By Topic

IEE Proceedings E - Computers and Digital Techniques

Issue 5 • Date September 1982

Filter Results

Displaying Results 1 - 6 of 6
  • Functional testing of computer hardware and data-transmission channels based on minimising the magnitude of undetected errors

    Publication Year: 1982, Page(s):169 - 180
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1233 KB)

    The paper introduces a criterion for test generation based on minimising the expected magnitude of undetected errors. This criterion is used to develop a best strategy for testing, using the linear checks approach. The detailed analysis is carried out for single unidirectional and bidirectional errors and for multiple unidirectional errors. Specific results concerning the efficiency of the approac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demand-assigned multiple-access schemes using collision-type request channels: priority messages

    Publication Year: 1982, Page(s):182 - 194
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1370 KB)

    Demand-assigned multiple-access (DAMA) schemes in which requests for communication channels are transmitted over shared collision-type channels to a master controller, and in which messages of different priorities are present, are analysed. Priority use of the request channels is achieved by having users select among those channels according to a priority-dependent probability distribution. Two im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic completeness of substitution-permutation encryption networks

    Publication Year: 1982, Page(s):195 - 199
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (639 KB)

    A variant of the substitution-permutation encryption network, which incorporates random permutations, is presented and shown to retain, with a very high probability, the cryptographically important property of completeness after a small number of rounds. Although the increase in crypto-cost is moderate, the advantage of the new variant is twofold, in that a proof for the freedom from an intentiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating system for a dedicated common memory multimicroprocessor system

    Publication Year: 1982, Page(s):200 - 205
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (958 KB)

    By using multiple processors it is possible to increase the computing power and hence the complexity of the task that can be managed by a microprocessor-based system. To be useful, such a system must consist of (a) hardware, (b) development software, which provides program development support, and (c) operating-system software which executes on the multiprocessor and provides run-time support for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamically reconfigurable vector-slice processor

    Publication Year: 1982, Page(s):207 - 215
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1430 KB)

    The paper is an exposition of some of the design principles involved in the development of a dynamically reconfigurable vector-slice processor. Implementable in terms of commercially available VLSI components, the reconfigurable processor is designed to meet the requirements of the numerical user who can avail himself of a tradeoff between parallel activity and numerical accuracy. To this end, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference report: 12th IEEE international symposium on multiple-valued logic (MVL 82)

    Publication Year: 1982
    IEEE is not the copyright holder of this material | PDF file iconPDF (175 KB)
    Freely Available from IEEE