# IEEE Transactions on Computers

## Filter Results

Displaying Results 1 - 23 of 23
• ### $2^n$ RNS Scalers for Extended 4-Moduli Sets

Publication Year: 2015, Page(s):3322 - 3334
Cited by:  Papers (2)
| |PDF (1579 KB) | HTML

Scaling is a key important arithmetic operation and is difficult to perform in Residue Number Systems (RNS). This paper proposes a comprehensive approach for designing efficient and accurate 2n RNS scalers for important classes of moduli sets that have large dynamic ranges. These classes include the traditional 3-moduli set, but the exponent of the power of two modulo is augmented by a ... View full abstract»

• ### Abort-on-Fail Test Scheduling for Modular SOCs without and with Preemption

Publication Year: 2015, Page(s):3335 - 3347
Cited by:  Papers (1)
| |PDF (838 KB) | HTML

System-on-chips (SOCs) and 3D stacked ICs are often tested for manufacturing defects in a modular fashion, enabling us to record the module test pass probability. We use this pass probability to exploit the abort-on-fail feature of automatic test equipment (ATE) and hence reduce the expected test time in the context of single-site testing. We present a model for calculation of expected test time, ... View full abstract»

• ### Adaptive ECC Scheme for Hybrid SSD’s

Publication Year: 2015, Page(s):3348 - 3361
Cited by:  Papers (2)
| |PDF (1592 KB) | HTML

In recent years, multi-level cell flash memory (MLC) has been widely adopted in solid state drives (SSD's) as the major storage medium due to its lower cost and higher density, compared with single-level cell flash memory (SLC). However, MLC has reliability concerns since it has lower endurance and higher disturb failure rate. Researchers thus proposed SLC/MLC hybrid SSD to exploit the advantages ... View full abstract»

• ### A Hybrid Multicast Routing for Large Scale Sensor Networks with Holes

Publication Year: 2015, Page(s):3362 - 3375
| |PDF (1760 KB) | HTML

In this article, we present RE2MR, the first hybrid multicast routing protocol that builds on the strengths of existing topology-based, hierarchical and geographic multicast solutions, while addressing their limitations. In RE2MR, the multicast path search problem is formulated as the capacitated concentrator location problem (CCLP) which yields the network topology that mini... View full abstract»

• ### Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits

Publication Year: 2015, Page(s):3376 - 3388
| |PDF (1611 KB) | HTML Media

The problem of random number generation dates back to Von Neumann's work in 1951. Since then, many algorithms have been developed for generating unbiased bits from complex correlated sources as well as for generating arbitrary distributions from unbiased bits. An equally interesting, but less studied aspect is the structural component of random number generation. That is, given a set of primitive ... View full abstract»

• ### ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds

Publication Year: 2015, Page(s):3389 - 3403
Cited by:  Papers (6)
| |PDF (1300 KB) | HTML

The success of cloud computing makes an increasing number of real-time applications such as signal processing and weather forecasting run in the cloud. Meanwhile, scheduling for real-time tasks is playing an essential role for a cloud provider to maintain its quality of service and enhance the system's performance. In this paper, we devise a novel agent-based scheduling mechanism in cloud computin... View full abstract»

• ### Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching

Publication Year: 2015, Page(s):3404 - 3416
Cited by:  Papers (1)
| |PDF (713 KB) | HTML Media

The crosstalk effect is one of the main problems in deep sub-micron designs of high-speed buses. To mitigate the crosstalk effect, there are several types of crosstalk avoidance codes proposed in the literature. In this paper, we are particularly interested in generating forbidden transition codes that do not have opposite transitions on any two adjacent wires. For this, we propose a sequential bi... View full abstract»

• ### Design of Optimal Scan Tree Based on Compact Test Patterns for Test Time Reduction

Publication Year: 2015, Page(s):3417 - 3429
Cited by:  Papers (3)
| |PDF (961 KB) | HTML

Scan tree architecture has been proposed to reduce the test application time of full scan chain by placing multiple scan cells in parallel. Most existing techniques rely on non-compact test pattern sets to construct the scan tree. However, they produce inefficient scan tree when highly compact test sets with few don't cares are used. In this paper, the depth of the scan tree based on approximate c... View full abstract»

• ### Efficient Attribute-Based Comparable Data Access Control

Publication Year: 2015, Page(s):3430 - 3443
Cited by:  Papers (9)
| |PDF (966 KB) | HTML

With the proliferation of mobile devices in recent years, there is a growing concern regarding secure data storage, secure computation, and fine-grained access control in data sharing for these resource-constrained devices in a cloud computing environment. In this work, we propose a new efficient framework named Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) with... View full abstract»

• ### Efficient Victim Block Selection for Flash Storage Devices

Publication Year: 2015, Page(s):3444 - 3460
| |PDF (1945 KB) | HTML

Motivated by the needs to enhance the performance of garbage collection in low-cost flash storage devices, we propose a victim block selection design to efficiently identify the blocks for erases and reclaim the space of invalid data without extensively scanning flash memory for the data status stored in the storage, so as to improve the garbage collection performance on reclaiming the space of in... View full abstract»

• ### Fast Two-Level Address Translation for Virtualized Systems

Publication Year: 2015, Page(s):3461 - 3474
Cited by:  Papers (2)
| |PDF (1075 KB) | HTML

Recently, there have been several improvements in architectural supports for two-level address translation for virtualized systems. However, those improvements including HW-based two-dimensional (2D) page walkers have extended the traditional multi-level page tables, without considering the memory management characteristics of virtual machines. This paper exploits the unique behaviors of the hyper... View full abstract»

• ### Hyper-Real-Time Ice Simulation and Modeling Using GPGPU

Publication Year: 2015, Page(s):3475 - 3487
Cited by:  Papers (2)
| |PDF (1272 KB) | HTML

This paper describes the design of an efficient parallel implementation of an ice simulator that simulates the behaviour of a ship operating in pack ice. The main idea of the method is to treat ice as a set of discrete objects with very simple properties, and to model the system mechanics mainly as a set of discrete contact and failure events. In this way it becomes possible to parallelize the pro... View full abstract»

• ### Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network

Publication Year: 2015, Page(s):3488 - 3499
Cited by:  Papers (11)
| |PDF (1131 KB) | HTML

Software-Defined Network (SDN) is a promising network paradigm that separates the control plane and data plane in the network. It has shown great advantages in simplifying network management such that new functions can be easily supported without physical access to the network switches. However, Ternary Content Addressable Memory (TCAM), as a critical hardware storing rules for high-speed packet p... View full abstract»

• ### Multi-Granularity Locality-Sensitive Bloom Filter

Publication Year: 2015, Page(s):3500 - 3514
Cited by:  Papers (2)
| |PDF (2102 KB) | HTML

In many applications, such as homeland security, image processing, social network, and bioinformatics, it is often required to support an approximate membership query (AMQ) to answer a question like “is an (query) object q near to at least one of the objects in the given data set Ω?” However, existing techniques for processing AMQs require a key parameter, i.e., the distance v... View full abstract»

Publication Year: 2015, Page(s):3515 - 3527
Cited by:  Papers (5)
| |PDF (1557 KB) | HTML

The ever-growing cellular traffic demand has laid a heavy burden on cellular networks. The recent rapid development in vehicle-to-vehicle communication techniques makes vehicular delay-tolerant network (VDTN) an attractive candidate for traffic offloading from cellular networks. In this paper, we study a bulk traffic offloading problem with the goal of minimizing the cellular communication cost un... View full abstract»

• ### Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm

Publication Year: 2015, Page(s):3528 - 3540
Cited by:  Papers (136)
| |PDF (1063 KB) | HTML

Green cloud is an emerging new technology in the computing world in which memory is a critical component. Phase-change memory (PCM) is one of the most promising alternative techniques to the dynamic random access memory (DRAM) that faces the scalability wall. Recent research has been focusing on the multi-level cell (MLC) of PCM. By precisely arranging multiple levels of resistance inside a PCM ce... View full abstract»

• ### Predicting Transient Downtime in Virtual Server Systems: An Efficient Sample Path Randomization Approach

Publication Year: 2015, Page(s):3541 - 3554
| |PDF (1585 KB) | HTML Media

A central challenge in developing cloud datacenters Service Level Agreements is the estimation of downtime distribution of a set of provisioned servers over a service window, which is compounded by three facts. First, while steady-state probabilities have been derived for birth-death processes involving server failures and repairs, they could be highly inaccurate under transience. Furthermore, ste... View full abstract»

• ### Resilient and Power-Efficient Multi-Function Channel Buffers in Network-on-Chip Architectures

Publication Year: 2015, Page(s):3555 - 3568
Cited by:  Papers (2)
| |PDF (1482 KB) | HTML

Network-on-Chips (NoCs) are quickly becoming the standard communication paradigm for the growing number of cores on the chip. While NoCs can deliver sufficient bandwidth and enhance scalability, NoCs suffer from high power consumption due to the router microarchitecture and communication channels that facilitate inter-core communication. As technology keeps scaling down in the nanometer regime, un... View full abstract»

• ### Secure Distributed Deduplication Systems with Improved Reliability

Publication Year: 2015, Page(s):3569 - 3579
Cited by:  Papers (10)
| |PDF (524 KB) | HTML

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge ... View full abstract»

• ### Simulation and Implication Using a Transfer Function Model for Switching Logic

Publication Year: 2015, Page(s):3580 - 3590
Cited by:  Papers (3)
| |PDF (523 KB) | HTML

Transfer functions are concise mathematical models representing the input/output behavior of a system and are widely used in many areas of engineering including system theory and signal analysis. We develop a framework for the construction of transfer function models for digital networks and demonstrate their application in simulation and implication. Rather than using a traditional switching theo... View full abstract»

• ### Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip

Publication Year: 2015, Page(s):3591 - 3604
Cited by:  Papers (9)
| |PDF (808 KB) | HTML

Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for early stages of the manufacturing process in order to prevent costly redesigns of a target system. This article classifies the potential physical faults of a baseline TSV-based 3D NoC architecture by targeting two-dimensional (2D) NoC compo... View full abstract»

• ### Using Flexibility in P-Circuits by Boolean Relations

Publication Year: 2015, Page(s):3605 - 3618
Cited by:  Papers (5)
| |PDF (1178 KB) | HTML

In this paper we study the problem of characterizing and exploiting the complete flexibility of a special logic architecture, called P-circuits, which realize a Boolean function by projecting it onto overlapping subsets given by a generalized Shannon decomposition. P-circuits are used to restructure logic by pushing some signals towards the outputs. The algorithms proposed so far for exploiting th... View full abstract»

• ### Comments on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”

Publication Year: 2015, Page(s):3619 - 3620
| |PDF (65 KB) | HTML

Recently, an efficient homomorphic MAC scheme for authentication in network coding is proposed and it is claimed that it achieves a security parameter 1=ql where l is selected according to different security requirements. However, in this paper, we show that there is an attack to make the security parameter 1=q instead of 1=ql. And we propose a way to avoid the presented atta... View full abstract»

## Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24
10129 Torino - Italy
e-mail: pmo@computer.org