CompEuro 1992 Proceedings Computer Systems and Software Engineering最新文献

筛选
英文 中文
Hash functions for information authentication 用于信息认证的哈希函数
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218437
B. Preneel, R. Govaerts, J. Vandewalle
{"title":"Hash functions for information authentication","authors":"B. Preneel, R. Govaerts, J. Vandewalle","doi":"10.1109/CMPEUR.1992.218437","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218437","url":null,"abstract":"The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is given.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122635432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The CADEC VLSI design support methodology CADEC VLSI设计支持方法
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218424
E. Kwee-Christoph, B. Eschermann, O. Haberl, R. Kumar, A. Kunzmann
{"title":"The CADEC VLSI design support methodology","authors":"E. Kwee-Christoph, B. Eschermann, O. Haberl, R. Kumar, A. Kunzmann","doi":"10.1109/CMPEUR.1992.218424","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218424","url":null,"abstract":"The authors address the problem of design flow management with special emphasis on tool selection strategies. To solve this problem the concept and implementation of a design consultant (CADEC) is described. The concept of this expert system based facility for tool selection and execution, which enriches the CAD framework, is presented. The various phases that are to be undergone for completion of the design process are embedded within this concept. The implementational aspects of this expert facility, using an object-oriented approach, are given. CADEC offers comprehensive support through all steps of the design process and guides the designer through the complex maze of tools and data. integrated within a framework.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125703699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low storage cost, partition-tolerant dynamic algorithms for replicated file systems 用于复制文件系统的低存储成本、分区容忍动态算法
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218481
P. Hu, S. Wilbur
{"title":"Low storage cost, partition-tolerant dynamic algorithms for replicated file systems","authors":"P. Hu, S. Wilbur","doi":"10.1109/CMPEUR.1992.218481","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218481","url":null,"abstract":"Two algorithms are given for maintaining the consistency of replicated files. One is called dynamic supporting; the other is an extension of dynamic supporting called dynamic supporting with a greatest copy. The algorithms are hybrids of some existing algorithms. The correctness of these two algorithms is proved. Since replicas and votes are conceptually separated, the algorithms can achieve very good performance while still keeping storage costs very low. The proposed algorithms make no further assumptions about the distributed environment than conventional voting algorithms, so they can even tolerate network partition failures.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Specification of real-time distributed database systems 实时分布式数据库系统规范
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218479
G. Ramanathan, V. Alagar
{"title":"Specification of real-time distributed database systems","authors":"G. Ramanathan, V. Alagar","doi":"10.1109/CMPEUR.1992.218479","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218479","url":null,"abstract":"A unified framework is given for the specification of external consistency constraints, integrity constraints, and temporal consistency constraints of a real-time distributed database system. The formalism is event based and facilitates both relative and quantitative reasoning about time. The functional model of V.S. Alagar and G. Ramanathan (1991) is extended with constructs needed to specify the requirements of real-time databases. To illustrate the use of these constructs, the specification and proof of correctness of a real-time concurrency control protocol are presented.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121174114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Test quality improvement by physical testability enhancement 通过增强物理可测试性来提高测试质量
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218421
A. P. Casimiro, J. Sousa, F. Gonçalves, J. P. Teixeira
{"title":"Test quality improvement by physical testability enhancement","authors":"A. P. Casimiro, J. Sousa, F. Gonçalves, J. P. Teixeira","doi":"10.1109/CMPEUR.1992.218421","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218421","url":null,"abstract":"A methodology that provides a way to control the test quality of VLSI systems by predicting, diagnosing, and improving the IC defect coverage is presented for the case of the physical implementation of boundary scan circuitry, together with the software tools that implement it. The method allows the identification of hard-to-detect faults, their physical origin and layout location, leading to suggestions for design improvement by layout reconfiguration. The method is illustrated by the testability analysis of a full-custom design, implementing the boundary scan circuitry to be added to a core logic IC, in accordance with the IEEE P.1149 standard.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125239980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning to solve PP-attachment ambiguities in natural language processing through neural networks 学习用神经网络解决自然语言处理中的PP-attachment歧义
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218509
B. Apolloni, G. Mauri, C. Trevisson, P. Valota, A. Zanaboni
{"title":"Learning to solve PP-attachment ambiguities in natural language processing through neural networks","authors":"B. Apolloni, G. Mauri, C. Trevisson, P. Valota, A. Zanaboni","doi":"10.1109/CMPEUR.1992.218509","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218509","url":null,"abstract":"A technique is proposed, based on neural networks for dealing with a particular problem of syntactical ambiguity in the process of building the syntactical tree of an Italian sentence, namely the PP-attachment problem. The neural network was used as a daemon for a top-down parser, when it faced multiple entries in the parsing table. The network was trained to solve PP-attachment ambiguities by the well known algorithm for error back-propagation. What is new is the knowledge representation technique in the network, which has been designed to represent the relevant pieces of information about the constituents of the sentence. Performance results are reported and discussed, together with future perspectives.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121491088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hiding communication latencies in message-passing multiprocessors: a case study based on neural network simulation 隐藏消息传递多处理器中的通信延迟:基于神经网络仿真的案例研究
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218408
A. Bartoli, G. Dini
{"title":"Hiding communication latencies in message-passing multiprocessors: a case study based on neural network simulation","authors":"A. Bartoli, G. Dini","doi":"10.1109/CMPEUR.1992.218408","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218408","url":null,"abstract":"An application package which allows the user to explore the possibility of hiding communication latencies in message-passing multiprocessors is examined. The package is a neural network simulator for transputer-based machines. Simply by modifying few high-level directives in a configuration file, heuristic strategies for fully overlapping communication delays with internal computation, can be easily explored. The neural network model and the software architecture are described. An example is discussed.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129094181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive routing tool for transputer-based architectures 基于传输器的架构的自适应路由工具
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218488
A. Ciampolini, Antonio Corradi, L. Leonardi
{"title":"An adaptive routing tool for transputer-based architectures","authors":"A. Ciampolini, Antonio Corradi, L. Leonardi","doi":"10.1109/CMPEUR.1992.218488","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218488","url":null,"abstract":"A routing strategy is described, implemented for an object-oriented environment designed for a massively parallel architecture based on transputers, the MEIKO Computing Surface. The implemented routing algorithm belongs to the distance-vector family. The routing tool guarantees some pleasant properties: independence of topology, adaptability, nondeterministic behavior, and distribution of routing decision. The performance figures of the implementation are compared with the routing offered by CSSTools of MEIKO. The routing presented is adaptive and nondeterministic. It adapts both to traffic variation and to topology changes.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130511374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Test generation for gate level sequential machines: algorithms and implementation issues 门级顺序机的测试生成:算法和实现问题
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218499
E. Macii, A. Lioy, A. Meo
{"title":"Test generation for gate level sequential machines: algorithms and implementation issues","authors":"E. Macii, A. Lioy, A. Meo","doi":"10.1109/CMPEUR.1992.218499","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218499","url":null,"abstract":"Algorithms and implementation issues concerning a Boolean factorization based test generation package for gate level sequential machines are discussed. Practical aspects like justification and propagation weights computation and targeted test pattern generation are treated in depth, giving both theoretical and pseudo-code solutions. The experimental results showed that the proposed method was effective in generating sufficiently high fault coverage for the standard set of ISCAS'89 benchmark synchronous sequential circuits.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131575850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Validation using CASE tools 使用CASE工具进行验证
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218402
J. Aull
{"title":"Validation using CASE tools","authors":"J. Aull","doi":"10.1109/CMPEUR.1992.218402","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218402","url":null,"abstract":"Describes how computer assisted software engineering (CASE) tools were used in the process of validation of several reactor physics codes. ARCHY is a tool that automates most of the drudgery involved in making a programmer's reference manual. When FORTRAN source code is read by ARCHY, it outputs a data dictionary that includes a categorization of variables and common block information. It also prints structure charts and Yourdon diagrams in PostScript format. The author also describes how several off-the-shelf products were used in validating critical reactor analysis software. FORTRAN-Lint is a useful tool for correcting deviations from the FORTRAN-77 standard. DEC Test Manager and the IBM-MVS SuperCE utility are useful for regression testing. DEC's Performance and Coverage Analyzer is a powerful tool for assessing the completeness of a test suite.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信