By Topic

IEE Proceedings - Computers and Digital Techniques

Issue 2 • Date Mar 1994

Filter Results

Displaying Results 1 - 13 of 13
  • Threshold cryptosystem with multiple secret sharing policies

    Publication Year: 1994, Page(s):142 - 144
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (204 KB)

    In a group-oriented threshold cryptosystem, each group, instead of each individual member within the group, publishes a single group public key. An outsider can use this group public key to send encrypted messages to the group. However, the received encrypted messages can only be decrypted properly when the number of participating members is larger than or equal to the threshold value. All earlier... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic mail: case study in task-oriented restructuring of application domain

    Publication Year: 1994, Page(s):65 - 71
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (584 KB)

    Most electronic mail (e-mail) software consists of a mail delivery system and a user interface. One problem with current e-mail systems is that the user interface represents only a very thin layer on top of the delivery system. Studies have shown a wide level of diversity in the ways people work with e-mail systems and a wide range of tasks for which it is used. This work shows the need for powerf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and simulation of multiple-ring token networks

    Publication Year: 1994, Page(s):135 - 141
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    The paper presents an extended analysis for multiple token ring networks given by Yang et al (1986). The authors generalised the results in two ways: (a) for any load condition, i.e. for very lightly loaded networks to heavily loaded networks; (b) for any packet size, i.e. very small packet size (only a few bytes long) to very large packet size (several K-bytes long). The authors also obtain the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultrafast pipelined arithmetic using quantum electronic devices

    Publication Year: 1994, Page(s):104 - 110
    Cited by:  Papers (7)  |  Patents (52)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (460 KB)

    Negative differential resistance characteristics of several new quantum electronic devices have been used to design high-speed logic gates with the latching property. These latching gates form the basis of the ultrafast pipelined adder circuit described in this paper. The latching or memory feature of these circuits, which was previously considered to be a nuisance in the design of combinational c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated architectures for database interface development

    Publication Year: 1994, Page(s):73 - 78
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (444 KB)

    Presents a number of approaches to the development of database interfaces, with a particular emphasis upon the development of such interfaces within the confines of the database system itself. Conventional approaches to interface development are reviewed, and weaknesses identified which stem from the decoupling of regularly interacting components. It is shown how a more integrated approach, in whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimised synthesis of delay-insensitive circuits using time-sharing

    Publication Year: 1994, Page(s):111 - 118
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (652 KB)

    A syntax-directed translation procedure for the synthesis of truly delay-insensitive circuits from graph theoretic specifications is presented. In the synthesised circuit, for a given specification, different synchronisation structures (e.g. joins) in the specification are enforced by distinct circuit elements (e.g. C-elements). An attempt is made to enforce different synchronisation structures in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation and use of task knowledge in a user interface design environment

    Publication Year: 1994, Page(s):79 - 84
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (472 KB)

    A rapid prototyping approach to user interface design may be enhanced by integration with a theory of the users' tasks. The paper discusses various approaches to modelling user tasks including task knowledge structures (TKS) which provides a theory of the structure of task knowledge, together with a method for the identification and modelling of this knowledge. Formal specification languages may b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel decoding of the [23, 12, 7] binary Golay code

    Publication Year: 1994, Page(s):119 - 122
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (224 KB)

    We deal with the decoding of the [23, 12, 7] binary Golay code. S.W. Wei and C.H. Wei (1990) suggested a step-by-step decoding algorithm. We present an improvement in the comparison circuit of their algorithm and construct a very high-speed parallel decoder View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraints imposed by programme content on design, delivery and use of interactive media

    Publication Year: 1994, Page(s):85 - 92
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (720 KB)

    Systems based on digital representations of images are explored and analysed in the light of the sort of demands that interactive programmes of worthwhile complexity will place on them. By separating the processes of design from delivery, important advantages can be secured for these two quite dissimilar processes. The special advantages of analogue representations of certain types of data are hig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic beam search for gate matrix layout

    Publication Year: 1994, Page(s):123 - 128
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (384 KB)

    The paper presents a novel implementation of the genetic algorithm in combination with beam search for gate matrix layout. This is a permutation problem, for which the traditional genetic crossover operator results in repetition of gates, and therefore the GA is not applicable without modification. However, the GA is a very efficient stochastic optimisation technique, and is easily parallelisable.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexibility in interface development

    Publication Year: 1994, Page(s):93 - 98
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (572 KB)

    Two systems that employ intelligent user interfaces as front ends have been developed using Focus technology. The two systems, while addressing essentially the same user tasks, were built for different user populations, they had different development contexts, and produced as a result different systems. The discussion highlights the problems posed by these diverse development and user contexts and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of residue generators and multioperand adders modulo 3 built of multioutput threshold circuits

    Publication Year: 1994, Page(s):129 - 134
    Cited by:  Papers (5)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (404 KB)

    A generator modulo 3 (mod 3) is a circuit that generates a residue mod 3 from a binary vector. It is used to build the encoding and checking circuitry for arithmetic codes with the check base A=3, i.e. residue codes mod 3 and the 3N code, and some residue number system hardware. In this paper we propose a new approach to designing high-speed and cost-effective generators mod 3 whose special case a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relationship between user models in HCI and AI

    Publication Year: 1994, Page(s):99 - 103
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (476 KB)

    Considers the relationship between the two independent lines of research into user modelling activities in human-computer interaction (HCI) and artificial intelligence (AI). The paper begins by considering the potential use of AI user models in HCI. The user modelling research conducted in HCI and AI respectively is then discussed along with the goals of HCI and AI. Considerable differences underl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.