Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 50, Issue 5May 2001
Reflects downloads up to 03 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Bit-Parallel Systolic Multipliers for GF(2m) Fields Defined by All-One and Equally Spaced Polynomials

Two operations, the cyclic shifting and the inner product, are defined by the properties of irreducible all one polynomials. An effective algorithm is proposed for computing multiplications over a class of fields $GF(2^m)$ using the two operations. Then,...

research-article
A Fast Algorithm for Multiplicative Inversion in GF(2m) Using Normal Basis

A fast algorithm for multiplicative inversion in $GF(2^m)$ using normal basis is proposed. It is an improvement on those proposed by Itoh and Tsujii and by Chang et al., which are based on Fermat's Theorem and require $O(\log m)$ multiplications. The ...

research-article
Bound Computation of Dependability and Performance Measures

We propose a new method to obtain bounds of dependability, performance or performability measures concerning complex systems modeled by a large Markov model. It extends previously published techniques mainly designed to the analysis of dependability ...

research-article
Synchronous Bandwidth Allocation for Real-Time Communications with the Timed-Token MAC Protocol

One of the key issues in tailoring the timed-token MAC protocol for real-time applications is synchronous bandwidth allocation (SBA), whose objective is to meet both the protocol and deadline constraints. The former constraint requires that the total ...

research-article
Symbolic Analysis of Bounded Petri Nets

This work presents a symbolic approach for the analysis of bounded Petri nets. The structure and behavior of the Petri net is symbolically modeled by using Boolean functions, thus reducing reasoning about Petri nets to Boolean calculation. The set of ...

research-article
Semiconcurrent Error Detection in Data Paths

A high-level synthesis strategy is proposed for design of semiconcurrently self-checking devices. Attention is mainly focused on data path design. After identifying the reference architecture against which cost and performance are evaluated, a ...

research-article
Design and evaluation of the Fibonacci optical ATM switch

An ATM switch architecture that uses optical delay fibers as buffers is presented. Based on the remarkable properties of the Fibonacci numbers, the architecture requires few fibers and yields low cell loss rates and latencies across diverse time-...

research-article
Uniprocessor Virtual Memory without TLBs

We present a feasibility study for performing virtual address translation without specialized translation hardware. Removing address translation hardware and instead managing address translation in software has the potential to make the processor design ...

research-article
An Optimal Fault-Tolerant Routing Algorithm for Double-Loop Networks

A weighted double-loop network can be modeled by a directed graph $G(n;h_1,h_2;w_1,w_2)$ with vertex set $Z_n=\{0,1,\ldots,n-1\}$ and edge set $E=E_1\cup E_2$, where $E_1=\{(u,u+h_1)\;|\; u\in Z_n\}$, $E_2=\{(u,u+h_2)\;|\; u\in Z_n\}$. Assume that the ...

research-article
Push-Based Information Delivery in Two Stage Satellite-Terrestrial Wireless Systems

One of the prominent objectives of National/Global Information Infrastructure is to provide all types of users global access to information. Satellite broadcast data delivery has inherent advantages, such as scalability and location independent ...

research-article
Parallel Matrix Multiplication on a Linear Array with a Reconfigurable Pipelined Bus System

The known fast sequential algorithms for multiplying two $N\times N$ matrices (over an arbitrary ring) have time complexity $O(N^\alpha)$, where $2 < \alpha < 3$. The current best value of $\alpha$ is less than 2.3755. We show that, for all $1 \le p \le ...

research-article
Comment on 'On-Line Scheduling Policies for a Class of IRIS Real-Time Tasks'

Scheduling policies for real-time tasks which receive rewards that depend on the amount of service received were presented by Dey et al. The policies utilized heuristic approaches to maximize the total accrued reward. In this comment, we propose an ...

Comments