By Topic

IEEE Transactions on Computers

Issue 2 • Feb. 1976

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 1976, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (500 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1976
    Request permission for commercial reuse | PDF file iconPDF (218 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 1976, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (218 KB)
    Freely Available from IEEE
  • A Double Error-Correction Scheme for Peripheral Systems

    Publication Year: 1976, Page(s):105 - 115
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2517 KB)

    In multiple digital recording peripheral systems, the errors which are encountered are burst-type errors which may occur in several tracks or channels. This paper discusses methods and implementation procedures for correcting a series of errors or erasures of arbitrary length in any one or two tracks of a multi-channel system. We have shown that such errors in multiple tracks may be detected and c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reliability Model for Various Switch Designs in Hybrid Redundancy

    Publication Year: 1976, Page(s):115 - 133
    Cited by:  Papers (21)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3749 KB)

    Various switch designs for the hybrid redundancy scheme are studied. A reliability model for the switch is developed and the switch is shown to be a significant factor in the overall system reliability. A hybrid redundancy scheme with a triple-modular redundant (TMR) core may have a maximum attainable reliability for only a spare or two. Adding spares complicates the switch enough to cause the sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomalous Response Times of Input Synchronizers

    Publication Year: 1976, Page(s):133 - 139
    Cited by:  Papers (46)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2487 KB)

    This paper deals with an anomalous behavior of input synchronizers which results in the occurrence of random errors in asynchronously interfaced synchronous digital systems. The errors are caused by the undefined response time of a flip-flop as it recovers from its metastable state. To obtain their frequency, the timing diagram of the flip-flops has been analyzed and the probability distribution o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outer Product Expansions and Their Uses in Digital Image Processing

    Publication Year: 1976, Page(s):140 - 148
    Cited by:  Papers (21)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5026 KB)

    This paper is intended as a tutorial review of certain digital image processing transform techniques utilizing the notion of outer product expansions. Examples from Fourier, Walsh, Haar, and other well known transforms are reviewed in the notation of matrix-vector outer products; and implementation of the singular value decomposition (SVD) of large sized images is presented. The use of the SVD as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memory Hardware for High Speed Job Selection

    Publication Year: 1976, Page(s):148 - 156
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2264 KB)

    The discriminating content addressable memory (DCAM) is a modified content addressable memory (CAM). After the ``similar to' search performed by the CAM, the modified memory searches in parallel for the highest value in a particular field across all words of the memory. Applications of DCAM can greatly speed up queue searches and scheduling processes in operating systems. Worst case DCAM query tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determination of Cache's Capacity and its Matching Storage Hierarchy

    Publication Year: 1976, Page(s):157 - 164
    Cited by:  Papers (21)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1999 KB)

    The optimum capacity of a cache memory with given access time is determined analytically based upon a model of linear storage hierarchies wherein both the hit ratio function and the device technology-cost function are assumed to be power functions. Explicit formulas for the capacities and access times of the storage levels in the matching hierarchy of required capacity and allowable cost are deriv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stastical Estimation of the Intrinsic Dimensionality of a Noisy Signal Collection

    Publication Year: 1976, Page(s):165 - 171
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2010 KB)

    Let W be an N-dimensional vector space and let the signal locus V be a K-dimensional topological hypersurface in W. The intrinsic dimensionality problem can be stated as follows. Given M randomly selected points (signals) vi, vi ϵ V, estimate K, which is the dimensionality of V and is called the intrinsic dimensionality of the points vi. A statistical metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for the Correction of Garbled Words Based on the Levenshtein Metric

    Publication Year: 1976, Page(s):172 - 178
    Cited by:  Papers (112)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1839 KB)

    In this paper we propose a new method for correcting garbled words based on Levenshtein distance and weighted Levenshtein distance. We can correct not only substitution errors, but also insertion errors and deletion errors by this method. According to the results of simulation on nearly 1000 high occurrence English words, higher error correcting rates can be achieved by this method than any other ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation of Concave Piecewise Linear Discriminant Functions Using Chebyshev Polynomials

    Publication Year: 1976, Page(s):178 - 186
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2376 KB)

    In two-class pattern classification problems, the use of piecewise linear discriminant functions (PLDF's) is often encountered. Following a consideration of the relative advantages of a PLDF above an optimal-high degree-discriminant function, a new procedure to compute a concave PLDF is presented. The characteristic property of this procedure is that the number of linear functions necessary for ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Detection of Concavities in Cellular Blobs

    Publication Year: 1976, Page(s):187 - 196
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3335 KB)

    This paper reports some results on the use of parallel-structured computers to detect and describe concavities in simply connected planar regions (``domains'' or ``blobs''). We show, in particular, how these concavities may be obtained by a parallel filling-in process-somewhat like pouring liquid into several cups simultaneously. It has been shown that the concavities and concavity tree of a regul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Interpolation of Discrete Images

    Publication Year: 1976, Page(s):196 - 202
    Cited by:  Papers (26)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2362 KB)

    This correspondence presents results concerning the display of interpolated images for cosmetically pleasing effects. Replication, bilinear interpolation, and various cubic spline function interpolators are investigated as to numeric computational difficulty and psychovisually pleasing results. A degree of freedom analysis is provided to demonstrate the fact that apparent image improvement does no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Deriving All Pairs of Compatible States by Closure Classes

    Publication Year: 1976, Page(s):202 - 207
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1050 KB)

    This correspondence proposes a new algorithm for deriving all pairs of compatible and incompatible states of any incompletely or completely specified sequential machine. The method needs a single step in checking the contents of the closure classes with respect to each pair of distinct states. A working example is given for illustrating the method by hand computation. The algorithm is implemented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Fault Folding for Irredundant and Redundant Combinational Circuits

    Publication Year: 1976, Page(s): 207
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's reply

    Publication Year: 1976, Page(s): 207
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to ``The Lee Path Connection Algorithm''

    Publication Year: 1976, Page(s): 208
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Publications

    Publication Year: 1976, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 1976, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org