By Topic

IEEE Transactions on Computers

Issue 11 • Date Nov. 2009

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction: Special Section on Autonomic Network Computing

    Publication Year: 2009, Page(s):1441 - 1443
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Slicing Distributed Systems

    Publication Year: 2009, Page(s):1444 - 1455
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2559 KB) | HTML iconHTML

    Peer-to-peer (P2P) architectures are popular for tasks such as collaborative download, VoIP telephony, and backup. To maximize performance in the face of widely variable storage capacities and bandwidths, such systems typically need to shift work from poor nodes to richer ones. Similar requirements are seen in today's large data centers, where machines may have widely variable configurations, load... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cholla: A Framework for Composing and Coordinating Adaptations in Networked Systems

    Publication Year: 2009, Page(s):1456 - 1469
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3198 KB) | HTML iconHTML

    The ability of networked system software to adapt in a controlled manner to changes in the environment and requirements is crucial, but difficult to realize in complex systems with multiple interacting software layers/components. Typically, many components in a networked system implement adaptive behaviors and encapsulate their own adaptation logic (policies), making the whole system's adaptive be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Online Mechanism for BGP Instability Detection and Analysis

    Publication Year: 2009, Page(s):1470 - 1484
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4886 KB) | HTML iconHTML

    The importance of border gateway protocol (BGP) as the primary interautonomous system (AS) routing protocol that maintains the connectivity of the Internet imposes stringent stability requirements on its route selection process. Accidental and malicious activities such as misconfigurations, failures, and worm attacks can induce severe BGP instabilities leading to data loss, extensive delays, and l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Planning and Adaptive Resource Management Architecture for Distributed Real-Time Embedded Systems

    Publication Year: 2009, Page(s):1485 - 1499
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2972 KB) | HTML iconHTML

    Real-time and embedded systems have traditionally been designed for closed environments where operating conditions, input workloads, and resource availability are known a priori and are subject to little or no change at runtime. There is an increasing demand, however, for autonomous capabilities in open distributed real-time and embedded (DRE) systems that execute in environments where input workl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Security in Unattended Wireless Sensor Networks

    Publication Year: 2009, Page(s):1500 - 1511
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1682 KB) | HTML iconHTML

    In recent years, wireless sensor networks (WSNs) have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Much of prior research assumes that the WSN is supervised by a constantly present sink and sensors can quickly offload collected data. In this paper, we focus on unattended WSNs (UWSNs) characterized by int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Highly Scalable Self-Healing Algorithms for High Performance Scientific Computing

    Publication Year: 2009, Page(s):1512 - 1524
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1858 KB) | HTML iconHTML

    As the number of processors in today's high-performance computers continues to grow, the mean-time-to-failure of these computers is becoming significantly shorter than the execution time of many current high-performance computing applications. Although today's architectures are usually robust enough to survive node failures without suffering complete system failure, most of today's high-performanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Virtualization to Improve Software Rejuvenation

    Publication Year: 2009, Page(s):1525 - 1538
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4509 KB) | HTML iconHTML

    In this paper, we present an approach for software rejuvenation based on automated self-healing techniques that can be easily applied to off-the-shelf application servers. Software aging and transient failures are detected through continuous monitoring of system data and performability metrics of the application server. If some anomalous behavior is identified, the system triggers an automatic rej... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Speed of Parallel Decimal Multiplication

    Publication Year: 2009, Page(s):1539 - 1552
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2854 KB) | HTML iconHTML

    Hardware support for decimal computer arithmetic is regaining popularity. One reason is the recent growth of decimal computations in commercial, scientific, financial, and Internet-based computer applications. Newly commercialized decimal arithmetic hardware units use radix-10 sequential multipliers that are rather slow for multiplication-intensive applications. Therefore, the future relevant proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent Error Detection in Finite-Field Arithmetic Operations Using Pipelined and Systolic Architectures

    Publication Year: 2009, Page(s):1553 - 1567
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3240 KB) | HTML iconHTML

    In this work, we consider detection of errors in polynomial, dual, and normal bases arithmetic operations. Error detection is performed by recomputing with the shifted operand method, while the operation unit is in use. This scheme is efficient for pipelined architectures, particularly systolic arrays. Additionally, one semisystolic multiplier for each of the polynomial, dual, type I, and type II ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PBC: A Partially Buffered Crossbar Packet Switch

    Publication Year: 2009, Page(s):1568 - 1581
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4451 KB) | HTML iconHTML

    The crossbar fabric is widely used as the interconnect of high-performance packet switches due to its low cost and scalability. There are two main variants of the crossbar fabric: unbuffered and internally buffered. On one hand, unbuffered crossbar fabric switches exhibit the advantage of using no internal buffers. However, they require a complex scheduler to solve input and output ports contentio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Computing Now [advertisement]

    Publication Year: 2009, Page(s): 1582
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • CSDA Certification [advertisement]

    Publication Year: 2009, Page(s): 1583
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • IEEE and IEEE Computer Society 2010 Student Member Package

    Publication Year: 2009, Page(s): 1584
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • TC Information for authors

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org