By Topic

Computers and Digital Techniques, IEE Proceedings E

Issue 5 • Date September 1984

Filter Results

Displaying Results 1 - 7 of 7
  • Editorial

    Publication Year: 1984
    IEEE is not the copyright holder of this material | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Memory testing by linear checks

    Publication Year: 1984, Page(s):158 - 168
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1079 KB)

    In this paper we consider methods of error detection, location or correction in ROM or RAM by systems of orthogonal linear equality and inequality checks and by the Rademacher transform. Implementations and error detecting, locating, correcting capabilities of these techniques for ROM and RAM testing are also described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and restructuring of concurrent systems using prolog

    Publication Year: 1984, Page(s):169 - 176
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1041 KB)

    The paper describes a CAD system for the analysis and restructuring of complex concurrent systems. The design process can be divided into two stages: top-down analysis and bottom-up restructuring. At the top-down stage, a complex system is represented by a hierarchy of subsystems written in the language SDL. Each subsystem is the integration of data and control flow, and can be treated independent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimisation of Reed-Muller polynomials with fixed polarity

    Publication Year: 1984, Page(s):177 - 186
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1068 KB)

    An efficient algorithm for minimisation of Reed-Muller polynomials with fixed polarities is presented. The common terms of multiple-output polynomials are considered by applying a number of logical operations on their coefficients. The minimisation of the polynomials over extension Galois fields GF(2M) is considered. The average number of field multiplications for mapping a set of coefficients is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method of analysis for discrete-time buffers with randomly interrupted arrival stream

    Publication Year: 1984, Page(s):187 - 193
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (783 KB)

    The paper considers a discrete buffered system with infinite waiting room, one single output channel and synchronous transmission of messages from the buffer. The arrival stream of messages to the buffer is assumed to be interrupted at random time points for random length time intervals. The arrival interruptions represent a decrease in the mean arrival intensity as compared to a buffer system wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Common-access channel network algorithm

    Publication Year: 1984, Page(s):194 - 198
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (599 KB)

    The paper describes an algorithm developed for controlling access to a multiple-access broadcast channel. The algorithm, which is particularly simple, is suitable for networks with a small number of nodes. The algorithm was initially developed for use in a computer network dedicated to providing status information and control of a number of isolated plant sites. The channel available in this syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Erratum: Computing & Control Lecture

    Publication Year: 1984
    IEEE is not the copyright holder of this material | PDF file iconPDF (132 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.