Home
>
Journals & magazines
>
IEE Proceedings E (Computers and Digital Techniqu...
>
Volume 138
Issue 3
IEE Proceedings E (Computers and Digital Techniques)
Volume 138, Issue 3, May 1991
Volumes & issues:
Volume 138, Issue 3
May 1991
Fine grain mapping strategy for multiprocessor systems
- Author(s): J.J. Shieh and C.A. Papachristou
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 109 –120
- DOI: 10.1049/ip-e.1991.0015
- Type: Article
- + Show details - Hide details
-
p.
109
–120
(12)
A fine grain mapping strategy for multiprocessor systems especially suitable for RISC and VLIW type MIMD computers is described. The objective of the strategy is to minimise the total execution time of the application algorithms that are to be executed on the target systems. An application algorithm which has been coded as a straight line program is compiled to generate intermediate codes. This code is then represented by a data dependence graph. A node in the graph corresponds to the operation of one intermediate code statement, and arcs between nodes represent the data dependence between operations. The mapping strategy, called SR-mapper, is a generalised list scheduler. When SR-mapper does the mapping procedure, the data dependence between nodes, the pipeline effect of each processing element within the system, and the communication cost between processing elements are considered. SR-mapper uses slot reservation technique to insert send nodes for the immediate successor nodes when a node has been scheduled to maintain the data dependence between nodes and to achieve the synchronisation between processing elements. SR-mapper has been implemented and several scientific application algorithms, such as matrix multiplication, L-U decomposition, weighted median filter, convolution kernel etc. have been used as the testing inputs. Results show that on the average the speedup obtained by SR-mapper is 4.480 times as large as the one obtained by the mapper which does not employ the pipeline effect assuming the weight of operations are 4 for addition and subtraction and 6 for multiplication and division. During the mapping phase, if the slot reservation technique is adopted, the gain of speedup is 21%, on the average, more than the one obtained by the mapper which does not apply the slot reservation technique. If all nodes have an equal weight of 1, the average efficiency of the systems with the number of processing elements ranging from 2 to 32 and communication costs ranging from 0 to 20 is 0.481. These results are encouraging.
Simple but effective modification to a multiplicative congruential random-number generator
- Author(s): W.G. Chambers and Z.D. Dai
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 121 –122
- DOI: 10.1049/ip-e.1991.0016
- Type: Article
- + Show details - Hide details
-
p.
121
–122
(2)
A popular form of random-number generator uses the recurrence sk = (ASk−1 mod 2e with A and s0 odd to produce a pseudo-random sequence of integers in the range 0 to 2e − 1. We give a simple modification which increases the guaranteed period by an enormous factor with only a small computational overhead. The recurrence is changed to sk = (Ask−1 + Sk−n mod 2e where n is such that xn + x + 1 is a primitive binary polynomial. The period is increased from 2e−2 to (2n−1)2e−1. The overhead is an extra addition and the inclusion of a circular buffer of length n.
On nonuniform packet switched delta networks and the hot-spot effect
- Author(s): P.G. Harrison
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 123 –130
- DOI: 10.1049/ip-e.1991.0017
- Type: Article
- + Show details - Hide details
-
p.
123
–130
(8)
We analyse the performance of a multistage interconnection network (MIN) with a packet-switching protocol, embedded in a closed network of processors. First, the expected value of transmission time through a delta-2 type of MIN is determined. We then obtain, for the first time by an analytical method, a formula for its probability density function from which the variance and higher moments follow. Previously densities have only been estimated by simulation which is expensive and can be unreliable, especially in the often crucial tail region. Numerical results reveal new insights into the hot-spot phenomenon which occurs when one output address is selected more frequently than the others. We first show how mean transmission time on hot paths increases with the hot-spot intensity and compare this with cooler paths. We also plot the density functions for these transmission times. Hence it is possible to determine precisely transmission time variability and to obtain reliability measures from their tails. The approach can handle arbitrary routing frequencies to the MIN output addresses and suggests new approximation techniques with wider applicability.
Approach for the reconfiguration of multipipeline arrays
- Author(s): P. Koo ; F. Lombardi ; Y.-N. Shen
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 131 –137
- DOI: 10.1049/ip-e.1991.0018
- Type: Article
- + Show details - Hide details
-
p.
131
–137
(7)
A new approach for reconfiguring multipipeline arrays from two-dimensional arrays is analysed. The proposed reconfiguration approach is fully characterised and the conditions for switching and routing are given. A polynomial time complexity algorithm is proposed for the reconfiguration of multipipeline arrays. This algorithm is based on a novel divide-and-conquer technique; this technique is based on a heuristic condition for dividing an array into multiple sub-arrays. This results in a lower internal delay. This condition also achieves lower values for average intercell and pipeline delays than previous approaches. It is proved that using the proposed algorithm, maximum multipipeline generation is possible. A switching arrangement consisting of two buses per channel is required.
VLSI implementation of Tausworthe random number generator for parallel processing environment
- Author(s): J. Saarinen ; J. Tomberg ; L. Vehmanen ; K. Kaski
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 138 –146
- DOI: 10.1049/ip-e.1991.0019
- Type: Article
- + Show details - Hide details
-
p.
138
–146
(9)
A fast Tausworthe-type random number generator has been implemented as a VLSI circuit on silicon for Monte-Carlo simulation purposes in a parallel multiprocessor system environment. The generator, which has uniform distribution, has been contructed for use as a peripheral device to be connected with each processor unit. General considerations for parallel random number generation are discussed and desirable properties are reviewed as a starting point for a VLSI implementation. The hardware design is based on the maximal length shift register sequences. It involves concurrent architecture in which a single shift operation is equivalent to 16 shifts in the original shift register unit. A new 16-bit random number is generated during each shifting operation. The chip is fully microprocessor bus compatible with a 16-bit bidirectional data bus and three I/O control lines. The methods of shift register sequence segmentation are also reviewed. Practical aspects for parallel processing system purposes are given. The generator has been submitted to a comprehensive set of statistical tests.
The fast Tamari transform
- Author(s): A. Lloris ; J. Ortega ; A. Prieto
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 147 –153
- DOI: 10.1049/ip-e.1991.0020
- Type: Article
- + Show details - Hide details
-
p.
147
–153
(7)
The fast Tamari transform (FTT), which is suitable to obtain some properties of p-valued digital functions and networks (p being the power of a prime) is presented. A systematic procedure to calculate the FTT is defined, and an expression for the complexity of calculation, and flow-graphs and networks for the calculation of the FTT are also presented. All aspects are illustrated with several examples.
Efficient techniques in the sizing and constrained optimisation of CMOS combinational logic circuits
- Author(s): J.-S. Hwang and C.-Y. Wu
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 154 –164
- DOI: 10.1049/ip-e.1991.0021
- Type: Article
- + Show details - Hide details
-
p.
154
–164
(11)
Two techniques are proposed which enhance the optimisation efficiency of CMOS combinational logic circuits. One uses transition times (rise and fall times) of each gate as variables of the optimisation process. The other technique uses the optimal characteristic waveform synthesising method (OCWSM) to obtain the initial guess for the optimisation process. The optimisation process, with these two techniques, can perform sizing and optimisation for circuits with a smaller fixed-delay specification than other sizing and optimisation algorithms. The circuits sized using the proposed algorithm have shown a smaller power dissipation, especially when the delay specification is small. The CPU time consumed is reasonable. High-speed low-power circuits are thus more realisable using the proposed algorithm.
Remote password authentication with smart cards
- Author(s): C.-C. Chang and T.-C. Wu
- Source: IEE Proceedings E (Computers and Digital Techniques), Volume 138, Issue 3, p. 165 –168
- DOI: 10.1049/ip-e.1991.0022
- Type: Article
- + Show details - Hide details
-
p.
165
–168
(4)
A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system verifies the remotely submitted password to check if the login request is accepted or rejected. A signature scheme and communication timestamps are provided in the authentication phase against the potential attacks of replaying a previously intercepted login request.
Most viewed content for this Journal
Article
content/journals/ip-e
Journal
5
Most cited content for this Journal
We currently have no most cited data available for this content.