By Topic

IEEE Transactions on Computers

Issue 7 • July 1986

Filter Results

Displaying Results 1 - 21 of 21
  • IEEE Transactions on Computers - Table of contents

    Publication Year: 1986, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (443 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1986, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Editor's Notice

    Publication Year: 1986, Page(s):581 - 582
    Request permission for commercial reuse | PDF file iconPDF (2637 KB)
    Freely Available from IEEE
  • Computer and Database Location in Distributed Computer Systems

    Publication Year: 1986, Page(s):583 - 590
    Cited by:  Papers (73)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2811 KB)

    Design of distributed computer systems is a complex task requiring solutions for several difficult problems. Location of computing resources and databases in a wide-area network is one of these problems which has not yet been solved satisfactorily. Solution of this problem involves determining number and size of computer facilities and their locations, configuring databases and allocating these da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite State Model and Compatibility Theory: New Analysis Tools for Permutation Networks

    Publication Year: 1986, Page(s):591 - 601
    Cited by:  Papers (40)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3254 KB)

    In this paper, we present a new model, finite permutation machine (FPM), to describe the permutation networks. A set of theorems are developed to capture the theory of operations for the permutation networks. Using this new framework, an interesting problem is attacked: are 2n − 1 passes of shuffle exchange necessary and sufficient to realize all permutations? where n = log2 N and N is the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pseudo-Boolean Logic Circuits

    Publication Year: 1986, Page(s):602 - 612
    Cited by:  Papers (30)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3084 KB)

    A new class of switch-level logic circuits intended for modeling digital MOS VLSI circuits is presented. These circuits, which are called pseudo-Boolean, are composed of a single (voltage) source, connectors, switches, attenuators, and wells. The latter two devices are digital versions of resistors and capacitors, respectively, and may assume an arbitrary but finite number of different sizes. Sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Study of the CRAY X-MP Memory System

    Publication Year: 1986, Page(s):613 - 622
    Cited by:  Papers (39)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3140 KB)

    One of the significant differences between the CRAY X-MP and its predecessor, the CRAY-1S, is a considerably increased memory bandwidth for vector operations. Up to three vector streams in each of the two processors may be active simultaneously. These streams contend for memory banks as well as data paths. All memory conflicts are resolved dynamically by the memory system. This paper describes a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Triple Modular Redundancy Technique Providing Multiple-Bit Error Protection Without Using Extra Redundancy

    Publication Year: 1986, Page(s):623 - 631
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2873 KB)

    A well-known technique for providing tolerance against single hardware component failures is triplication of the component, called triple modular redundancy (TMR). In this paper a component is taken to be a processor-memory configuration where the memory is organized in a bit-sliced way. If voting is performed bitwise in an orthodox TMR configuration consisting of three of these components, failur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processor Scheduling for Linearly Connected Parallel Processors

    Publication Year: 1986, Page(s):632 - 638
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2563 KB)

    A low-level parallel processor (LLPP) is one in which two or more machine-level operations are executed in parallel. This paper analyzes the use of linearly connected LLPP's for parallel evaluation of program fragments. A graph-theoretic model is presented which describes the communication constraints of linearly connected parallel processors. A tight, necessary condition for finding assignments o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Fault Isolation and Identification in t1/t1-Diagnosable Systems

    Publication Year: 1986, Page(s):639 - 643
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1083 KB)

    Consider a classical PMC system composed of n units [1] where it is assumed that at most t1 of these units are faulty. Such a system is said to be t1/t1-diagnosable [3] if, given any complete collection of test results, the set of faulty units can be isolated to within a set of at most t1 units. This paper exposes some new, important properties of general t1/t1-diagnosable systems to present an O(... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Redundancy and Masking Improve the Performance of Synchronizers?

    Publication Year: 1986, Page(s):643 - 646
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (731 KB)

    This paper considers the possibility of achieving improvements in the reliability of synchronizing an asynchronous signal, by exploiting redundancy and masking. Redundancy and masking techniques have been applied successfully to mask both permanent and transient hardware faults. However, it is shown in this paper that redundancy and masking techniques are ineffective against synchronization failur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Byte-Oriented Error-Correcting Codes for Semiconductor Memory Systems

    Publication Year: 1986, Page(s):646 - 648
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB)

    Byte-oriented error-correcting codes are useful in correcting and detecting errors in a memory system organized in multiple-bit-perchip fashion. This paper presents the construction of new single-byte error-correcting and double-byte error-detecting codes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex Integer to Complex Residue Encoding

    Publication Year: 1986, Page(s):648 - 650
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB)

    Recently, a new algebra for manipulating complex residue numbers was reported. Its advantage over traditional methods is a reduced complex multiplication budget. In this work a complex integer to complex residue encoder is developed for use with this new numbering system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Computation of the Maximum of the Sum of Two Sequences and Applications

    Publication Year: 1986, Page(s):651 - 653
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Computing max{a1+ b1, a2+ b2, ... ,an+ bn} trivially takes n additions. We show that if we are given the ranking for the a's and the b's separately, then an algorithm exists which will compute the maximum in ≅2n additions on the average. This can be generalized to yield an efficient algorithm to compute max{h(a1,b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pseudorandom Arrays for Built-In Tests

    Publication Year: 1986, Page(s):653 - 658
    Cited by:  Papers (29)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1206 KB)

    Parallel pseudorandom sequences for use in built-in test are discussed. The two-dimensional nature of these sequences-makes it natural to consider the resulting binary arrays. Some of the desired properties of such arrays are discussed, as well as some of the problems. Generators for such arrays are described. A conventional LFSR with parallel output is shown to be a poor choice for such a generat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testable Design of Single-Output Sequential Machines Using Checking Experiments

    Publication Year: 1986, Page(s):658 - 662
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1149 KB)

    The problem of testing sequential machines using checking experiments is investigated. A method of modifying sequential machines by adding a controllable input is presented. A procedure is given to construct checking experiments for the modified machine and it is shown that only one output observation is sufficient to determine whether the machine is fault free. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Permutations on Illiac IV-Type Networks

    Publication Year: 1986, Page(s):662 - 669
    Cited by:  Papers (22)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1798 KB)

    Performing permutations of data on SIMD computers efficiently is important for high-speed execution of parallel algorithms. In this correspondence we consider realizing permutations such as perfect shuffle, matrix transpose, bit-reversal, the class of bit-permute- complement (BPC), the class of Omega, and inverse Omega permutations on N = 2n processors with Illiac IV-type interconnection network, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Memory System for Image Processing

    Publication Year: 1986, Page(s):669 - 674
    Cited by:  Papers (24)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    Image processing operations require that an image or partial image be stored in a memory system that permits access to p × q, 1 × pq, and/or pq × 1 subarrays of an image array where p and q are design parameters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE copyright form

    Publication Year: 1986, Page(s): 675
    Request permission for commercial reuse | PDF file iconPDF (260 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1986, Page(s): 675
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 1986, Page(s): 675
    Request permission for commercial reuse | PDF file iconPDF (205 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org