Scheduled Maintenance on August 31st, 2016:
IEEE Xplore will undergo system maintenance from 1:00 - 3:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

IEEE Transactions on Computers

Issue 2 • Date Feb. 2008

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Improving Quality of VoIP Streams over WiMax

    Publication Year: 2008, Page(s):145 - 156
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are being extended over wireless networks. Although some of the existing wireless technologies can support some low-bandwidth applications, the bandwidth demands of many multimedia applications exceed the capacity of these t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bipartite Modular Multiplication Method

    Publication Year: 2008, Page(s):157 - 164
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    This paper proposes a new modular multiplication method that uses Montgomery residues defined by a modulus M and a Montgomery radix R whose value is less than the modulus M. This condition enables the operand multiplier to be split into two parts that can be processed separately in parallel - increasing the calculation speed. The upper part of the split multiplier can be proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctly Rounded Multiplication by Arbitrary Precision Constants

    Publication Year: 2008, Page(s):165 - 174
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    We introduce an algorithm for multiplying a floating-point number x by a constant C that is not exactly representable in floating-point arithmetic. Our algorithm uses a multiplication and a fused multiply and add instruction. Such instructions are available in some modern processors such as the IBM Power PC and the Intel/HP Itanium. We give three methods for checking whether, for a given value of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Mask-Based Nanowire Decoders

    Publication Year: 2008, Page(s):175 - 187
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Stochastically assembled nanoscale architectures have the potential to achieve device densities 100 times greater than today's CMOS. A key challenge facing nanotechnologies is controlling parallel sets of nanowires (NWs), such as those in crossbars, using a moderate number of mesoscale wires. Three similar methods have been proposed to control NWs using a set of perpendicular mesoscale wires. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Availability-Aware Task Scheduling Strategy for Heterogeneous Systems

    Publication Year: 2008, Page(s):188 - 199
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    High availability is a key requirement in the design and development of heterogeneous systems where processors operate at different speeds and are not continuously available for computation. Most existing scheduling algorithms designed for heterogeneous systems do not factor in availability requirements imposed by multiclass applications. To remedy this shortcoming, we investigate in this paper th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elimination of Overhead Operations in Complex Loop Structures for Embedded Microprocessors

    Publication Year: 2008, Page(s):200 - 214
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    Looping operations impose a significant bottleneck in achieving better computational efficiency for embedded applications. In this paper, a novel zero-overhead loop controller (ZOLC) supporting arbitrary loop structures with multiple-entry and multiple-exit nodes is described and utilized to enhance embedded RISC processors. A graph formalism is introduced for representing the loop structure of ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Slack Management Technique for Real-Time Distributed Embedded Systems

    Publication Year: 2008, Page(s):215 - 230
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1101 KB) | HTML iconHTML

    This work presents a novel slack management technique, the service-rate-proportionate (SRP) slack distribution, for real-time distributed embedded systems to reduce energy consumption. The proposed SRP-based slack distribution technique has been considered with EDF and rate-based scheduling schemes that are most commonly used with embedded systems. A fault-tolerant mechanism has also been incorpor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Efficient Multihop Polling in Clusters of Two-Layered Heterogeneous Sensor Networks

    Publication Year: 2008, Page(s):231 - 245
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    In this paper, we study two-layered heterogeneous sensor networks where two types of nodes are deployed: the basic sensor nodes and the cluster head nodes. The basic sensor nodes are simple and have limited power supplies, whereas the cluster head nodes are much more powerful and have many more power supplies, which organize sensors around them into clusters. Such two-layered heterogeneous sensor ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking

    Publication Year: 2008, Page(s):246 - 260
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (943 KB) | HTML iconHTML

    As one of the fundamental issues in wireless sensor networks (WSNs), the sensor localization problem has recently received extensive attention. In this work, we investigate this problem from a novel perspective by treating it as a functional dual of target tracking. In traditional tracking problems, static location-aware sensors track and predict the position and/or velocity of a moving target. As... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks

    Publication Year: 2008, Page(s):261 - 273
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information assurance of the data fusion process is very important. A wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for Modeling a Class of Single Timing Faults in Communication Protocols

    Publication Year: 2008, Page(s):274 - 288
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    A set of graph augmentation algorithms is introduced to model a class of timing faults in timed-EFSM models. It is shown that the test sequences generated based on our models can detect 1 -clock and n-clock timing faults and incorrect timer setting faults in an implementation under test (IUT). It is proven that the size of the augmented graph resulting from our augmentation algorithms is on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TC Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org