year: 1985, Page(s):85 - 90
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1237 KB)

    The increasing complexity of VLSI systems demands structured approaches to reduce both design time and test generation effort. PLA's and scan paths have both been widely reported to be efficient in this sense. This correspondence presents an easily testable structure and its related testing strategies. The circuits are assumed to be based on the interconnection of combinatorial macros, mostly impl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Multiple-Access Protocol for Data and Voice-Packet Over Local Area Networks

    Publication Year: 1985, Page(s):90 - 94
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB)

    This correspondence presents HYMAP, a hybrid multiple access protocol for local area networks. The protocol combines features of both CSMA/CD and a collision-free protocol. Control is transferred from one protocol to the other according to state information sensed on the channel. The performance of HYMAP is evaluated by computer simulation for both data and voice packets. It compares favorably to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test Procedure Optimization for Layered Protocol Implementations

    Publication Year: 1985, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB)

    This correspondence describes an algorithm for generating a set of test items and a test sequence which can be used at a minimal cost for testing protocol implementations for a layered protocol. "Set" and "weight" concepts are introduced and "test cost" is defined as the weighted sum of directed arcs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Self-Stabilizing Programs: The Fault-Tolerant Capability of Self-Checking Programs"

    Publication Year: 1985, Page(s):97 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    In the above correspondence,1 A. Mili aims "to introduce the theoretical basis for the design and validation of self-checking programs." A theoretically sound basis is indeed needed for designing and validating robust fault-tolerant programs, and we follow progress made in this area with great interest. To our disappointment, we found that the formalism presented in the above correspondence1<... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's Reply

    Publication Year: 1985, Page(s): 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB)

    Before I answer the questions of Drs. Best and Cristian, let me try to explain in a few words the idea of the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to Centennial Issue

    Publication Year: 1985, Page(s): 98
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE copyright form

    Publication Year: 1985, Page(s): 99
    Request permission for commercial reuse | PDF file iconPDF (256 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1985, Page(s): 99
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 1985, Page(s): 99
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org