By Topic

Computer

Issue 1 • Date Jan. 1994

Filter Results

Displaying Results 1 - 7 of 7
  • Industrial computing. A grand challenge

    Publication Year: 1994, Page(s):12 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB)

    To make a truly significant impact, integrated industrial computing technologies must be actively transitioned into practice. First, practitioner needs must be clearly articulated at the beginning of RandD projects and throughout the development process. Second, the new knowledge must be codified into engineering procedures for ready use by the industry. Finally. truly significant new technologies... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate-monotonic analysis for real-time industrial computing

    Publication Year: 1994, Page(s):24 - 33
    Cited by:  Papers (40)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1309 KB)

    Issues of real-time resource management are pervasive throughout industrial computing. The underlying physical processes of many industrial computing applications impose explicit timing requirements on the tasks processed by the computer system. These timing requirements are an integral part of the correctness and safety of a real-time system. It is tempting to think that speed (for example, proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The timed-token protocol for real-time communications

    Publication Year: 1994, Page(s):35 - 41
    Cited by:  Papers (63)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The timed-token protocol is a token-passing protocol in which each node receives a guaranteed share of the network bandwidth. Partly because of this property, the timed-token protocol has been incorporated into a number of network standards, including the IEEE 802.4 token bus, the Fiber Distributed Data Interface (FDDI), and the Survivable Adaptable Fiber Optic Embedded Network (Safenet). Networks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Codesign from cospecification

    Publication Year: 1994, Page(s):42 - 47
    Cited by:  Papers (26)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    Describes an object-oriented codesign specification approach designed to eliminate the bias introduced from using more commonplace software or hardware specification languages. The goal is to investigate automated partitioning of behavior into hardware and software. The design methodology allows gradual, continuous repartitioning of codesign operations during design. For instance, designers might ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program implementation schemes for hardware-software systems

    Publication Year: 1994, Page(s):48 - 55
    Cited by:  Papers (56)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1367 KB)

    Recent advances in the design and synthesis of integrated circuits have prompted system architects to investigate computer aided design methods for systems that contain both application-specific and predesigned reprogrammable components. For the most part, we can apply high level synthesis techniques to synthesis of systems containing processors by treating the latter as a generalized resource. Ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asimov's laws of robotics: Implications for information technology. 2

    Publication Year: 1994, Page(s):57 - 66
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1072 KB)

    For part 1 see ibid., Dec 1993, p53-61. Isaac Asimov's Laws of Robotics, first formulated in 1940. were primarily a literary device intended to support a series of stories about robot behavior. Over time, he found that the three Laws included enough apparent inconsistencies, ambiguity. and uncertainty to provide the conflicts required for a great many stories. In examining the ramifications of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TTP-a protocol for fault-tolerant real-time systems

    Publication Year: 1994, Page(s):14 - 23
    Cited by:  Papers (214)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1140 KB)

    The Time-Triggered Protocol integrates such services as predictable message transmission, clock synchronization, membership, mode change, and blackout handling. It also supports replicated nodes and replicated communication channels. The authors describe their architectural assumptions, fault hypothesis, and objectives for the TTP protocol. After they elaborate on its rationale, they give a detail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com