IEEE Transactions on Computers

Issue 1 • Jan. 1976

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 1976, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (576 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1976, Page(s): nil1
    Request permission for commercial reuse | |PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 1976, Page(s): nil1
    Request permission for commercial reuse | |PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • SCR Bridge Convertor Computation Using Tensor Methods

    Publication Year: 1976, Page(s):1 - 6
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1517 KB)

    A tensor technique is described for dealing efficiently with the time-varying topology of a 3-phase SCR convertor during a digital computer solution. A significant feature of the technique is that once a basic analysis has been performed, the equations for any particular topology are automatically assembled by the program. Theoretical results are shown to be in close agreement with experimental me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Exploration of the Performance of the Alpha Beta Tree-Searching Heuristic

    Publication Year: 1976, Page(s):6 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2625 KB)

    The alpha beta heuristic has been used extensively as a means for reducing the tree-searching effort in computer game-playing programs. It is well known that if the number of terminal nodes in a tree is N, then under optimal circumstances the alpha beta heuristic reduces the actual number of nodes examined to about 2N½. This is a substantial reduction in the case that N is on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testable Sequential Cellular Arrays

    Publication Year: 1976, Page(s):11 - 18
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2163 KB)

    The progress of semiconductor technology has been a dominant factor on the use of cellular arrays in digital computer design. When a subsystem is implemented in the form of a cellular array, it is important that the subsystem can be tested at the array terminals for the presence of a faulty cell in the array. In this paper some sufficient conditions for the testability of two-dimensional sequentia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Variations of Lee's Algorithm

    Publication Year: 1976, Page(s):19 - 24
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1869 KB)

    Lee's algorithm is a pathfinding algorithm, which is often used in computer-aided design systems to route wires on printed circuit boards. This paper discusses some variations of Lee's algorithm which can be used in certain contexts to improve its efficiency. First, it is shown that, by storing frontier cells in an array of stacks rather than a single list, costly searching operations can be elimi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vector Floating-Point Data Format

    Publication Year: 1976, Page(s):25 - 32
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2147 KB)

    Memory has always been a major factor in determining the cost of a computer system. Many schemes have been proposed for reducing memory cost without degrading system performance or increasing system cost or complexity significantly. This paper presents a particular data type that may have been used occasionally by programmers who have had to simulate floating-point hardware by software. This new d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpolator for a Computer Numerical Control System

    Publication Year: 1976, Page(s):32 - 37
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2399 KB)

    A software interpolator which is comprised of linear and circular interpolations is compared with its hardware counterpart and with other circular interpolation methods. The software interpolator and the feed-rate control are contained in the numerical control (NC) program of a computer numerical control (CNC) system and enable a contouring control of the machine tool in any required feed-rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-Controlled Teaching Instrumentation for Linguistic Studies with the Great Apes

    Publication Year: 1976, Page(s):38 - 43
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2540 KB)

    A minicomputer has been interfaced with keyboards, visual display projectors, and vending devices, forming a 24 hour/day teaching instrumentation system for linguistic studies with a chimpanzee. Employing visual, geometric word-symbols with a 12-element construction (9 elements and 3 colors) a 4 year old female chimpanzee over a 2 year period has learned 70-80 words which she uses productively in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Multiple Stuck-Type Faults in Combinational Networks

    Publication Year: 1976, Page(s):44 - 54
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2619 KB)

    This paper deals with the problem of identifying multiple stuck-type hardware failures in combinational switching networks. Our work is an extension of that of Poage, and Bossen and Hong, and we employ the cause-effect equation for representing faulty circuit behavior. We introduce the concept of solving simultaneous equations over check point variables. These check point solutions are studied in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Shuffle-Exchange Network with Simplified Control

    Publication Year: 1976, Page(s):55 - 65
    Cited by:  Papers (66)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2639 KB)

    In this paper, a control mechanism for a shuffle-exchange interconnection network of N cells is proposed. With this network it is possible to realize some important permutations in log2 N shuffle-exchange steps. In the control mechanism presented, the control variables at step k are determined by a Boolean operation of the control variables at step k - 1. The Boolean operation is very s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilevel Approach to Sequential Detection of Pictorial Features

    Publication Year: 1976, Page(s):66 - 78
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4282 KB)

    This paper considers the problem of detecting the local similarity between templates in a given class and a given image using a hierarchically ordered sequential decision rule. When the given set consists of a large number of templates and the number of locations in the image matching any of the templates is small, it is wasteful to examine each of the templates at every location in the image for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Galois Switching Functions and Their Applications

    Publication Year: 1976, Page(s):78 - 86
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2340 KB)

    The Boolean difference expansion of Boolean algebra is generalized to finite (Galois) fields. A systematic method is provided for calculating the coefficients of this type of multivariable polynomial expansion. It is applied then to the synthesis functions. Applications include multivalued logics as well as binary-valued logics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Height of Height-Balanced Trees

    Publication Year: 1976, Page(s):87 - 90
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (686 KB)

    Height-balanced binary trees with height unbalances up to Δ are investigated, and the asymptotic value of the height h of such trees is studied for an increasing number of nodes N. It is shown that, in the worst case, the asymptotic value of h is a logarithmic function of N: [h = K log N]n→∞. Specifically, an upper bound for h can be posed as: h ≤ K1... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Generation of English Sentences

    Publication Year: 1976, Page(s):90 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (394 KB)

    A simple, efficient procedure for generating a large number of English sentences is described. The procedure uses Beckmann's error-detecting code model for the structure of natural languages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Additional Algorithm for a System of Coupled Algebraic Matrix Riccati Equations

    Publication Year: 1976, Page(s):91 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (503 KB)

    An iterative computational algorithm is presented for solving a system of coupled matrix Riccati equations based on the sign of a matrix. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cascade Transformation

    Publication Year: 1976, Page(s):93 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1309 KB)

    The method described in [1] for transforming a cascade with the standard cell-index set to an equivalent cascade with any complete cell-index set is generalized for transforming a cascade with an arbitrary cell-index set to an equivalent one with another arbitrary cell-index set. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement of Pneumoconiosis by Computer

    Publication Year: 1976, Page(s):95 - 97
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1232 KB)

    We describe and assess computer programs for measuring pneumoconiosis in chest X-rays. The 36 films studied had been read by 11 skilled human observers and a radiological score of pneumoconiotic severity was therefore available for each film. The computer assigns to each square grid of side 3.6 mm a measure which reflects the ``unevenness'' of the density distribution in that grid. The computed sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Index of Teleprocessing Tree Networks

    Publication Year: 1976, Page(s):97 - 98
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (269 KB)

    A procedure to locate the center of communications in a teleprocessing tree network such that the reliability index is minimized is outlined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Intercell Communication in a Tesselated Automaton

    Publication Year: 1976, Page(s):99 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (599 KB)

    An algorithm is presented which permits any arbitrary subset of the cells of a content addressable tresselated automaton (CATA) to communicate with any other arbitrary subset. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Equational Logic

    Publication Year: 1976, Page(s):102 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (415 KB)

    This note presents an alternate approach to solving the inverse problem of logic by applying a decomposition technique based on Boolean equations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of Nonparametric Curves

    Publication Year: 1976, Page(s): 103
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (189 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment on "An Improved Algorithm for the Generation of Nonparametric Curves

    Publication Year: 1976, Page(s): 103
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (189 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonparametric Curves

    Publication Year: 1976, Page(s):103 - 104
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (221 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org