# IEEE Transactions on Computers

## Filter Results

Displaying Results 1 - 18 of 18
• ### [Front cover]

Publication Year: 2008, Page(s): c1
| PDF (102 KB)
• ### [Inside front cover]

Publication Year: 2008, Page(s): c2
| PDF (77 KB)
• ### Guest Editors' Introduction to the Special Section on Programming Architectures for Embedded Systems

Publication Year: 2008, Page(s):1297 - 1299
| PDF (75 KB) | HTML
• ### Implementing Synchronous Models on Loosely Time Triggered Architectures

Publication Year: 2008, Page(s):1300 - 1314
Cited by:  Papers (38)
| | PDF (843 KB) | HTML

Synchronous systems offer a clean semantics and an easy verification path at the expense of often inefficient implementations. Capturing design specifications as synchronous models and then implementing the specifications in a less restrictive platform allow to address a much larger design space. The key issue in this approach is maintaining semantic equivalence between the synchronous model and i... View full abstract»

• ### The Algebra of Connectors—Structuring Interaction in BIP

Publication Year: 2008, Page(s):1315 - 1330
Cited by:  Papers (38)
| | PDF (1397 KB) | HTML

We provide an algebraic formalization of connectors in the BIP component framework. A connector relates a set of typed ports. Types are used to describe different modes of synchronization: rendezvous and broadcast, in particular. Connectors on a set of ports P are modeled as terms of the algebra AC(P), generated from P by using a binary fusion operator and a unary typing operator. Typing associate... View full abstract»

• ### Throughput-Buffering Trade-Off Exploration for Cyclo-Static and Synchronous Dataflow Graphs

Publication Year: 2008, Page(s):1331 - 1345
Cited by:  Papers (51)  |  Patents (6)
| | PDF (1768 KB) | HTML

Multimedia applications usually have throughput constraints. An implementation must meet these constraints, while it minimizes resource usage and energy consumption. The compute intensive kernels of these applications are often specified as Cyclo-Static or Synchronous Dataflow Graphs. Communication between nodes in these graphs requires storage space which influences throughput. We present an exac... View full abstract»

• ### A Tractable and Fast Method for Monitoring SystemC TLM Specifications

Publication Year: 2008, Page(s):1346 - 1356
Cited by:  Papers (22)
| | PDF (1471 KB) | HTML

The TLM modeling level of the SystemC language emphasizes the transactions in a complex system, considered at a very high level of abstraction. This level of specification considerably improves simulation performance and is therefore increasingly being adopted. We address assertion-based verification (ABV) of TLM SystemC models. We propose a framework for supervising during simulation the verifica... View full abstract»

• ### A Model-Driven Development Approach to Mapping UML State Diagrams to Synthesizable VHDL

Publication Year: 2008, Page(s):1357 - 1371
Cited by:  Papers (21)
| | PDF (3148 KB) | HTML

With the continuing rise in the complexity of embedded systems, there is an emerging need for a higher level modelling environment that facilitates efficient handling of this complexity. The aim here is to produce such a high level environment using Model Driven Development (MDD) techniques that maps a high level abstract description of an electronic embedded system into its low level implementati... View full abstract»

• ### Cache Noise Prediction

Publication Year: 2008, Page(s):1372 - 1386
Cited by:  Papers (7)
| | PDF (7494 KB) | HTML

Caches are very inefficiently utilized because not all the excess data brought into the cache, to exploit spatial locality, is utilized. Our experiments showed that Level 1 data cache has a utilization of only about 57%. Increasing the efficiency of the cache (by increasing its utilization) can have significant benefits in terms of reducing the cache energy consumption, reducing the bandwidt... View full abstract»

• ### MICRO: A Multilevel Caching-Based Reconstruction Optimization for Mobile Storage Systems

Publication Year: 2008, Page(s):1386 - 1398
Cited by:  Papers (15)
| | PDF (4291 KB) | HTML

High performance, highly reliable, and energy-efficient storage systems are essential for mobile data-intensive applications such as remote surgery and mobile data center. Compared with conventional stationary storage systems, mobile disk-array-based storage systems are more prone to disk failures due to their severe application environments. Further, they have very limited power supply. Therefore... View full abstract»

• ### A Computing Resource Management Framework for Software-Defined Radios

Publication Year: 2008, Page(s):1399 - 1412
Cited by:  Papers (15)
| | PDF (5066 KB) | HTML

Software-defined radio (SDR) is an emerging concept that leverages the design of software-defined and hardware-independent signal processing chains for radio communication. It introduces flexibility to wireless systems, facilitating the dynamic switch from one radio access technology to another or, in other words, the de- and reallocation of computing resources from one SDR application to another.... View full abstract»

• ### A Cooperative Game Framework for QoS Guided Job Allocation Schemes in Grids

Publication Year: 2008, Page(s):1413 - 1422
Cited by:  Papers (34)
| | PDF (1099 KB) | HTML

A grid differs from traditional high performance computing systems in the heterogeneity of the computing nodes as well as the communication links that connect the different nodes together. In grids there exist users and service providers. The service providers provide the service for jobs that the users generate. Typically the amount of jobs generated by all the users are more than any single prov... View full abstract»

• ### Integrated Coverage and Connectivity in Wireless Sensor Networks: A Two-Dimensional Percolation Problem

Publication Year: 2008, Page(s):1423 - 1434
Cited by:  Papers (40)
| | PDF (1793 KB) | HTML

Abstract: While sensing coverage reflects the surveillance quality provided by a wireless sensor network (WSN), network connectivity enables data gathered by sensors to reach a central node, called the sink. Given an initially uncovered field and as more and more sensors are continuously added to a WSN, the size of partial covered areas increases. At some point, the situation abruptly changes from... View full abstract»

• ### On Calculating Multiplicative Inverses Modulo $2^{m}$

Publication Year: 2008, Page(s):1435 - 1438
Cited by:  Papers (3)
| | PDF (140 KB) | HTML

A need to calculate modular multiplicative inverses that involve a power of 2 arises in various number theory and cryptography applications. Known algorithms that perform these calculations involve a number of steps, linearly proportional to the number of characters in a given number. The character can be a single bit or a binary word of any standard size. This letter presents an efficient methodo... View full abstract»

Publication Year: 2008, Page(s): 1439
| PDF (84 KB)
• ### Silver Bullet Security Podcast series

Publication Year: 2008, Page(s): 1440
| PDF (1077 KB)
• ### TC Information for authors

Publication Year: 2008, Page(s): c3
| PDF (77 KB)
• ### [Back cover]

Publication Year: 2008, Page(s): c4
| PDF (102 KB)

## Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24
10129 Torino - Italy
e-mail: pmo@computer.org