By Topic

19-22 March 1990

Filter Results

Displaying Results 1 - 25 of 67
  • Using reservation-virtual-time-CSMA with split-channel reservation for packet voice and data

    Publication Year: 1990, Page(s):209 - 212
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (171 KB)

    The carrier sense multiple access with collision detection (CSMA/CD) protocol, originally developed for data transmission is not very effective for the transmission of voice packets due to excessive packet delays at moderate to high loads. It has been shown by C.T. Lea, J.S. Heditch (1987), that the problem of delays can be greatly reduced by using a variation of CSMA called reservation-virtual-ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shared-memory execution model for parallel functional programming

    Publication Year: 1990, Page(s):247 - 250
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (227 KB)

    Functional languages have received more interest recently and particularly for programming parallel computers. Traditionally, functional languages were developed simultaneously with the design of new architectures such as data flow and reduction machine. The authors present a general execution model to support a parallel functional language called SISAL (stream and iteration in a single assignment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The new programming model for parallel machines

    Publication Year: 1990, Page(s):177 - 183
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (264 KB)

    A new model to help write programs which run concurrently in parallel machines, is discussed. This model takes the well known model of inter-communicating processes and refines it by: identifying processes with the evaluation of a function and eliminating many of the difficulties resulting from identifying processes with procedural programs; invoking process execution in two phases, ie., in the fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topsy: an extensible Unix multicomputer

    Publication Year: 1990, Page(s):164 - 176
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (940 KB)

    Topsy is a message passing multicomputer architecture. It comprises a distributed Unix-compatible kernel resting on a message software system which in turn relies on a new, high speed, communications hardware. The authors present an overview of the goals of the architecture and the main design decisions, a description of the structure and major components of the operating system and the communicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The VSA: a standard for parallel program translation

    Publication Year: 1990, Page(s):155 - 163
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (428 KB)

    The goal of portable code generation has been applied to parallel processing, although the problems of standardisation and efficiency are complex. This complexity comes about through the additional dimension of multiple processors, processor control and inter-processor communications. An ideal system would compile a standard language, either expressing parallelism or containing implicit parallelis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible parallel control

    Publication Year: 1990, Page(s):117 - 124
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    The concept of a flexible parallel structure for feedback control is described and two implementation studies are investigated. The fundamental arrangement for such controllers is a novel way in which feedback control can be arranged, further it is seen to be modern in that it ties in with present-day technology, and exciting in terms of the potential application areas which can now be investigate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated quality tracking

    Publication Year: 1990, Page(s):149 - 153
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (272 KB)

    The development of computer-aided software engineering tools, with their undoubted advantages, needs to be parallelled by developments in automated quality measurement and tracking tools. The authors describe an initial approach taken by them in this respect: providing an automated method of tracking the progress of functional verification testing against a defect removal model (DRM). The automate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a network security policy model

    Publication Year: 1990, Page(s):38 - 45
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (476 KB)

    The paper considers the development of multilevel network security policy models by drawing as many parallels as possible from computer security models. It first considers how access control and information flow security issues arise in the design of multilevel secure network systems. It discusses these issues using typical scenarios, then develops an outline of a simple abstract network security ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systolic parameter estimator for real-time adaptive control

    Publication Year: 1990, Page(s):111 - 116
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (216 KB)

    Describes a new systolic parameter (or constant state) estimator based upon the square root covariance Kalman filter algorithm. Parameter estimation is a fundamental component of adaptive controllers and explicit self-tuning regulators. The new architecture is compared with one proposed by Shepherd, McWhirter, and Hudson (1988), and it is shown to be potentially more attractive for parallel contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems engineering: a theoretical framework

    Publication Year: 1990, Page(s):143 - 148
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (372 KB)

    Explores the possible root causes of failure in systems engineering and suggests a model of the development process that takes full account of these. The model is intended to be a first step, in the form of a theoretical framework, towards achieving better quality in systems engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication in a UNIX network environment using smart cards

    Publication Year: 1990, Page(s):32 - 37
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (380 KB)

    The UNIX system has demonstrated adequate security for the login authentication mechanism when applied to individual computer systems. However the implementations of remote logins for a network of UNIX systems has been less satisfactory. Smart cards may be applied to improve the security for remote logins and the paper presents an extension to the mechanism developed that allows the card to be use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational hyphenation

    Publication Year: 1990, Page(s):352 - 357
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (404 KB)

    The paper presents an overview of the role of hyphenation in computational environment. The work is a summary of an existing application. An overview of the language independent system is presented and possible extensions suggested. The system is a multilingual hyphenation package which has been researched and developed at Linotype Limited for use in the graphical art/desktop publishing industry View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An environment for specification, design, operation, maintenance, and revision of manufacturing control systems

    Publication Year: 1990, Page(s):104 - 110
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (404 KB)

    The Engineering Design Research Centre has been set up by SERC at Glasgow University (in collaboration with Heriot-Watt and Strathclyde universities, Napier College and Paisley College) to conduct fundamental and strategic research into engineering design in all its aspects. As one aspect of this, a project sponsored jointly by the Engineering Design Research Centre and Eurotherm Ltd has been set ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of cluster techniques and system design metrics in software maintenance

    Publication Year: 1990, Page(s):139 - 142
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (208 KB)

    Software metrics are an attempt to quantify features of a software product which can be used for activities such as prediction and standards setting. The paper describes a novel use of such software metrics in which they are used to monitor the degree of structural degradation that occurs during the software maintenance process. The technique that is described relies on a branch of statistics know... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge based approach to FMS scheduling

    Publication Year: 1990, Page(s):24 - 31
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (456 KB)

    Describes work done within the Software Technology Department of British Aerospace (Military Aircraft) Ltd. to investigate the application of IKBS to scheduling and planning problems. The basis of the work performed at UMIST was the automated acquisition of knowledge. The creation of a prototype FMS scheduler was selected as a basis for the study. The paper comments on the suitability of the probl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reusability using object-oriented programming

    Publication Year: 1990, Page(s):299 - 305
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (432 KB)

    Based on their experiences of OOP, the authors describe their work and current thinking, and also offer some rules of thumb. In particular they present a model for the software lifecycle in an environment based on reuse View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering-in-the-large: software engineering and instrumentation

    Publication Year: 1990, Page(s):1 - 7
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper examines how techniques can be transferred between different engineering design disciplines. In particular it concentrates on technology transfer from the design of complex instrument systems to the design of software and vice-versa. The paper briefly examines current practice in these areas and attempts to establish the conceptual foundations on which technology transfer can be built. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A direct voice input man-machine interface strategy to provide voice access for severely impaired speakers

    Publication Year: 1990, Page(s):279 - 285
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (316 KB)

    A description is given of the initial stages in the development of a simple time-encoded digital speech (TES) isolated word recognition, (IWR) system, incorporating automatic token set selection (ATSS) procedures as a means of providing an effective man-machine interface for severely handicapped speakers. Three aspects of the investigation are emphasised. The use of automatic diagnostic routines, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A control strategy for dry etch processing

    Publication Year: 1990, Page(s):387 - 389
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (168 KB)

    The article describes a control strategy for a dry etching process. The basis for this control methodology is that a dry etching stage may be described by one or more response surfaces or parametric models in a multidimensional space. The process trajectory is defined in relation to response functions (parametric models) and is maintained by the use of adaptive control algorithms. The control fact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time, fault-tolerant convolution device

    Publication Year: 1990, Page(s):421 - 427
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (408 KB)

    Correlation and convolution are ubiquitous operations in the field of signal processing as the means of implementing filtering processes. The two operations differ only in the order in which multiplicands are combined, they may therefore be realised with the same hardware. (Furthermore, if the kernel is symmetric, or only the modulus of the result is required, then the order of presentation of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of handwritten Arabic mathematical formulas

    Publication Year: 1990, Page(s):344 - 351
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (412 KB)

    The author develops a hierarchical system for the recognition of on-line Arabic mathematical symbols. A precedence grammar has been also developed for the recognition of one-dimensional Arabic mathematical formulas. The segmentation of a mathematical formula is relatively simple since all characters are isolated and each consists of one stroke only, with the exception of three symbols where each c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cognitive role of an engineer in a diagnostic task

    Publication Year: 1990, Page(s):259 - 263
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (316 KB)

    A discussion is given on the provision of intelligent front ends to a suite of turbine vibration programs which are used by highly skilled engineers at CEGB. There is a brief account of the domain and the numerical simulations which model it. The authors then overview the expert system interface which was written to do a simple matching task and discuss some of its limitations when used by non-exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance improvements to the Hough transform

    Publication Year: 1990, Page(s):98 - 103
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (348 KB)

    The paper describes a new algorithm for the Hough transform, the combinatorial Hough transform, an improvement to the Hough space accumulator which gives greater resolution for a fixed size, and a new method for detecting line end points using the transform. These are described separately and implemented together to give a new algorithm with improved resolution. Also a method for the performance a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some applications of formal methods to the design of distributed knowledge base systems

    Publication Year: 1990, Page(s):133 - 138
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (392 KB)

    The paper describes a technique for formally defining the semantics of a knowledge base language-the Vienna development method (VDM). The technique is shown to have applications in query optimisation and in the maintenance of consistency of the knowledge. The paper suggests that the same approach can help in the development of translators between different knowledge models. It is also anticipated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of abstraction in automatic inference

    Publication Year: 1990, Page(s):365 - 370
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (392 KB)

    Informally, abstraction can be described as the process of mapping a representation of a problem onto a new representation. Unfortunately, work on abstraction has on the whole remained at this informal level. The paper describes the beginnings of a theory of abstraction View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.