{"title":"An explicitly declared delayed-branch mechanism for a superscalar architecture","authors":"Roger Collins, Gordon Steven","doi":"10.1016/0165-6074(94)90016-7","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90016-7","url":null,"abstract":"<div><p>One of the main obstacles to exploiting the fine-grained parallelism that is available in general-purpose code is the frequency of branches that cause unpredictable changes in the control flow of a program at run-time. Whenever a branch is taken, a performance penalty may be incurred as the processor waits for instructions to be fetched from the branch target stream. RISC processors introduce a delayed-branch mechanism which defines branch delay slots into which code can be scheduled. This strategy allows the processor to be kept busy executing useful instructions while the change of control flow takes place. While the concept of delayed branches can be readily extended to VLIW architectures, it is less clear how it should be incorporated in a superscalar architecture. This paper proposes a general branch-delay mechanism which is suitable for a range of code-compatible superscalar processors and which completely avoids the need to introduce NOPs into the code. This technique was developed as an integral part of the HSP superscalar project. HSP is a superscalar architecture currently being researched at the University of Hertfordshire with the aim of using compile-time instruction scheduling to achieve an order of magnitude speed-up over traditional RISC architectures for a suite of non-numeric benchmark programs.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 677-680"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90016-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72293895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Miskolczi , Ta Manh Dung , K. Tarnay , J. Szabó
{"title":"Conformance testing of X-25 packet level","authors":"J. Miskolczi , Ta Manh Dung , K. Tarnay , J. Szabó","doi":"10.1016/0165-6074(94)90022-1","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90022-1","url":null,"abstract":"<div><p>This paper explains a method and tool for conformance testing of X.25 packet level protocol, and DTE equipment based on X.25 protocols. The method uses standard test suites, and standardized TTCN (Tree and Tabular Combined Notation).</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 703-705"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90022-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72293925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern recognition with fuzzy neural network","authors":"V. Guštin, J. Virant","doi":"10.1016/0165-6074(94)90073-6","DOIUrl":"10.1016/0165-6074(94)90073-6","url":null,"abstract":"<div><p>This paper explains the character code recognition with the Boolean classifier. The binary values are used both for inputs and outputs, while the learning of the circuit with a set of patterns is done by modified algorithms used in some Boolean neural networks. The use of the fuzzy logic approach offers the possibility of creating a character recognition theory which is fault-tolerant and applicable to all sorts of typefaces and fonts. It provides several examples of patterns scanned with different resolutions and learned with a part of the same set of samples which demonstrates the quality of the fuzzy Boolea classifier.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 935-938"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90073-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123730283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of network protocol performance in the context of multi-workstation parallel distributed applications","authors":"Matthew J. Jubb, Alan Purvis","doi":"10.1016/0165-6074(94)90045-0","DOIUrl":"10.1016/0165-6074(94)90045-0","url":null,"abstract":"<div><p>In this paper we conduct a detailed performance analysis of four distinct member protocols from the Internet TCP/IP family, these being the user datagram protocol (UDP), transmission control protocol (TCP), the remote procedure call system (RPC) and data transmission aspects of the network file system (NFS). We discuss the trends in computer development which have led to the widespread use of distributed workstation environments interconnected by local area networks, the motivation for implementing parallel distributed programs on such systems and the impact that protocol-selection can have on the overall efficiency of such an application.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 807-810"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90045-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal evaluation of path predicates in object-oriented queries","authors":"Sang Koo Seo, Yoon Joon Lee","doi":"10.1016/0165-6074(94)90033-7","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90033-7","url":null,"abstract":"<div><p>Query optimization in object-oriented databases requires new techniques for supporting features such as methods, path expressions, and so on. In this paper we address the optimization of path predicates in object-oriented queries. We apply the genetic search strategies to our optimization problem, and show that our formulation is well-suited to genetic algorithms.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 751-754"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90033-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72236031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coupling algorithms for replicated objects and processes","authors":"Vittoria Gianuzzi","doi":"10.1016/0165-6074(94)90043-4","DOIUrl":"10.1016/0165-6074(94)90043-4","url":null,"abstract":"<div><p>The problem of defining a general scheme for interfacing replication for software fault tolerance (diverse software versions) and system replication techniques (distributed execution of process replicas) is investigated. An algorithm, called <em>Minimum Information Algorithm</em>, is defined in order to couple object copies and process replicas.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 799-802"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90043-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Steiner tree balancing in distributed algorithm for multicast connection setup","authors":"Roman Novak, Gorazd Kandus","doi":"10.1016/0165-6074(94)90042-6","DOIUrl":"10.1016/0165-6074(94)90042-6","url":null,"abstract":"<div><p>An algorithm for multicast connection setup based on the distributed Takahashi-Matsuyama algorithm is reviewed. Additional level of unexplored parallelism that allows better time performance has been identified. The described improvement is based on the adaptive balancing of the growing Steiner tree during the connection construction process. A simulation study on the time complexity indicates a speedup with regard to the original algorithm as well as to our earlier improvement.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 795-798"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90042-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards amalgamating high-level synthesis and proof systems","authors":"Mats Larsson","doi":"10.1016/0165-6074(94)90067-1","DOIUrl":"10.1016/0165-6074(94)90067-1","url":null,"abstract":"<div><p>This paper gives an overview of an ongoing research project on the application of formal methods to high-level synthesis. The key idea is to embed a design representation used in an existing high-level synthesis system in a mechanical proof system. This approach has the following properties: First, we use a design representation proved applicable to high-level synthesis; Second, we can reason about design transformations used in an existing high-level synthesis system; Third, we allow formal reasoning about both control and data; and Fourth, we provide mechanical support for formal reasoning.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 909-912"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90067-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bit-serial VLSI architecture for the 2-D discrete cosine transform","authors":"Anna Tatsaki, Costas Goutis","doi":"10.1016/0165-6074(94)90050-7","DOIUrl":"10.1016/0165-6074(94)90050-7","url":null,"abstract":"<div><p>In this paper, a VLSI architecture for the computation of the 2-D <em>N</em> × <em>N</em>-point Discrete Cosine Transform (DCT) is presented, where <em>N</em> is a power of 2. The proposed bit-serial architecture has highly regular structure and exhibits high data throughput rate. It is based on a high performance application specific multiplier. A chip was designed for the computation of the 4 × 4-point DCT exhibiting a performance of 246 <em>M</em><em>pixels/sec.</em></p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 829-832"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90050-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116574877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}