By Topic

IEEE Transactions on Computers

Issue 1 • Jan. 1974

Filter Results

Displaying Results 1 - 25 of 29
  • IEEE Transactions on Computers - Table of contents

    Publication Year: 1974, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (519 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1974, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • Fast Computational Algorithms for Bit Reversal

    Publication Year: 1974, Page(s):1 - 9
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3160 KB)

    Radix—2 fast Fourier transform programs of the Gentleman-Sande type leave the transformed array in a scrambled order of frequencies. Unscrambling is accomplished by moving each element from its present location into a new location obtained by bit reversal. Bit reversal can be interpreted as an exchange of groups of bits symmetric with respect to a pivot. Two formulas are developed for simult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Floating-Point Arithmetic Algorithms in the Symmetric Residue Number System

    Publication Year: 1974, Page(s):9 - 20
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3592 KB)

    The residue number system is an integer number system and is inconvenient to represent numbers with fractional parts. In the symmetric residue system, a new representation of floating-point numbers and arithmetic algorithms for its addition, subtraction, multiplication, and division are proposed. A floating-point number is expressed as an integer multiplied by a product of the moduli. The proposed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Theory of Universal Speed-Independent Modules

    Publication Year: 1974, Page(s):21 - 33
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3336 KB)

    Of concern here are asynchronous modules, i.e., those whose activity is regulated by initiation and completion signals with no clocks being present. First a number of operating conditions are described that are deemed essential or useful in a system of asynchronous modules, while retaining an air of independence of particular hardware implementations as much as possible. Second, some results are p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Two-Level Exclusive-or Majority Networks

    Publication Year: 1974, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2416 KB)

    It is shown that not all Boolean functions can be realized by a two-level EXCLUSIVE-OR majority network. However, if repeats at the first level are allowed, then it is shown that such a network is universal. A minimal weight vector with respect to this latter network is defined. By using the restricted-affine-group (RAG) equivalence of Boolean functions, it is shown that if two functions are in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Two-Level Fault-Tolerant Networks

    Publication Year: 1974, Page(s):41 - 48
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3760 KB)

    Some new techniques for the synthesis of fault-tolerant two-level combinational networks are presented. Two classes of faults are defined, 1) critical faults and 2) subcritical faults. Critical fauls are the class of faults that cannot be tolerated by any two-level networks. Necessary conditions for synthesis of networks tolerating subcritical faults are developed. As a result it is established th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple-Fault Detection and Location in Fan-Out Free Combinational Circuits

    Publication Year: 1974, Page(s):48 - 55
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3368 KB)

    Two algorithms are presented for the detection and location of single or multiple stuck faults in a fan-out free combinational circuit. The algorithms are based on a canonic representation of the indistinguishability classes of faults. The number of tests required in these algorithms are shown to be a linear function of the number of gates in the circuit. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Modifying Logic Networks to Improve Their Diagnosability

    Publication Year: 1974, Page(s):56 - 62
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2176 KB)

    This paper considers the use of control logic to reduce the number of tests required by a logic network and to simplify test generation. The properties of EXCLUSIVE-OR (EOR) circuits as control elements are examined. Systematic procedures are presented for modifying any combinational or sequential network so that the resulting network requires only five tests. These tests can easily be generated u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal One-Bit Full Adders With Different Types of Gates

    Publication Year: 1974, Page(s):63 - 70
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3304 KB)

    Optimal networks with thirty different types of restrictions are listed for the one-bit fuli adder. Optimality is derined as the minimization of the number of gates under different restrictions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a New Class of Bounds on Bayes Risk in Multihypothesis Pattern Recognition

    Publication Year: 1974, Page(s):70 - 80
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3760 KB)

    An important measure concerning the use of statistical decision schemes is the error probability associated with the decision rule. Several methods giving bounds on the error probability are presently available, but, most often, the bounds are loose. Those methods generally make use of so-cailed distances between statistical distributions. In this paper a new distance is proposed which permits tig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State Minimization of Incompletely Specified Sequential Machines

    Publication Year: 1974, Page(s):80 - 84
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2944 KB)

    A simple procedure for the state minimization of an incompletely specified sequential machine whose number of internal states is not very large is presented. It introduces the concept of a compatibility graph from which the set of maximal compatibles of the machine can be very conveniently derived. Primary and secondary implication trees associated with each maximal compatible are then constructed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A State Assignment Technique for Sequential Machines Using J-K Flip-Flops

    Publication Year: 1974, Page(s):85 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    Several techniques for choosing state assignments which tend to minimize the combinational input and output circuitry of sequential machines have been developed. One of these techniques is a heuristic scoring approach which was originally developed assuming delays as memory elements [1]. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization of Connection Assignment of Diagnosable Systems

    Publication Year: 1974, Page(s):86 - 88
    Cited by:  Papers (263)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    Preparata, Metze, and Chien [1] gave necessary conditions for identification of all faulty units in a system S capable of automatic fault diagnosis. We show that these conditions are sufficient if in S no two units test each other. Necessary and sufficient conditions are also obtained for the general case when no such restriction is placed on S. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm for Computing Correlations

    Publication Year: 1974, Page(s):88 - 90
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    In this correspondence we present a new algorithm for computing the correlation [mi][/mi]. For applications where the "cost" of a multiplication is greater than that of an addition, the new algorithm is always more computationally efficient than direct evaluation of the correlation, and it is generally more efficient than FFT methods for processing 128 or fewer data points, or for calculating only... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete Cosine Transform

    Publication Year: 1974, Page(s):90 - 93
    Cited by:  Papers (1502)  |  Patents (57)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB)

    A discrete cosine transform (DCT) is defined and an algorithm to compute it using the fast Fourier transform is developed. It is shown that the discrete cosine transform can be used in the area of digital processing for the purposes of pattern recognition and Wiener filtering. Its performance is compared with that of a class of orthogonal transforms and is found to compare closely to that of the K... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimization of Linear Sequential Machines

    Publication Year: 1974, Page(s):93 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    An algorithm is presented to minimize linear sequential machines to reduced form. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequential Algorithm for the Determination of Maximum Compatibles

    Publication Year: 1974, Page(s):95 - 98
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    This correspondence describes an algorithm which finds the maximum compatibles (maximal complete subgraphs of a symmetric graph) sequentially and in lexicographic order. The algorithm is intended for use in digital computers, where it requires only a small program and very little memory space. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Easily Testable Cellular Realizations for the (Exactly P)-out-of n and (p or More)-out-of n Logic Functions

    Publication Year: 1974, Page(s):98 - 100
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Networks to realize all n-variable symmetric threshold functions and elementary symmetric functions are given. It is also shown that only 2n test inputs are necessary and sufficient to test any number of faults in these networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computational Algorithm for Solving a System of Coupled Algebraic Matrix Riccati Equations

    Publication Year: 1974, Page(s):100 - 102
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    A computational algorithm for solving a system of coupled matrix algebraic equations is presented in this paper. Such equations arise in optimal control problems of linear systems with jump parameters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantization Complexity and Independent Measurements

    Publication Year: 1974, Page(s):102 - 106
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    It is known that, in general, the number of measurements in a pattern classification problem cannot be increased arbitrarily, when the class-conditional densities are not completely known and only a finite number of learning samples are available. Above a certain number of measurements, the performance starts deteriorating instead of improving steadily. It was earlier shown by one of the authors t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Implementation Method for Addition and Subtraction in Residue Number Systems

    Publication Year: 1974, Page(s):106 - 109
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    This correspondence describes an implementation scheme for the operations of addition and subtraction in the residue number systems. The method is based on the property that the set of residues modulo m form a finite group under addition and subtraction (modulo m). The proposed adder/subtractor structure is very systematic and, hence, suitable for MSI/LSI realization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • B74-1 Complexity of Computer Computations

    Publication Year: 1974, Page(s):109 - 110
    Request permission for commercial reuse | PDF file iconPDF (448 KB)
    Freely Available from IEEE
  • B74-2 Man and the Computer

    Publication Year: 1974, Page(s): 110
    Request permission for commercial reuse | PDF file iconPDF (288 KB)
    Freely Available from IEEE
  • B74-3 Design Automation of Digital Systems–Volume 1, Thoery and Techniques

    Publication Year: 1974, Page(s):110 - 111
    Request permission for commercial reuse | PDF file iconPDF (560 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Computers is a monthly publication with a wide distribution to researchers, developers, technical managers, and educators in the computer field.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Paolo Montuschi
Politecnico di Torino
Dipartimento di Automatica e Informatica
Corso Duca degli Abruzzi 24 
10129 Torino - Italy
e-mail: pmo@computer.org