By Topic

IEEE Micro

Issue 4 • Date Aug. 1988

Filter Results

Displaying Results 1 - 6 of 6
  • A fault-tolerant multiprocess controller for magnetic bearings

    Publication Year: 1988, Page(s):6 - 17
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    A fault-tolerant microprocessor system designed to provide digital control for an active magnetic bearing is described. This particular control problem demands significant processing power, is easily divided into relatively independent parallel tasks, and cannot tolerate controller failures. The overall system requirements and architecture are described, as is the design of the digital control mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An operating system for a fault-tolerant multiprocessor controller

    Publication Year: 1988, Page(s):18 - 29
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1275 KB)

    The development of an operating system that is a central component of a fault-tolerant multiprocessor is described. The operating system, while relatively simple and small, supports multitasking and multiprocessing, as well as both self-diagnostics and cross-diagnostics for fault detection. In the event of a fault, the system permits rapid reconfiguration in a manner that retains processing for th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software fault tolerance in architectures with hierarchical protection levels

    Publication Year: 1988, Page(s):30 - 43
    Cited by:  Papers (13)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1529 KB)

    The effect on software fault tolerance of hardware features such as hierarchical privilege levels (rings), the use of descriptors for memory protection, separated virtual address spaces, and ring crossings that enforce specific energy points is considered. A strategy that uses a separate programming layer, the recovery layer, to handle fault-tolerant aspects of process interactions is discussed. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance trade-offs for microprocessor cache memories

    Publication Year: 1988, Page(s):44 - 54
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1055 KB)

    Design trade-offs for integrated microprocessors caches are examined. A model of cache utilization is introduced to evaluate the effects on cache performance of varying the block size. By considering the overhead cost of sorting address tags and replacement information along with data, it is found that large block sizes lead to more cost-effective cache designs than predicted by previous studies. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical software: Plod

    Publication Year: 1988, Page(s):56 - 61
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    The authors present Plod (plotted solutions of ordinary differential equation), mathematical software Fortran package designed by integrating large systems of equations that are unstable with respect to initial conditions (stiff). It is intended for microcomputer users unfamiliar with programming techniques. The hardware needed to run Plod is described. Plod is designed to be used in two interacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tutorial on CRC computations

    Publication Year: 1988, Page(s):62 - 75
    Cited by:  Papers (103)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1229 KB)

    The theory of cyclic redundancy codes (CRS) is reviewed. Four software algorithms for performing CRC computations are described: table lookup, reduced table lookup, on-the-fly, and wordwise. They are compared in terms of their speeds and storage requirements.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Micro addresses users and designers of microprocessors and microprocessor systems, including managers, engineers, consultants, educators, and students involved with computers and peripherals, components and subassemblies, communications, instrumentation and control equipment, and guidance systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Erik R. Altman
School of Electrical and Computer Engineering
IBM T.J. Watson Research Center