By Topic

IEE Proceedings - Computers and Digital Techniques

Issue 5 • Sep 1994

Filter Results

Displaying Results 1 - 10 of 10
  • Chip level fault location using X-algorithm

    Publication Year: 1994, Page(s):259 - 264
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    In board level testing the faults are usually isolated to a field replacement unit (FRU) rather than to a single chip. In this paper a new algorithm, called the X-algorithm, is presented to locate a faulty chip in an FRU. The location patterns (LPs) which contain only one symbol X/X¯ are introduced. The trajectory of the X/X¯ propagation sensitises the faults in the FRU. Based on the tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interleaving security and efficiency considerations in the design of inexpensive IC cards

    Publication Year: 1994, Page(s):265 - 270
    Cited by:  Patents (12)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (452 KB)

    Currently used inexpensive IC cards (e.g. payphone cards) prove their authenticity and generate digital signatures by means of a simple circuit which implements a nonlinear one-way transformation. The paper considers possible approaches for the efficient design and fabrication of such a circuit, based on the observation that the circuit does not have to serve any predefined exact process as long a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and improvement of an access control scheme with user authentication

    Publication Year: 1994, Page(s):271 - 273
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (224 KB)

    Both user authentication and access control are required for data protection in computer systems. Recently, Ham and Lin proposed an access control scheme with integration of user authentication. In their scheme, the above two functions are combined together to prevent possible security threats between these two protection modules. This paper, argues that there are some redundant information and ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transient analysis and hazard-free design of exclusive-OR switching networks

    Publication Year: 1994, Page(s):274 - 280
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (496 KB)

    Transient analysis for exclusive-OR switching networks is studied. Based on the theorems proved for logic hazards, three methods are developed for hazard detection. The first is a graphical method that applies to functions of no more than six variables. The second method, which is an extension of the graphical method, can be applied to networks with any number of inputs. The third method is based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table driven Newton scheme for high precision logarithm generation

    Publication Year: 1994, Page(s):281 - 292
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (624 KB)

    Based on the Newton method, a table driven iterative scheme is proposed to compute the logarithm function. The proposed scheme provides high performance and high precision and it is implementable with currently available technologies. It is shown, assuming the availability of a parallel multiplier and an adder and the IEEE floating point format, that a computation delay of 12 machine cycles can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heterogeneous Petri net methodology for the design of complex controllers

    Publication Year: 1994, Page(s):293 - 297
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (348 KB)

    A controller design methodology based on Petri nets is developed. The semantics of the method, and the algorithm for the construction of an equivalent finite state machine make use of both synchronous and asynchronous marking graphs giving rise to the name `heterogeneous Petri nets'. The method allows the designer of a controller greater freedom in the use of well structured graphics specifying th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load balancing algorithms for an extended hypercube

    Publication Year: 1994, Page(s):298 - 306
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (716 KB)

    Reduction of the execution time of a job through equitable distribution of work load among the processors in a distributed system is the goal of load balancing. Performance of static and dynamic load balancing algorithms for the extended hypercube, is discussed. Threshold algorithms are very well-known algorithms for dynamic load balancing in distributed systems. An extension of the threshold algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decoding the (73, 37, 13) quadratic residue code

    Publication Year: 1994, Page(s):253 - 258
    Cited by:  Papers (17)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (284 KB)

    Algebraic approaches to the decoding of the quadratic residue (QR) codes were studied recently. In Reed et. al. (1992), a decoding algorithm was given for the (41, 21, 9) binary QR code. Here, some new more general properties are found for the syndromes of the subclass of binary QR codes of length n = 8m +1. Using these properties, the new theorems needed to decode this subclass of the QR codes ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Montgomery reduction with even modulus

    Publication Year: 1994, Page(s):314 - 316
    Cited by:  Papers (1)  |  Patents (7)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (188 KB)

    The modular multiplication and exponentiation algorithms based on the Montgomery reduction technique require that the modulus be an odd integer. It is shown that, with the help of the Chinese remainder theorem, the Montgomery reduction algorithm can be used to efficiently perform these modular arithmetic operations with respect to an even modulus View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group-oriented (t, n) threshold digital signature scheme and digital multisignature

    Publication Year: 1994, Page(s):307 - 313
    Cited by:  Papers (26)  |  Patents (29)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (476 KB)

    The paper presents group-oriented (t,n) threshold digital signature schemes based on the difficulty of solving the discrete logarithm problem. By employing these schemes, any t out of n users in a group can represent this group to sign the group signature. The size of the group signature and the verification time of the group signature are equivalent to that of an individual digital signature. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.