IEEE Transactions on Computers

Issue 10 • Oct. 2008

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction to the Special Section on Programming Architectures for Embedded Systems

    Publication Year: 2008, Page(s):1297 - 1299
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • Implementing Synchronous Models on Loosely Time Triggered Architectures

    Publication Year: 2008, Page(s):1300 - 1314
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (843 KB) | HTML iconHTML

    Synchronous systems offer a clean semantics and an easy verification path at the expense of often inefficient implementations. Capturing design specifications as synchronous models and then implementing the specifications in a less restrictive platform allow to address a much larger design space. The key issue in this approach is maintaining semantic equivalence between the synchronous model and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Algebra of Connectors—Structuring Interaction in BIP

    Publication Year: 2008, Page(s):1315 - 1330
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1397 KB) | HTML iconHTML

    We provide an algebraic formalization of connectors in the BIP component framework. A connector relates a set of typed ports. Types are used to describe different modes of synchronization: rendezvous and broadcast, in particular. Connectors on a set of ports P are modeled as terms of the algebra AC(P), generated from P by using a binary fusion operator and a unary typing operator. Typing associate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput-Buffering Trade-Off Exploration for Cyclo-Static and Synchronous Dataflow Graphs

    Publication Year: 2008, Page(s):1331 - 1345
    Cited by:  Papers (51)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1768 KB) | HTML iconHTML

    Multimedia applications usually have throughput constraints. An implementation must meet these constraints, while it minimizes resource usage and energy consumption. The compute intensive kernels of these applications are often specified as Cyclo-Static or Synchronous Dataflow Graphs. Communication between nodes in these graphs requires storage space which influences throughput. We present an exac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Tractable and Fast Method for Monitoring SystemC TLM Specifications

    Publication Year: 2008, Page(s):1346 - 1356
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1471 KB) | HTML iconHTML

    The TLM modeling level of the SystemC language emphasizes the transactions in a complex system, considered at a very high level of abstraction. This level of specification considerably improves simulation performance and is therefore increasingly being adopted. We address assertion-based verification (ABV) of TLM SystemC models. We propose a framework for supervising during simulation the verifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Development Approach to Mapping UML State Diagrams to Synthesizable VHDL

    Publication Year: 2008, Page(s):1357 - 1371
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3148 KB) | HTML iconHTML

    With the continuing rise in the complexity of embedded systems, there is an emerging need for a higher level modelling environment that facilitates efficient handling of this complexity. The aim here is to produce such a high level environment using Model Driven Development (MDD) techniques that maps a high level abstract description of an electronic embedded system into its low level implementati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cache Noise Prediction

    Publication Year: 2008, Page(s):1372 - 1386
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7494 KB) | HTML iconHTML

    Caches are very inefficiently utilized because not all the excess data brought into the cache, to exploit spatial locality, is utilized. Our experiments showed that Level 1 data cache has a utilization of only about 57%. Increasing the efficiency of the cache (by increasing its utilization) can have significant benefits in terms of reducing the cache energy consumption, reducing the bandwidt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MICRO: A Multilevel Caching-Based Reconstruction Optimization for Mobile Storage Systems

    Publication Year: 2008, Page(s):1386 - 1398
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4291 KB) | HTML iconHTML

    High performance, highly reliable, and energy-efficient storage systems are essential for mobile data-intensive applications such as remote surgery and mobile data center. Compared with conventional stationary storage systems, mobile disk-array-based storage systems are more prone to disk failures due to their severe application environments. Further, they have very limited power supply. Therefore... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computing Resource Management Framework for Software-Defined Radios

    Publication Year: 2008, Page(s):1399 - 1412
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5066 KB) | HTML iconHTML

    Software-defined radio (SDR) is an emerging concept that leverages the design of software-defined and hardware-independent signal processing chains for radio communication. It introduces flexibility to wireless systems, facilitating the dynamic switch from one radio access technology to another or, in other words, the de- and reallocation of computing resources from one SDR application to another.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cooperative Game Framework for QoS Guided Job Allocation Schemes in Grids

    Publication Year: 2008, Page(s):1413 - 1422
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1099 KB) | HTML iconHTML

    A grid differs from traditional high performance computing systems in the heterogeneity of the computing nodes as well as the communication links that connect the different nodes together. In grids there exist users and service providers. The service providers provide the service for jobs that the users generate. Typically the amount of jobs generated by all the users are more than any single prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Coverage and Connectivity in Wireless Sensor Networks: A Two-Dimensional Percolation Problem

    Publication Year: 2008, Page(s):1423 - 1434
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1793 KB) | HTML iconHTML

    Abstract: While sensing coverage reflects the surveillance quality provided by a wireless sensor network (WSN), network connectivity enables data gathered by sensors to reach a central node, called the sink. Given an initially uncovered field and as more and more sensors are continuously added to a WSN, the size of partial covered areas increases. At some point, the situation abruptly changes from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Calculating Multiplicative Inverses Modulo $2^{m}$

    Publication Year: 2008, Page(s):1435 - 1438
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    A need to calculate modular multiplicative inverses that involve a power of 2 arises in various number theory and cryptography applications. Known algorithms that perform these calculations involve a number of steps, linearly proportional to the number of characters in a given number. The character can be a single bit or a binary word of any standard size. This letter presents an efficient methodo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career in Computing [advertisement]

    Publication Year: 2008, Page(s): 1439
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Silver Bullet Security Podcast series

    Publication Year: 2008, Page(s): 1440
    Request permission for commercial reuse | PDF file iconPDF (1077 KB)
    Freely Available from IEEE
  • TC Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org