Pub Date : 1994-12-01Epub Date: 2003-07-30DOI: 10.1016/0165-6074(94)90050-7
Anna Tatsaki, Costas Goutis
In this paper, a VLSI architecture for the computation of the 2-D N × N-point Discrete Cosine Transform (DCT) is presented, where N is a power of 2. The proposed bit-serial architecture has highly regular structure and exhibits high data throughput rate. It is based on a high performance application specific multiplier. A chip was designed for the computation of the 4 × 4-point DCT exhibiting a performance of 246 Mpixels/sec.
{"title":"A bit-serial VLSI architecture for the 2-D discrete cosine transform","authors":"Anna Tatsaki, Costas Goutis","doi":"10.1016/0165-6074(94)90050-7","DOIUrl":"10.1016/0165-6074(94)90050-7","url":null,"abstract":"<div><p>In this paper, a VLSI architecture for the computation of the 2-D <em>N</em> × <em>N</em>-point Discrete Cosine Transform (DCT) is presented, where <em>N</em> is a power of 2. The proposed bit-serial architecture has highly regular structure and exhibits high data throughput rate. It is based on a high performance application specific multiplier. A chip was designed for the computation of the 4 × 4-point DCT exhibiting a performance of 246 <em>M</em><em>pixels/sec.</em></p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 829-832"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90050-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116574877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90017-5
Minsuk Lee , Sang Lyul Min, Chong Sang Kim
Predictable performance is crucial for real-time computing systems. We propose a buffered threaded prefetch scheme as a predictable and high performance instruction memory hierarchy. We also give extensions to the timing schema[3] to analyze the timing effects of the proposed scheme. In the extended timing schema, we associate with each program construct what we call a WCTA (Worst Case Timing Abstraction), which contains detailed timing information of the program construct. By defining a concatenation operation on WCTAs, our revised timing schema accurately accounts for the timing effects of the buffered threaded prefetching not only within but also across program constructs. This paper shows, through analysis using a timing tool based on the extended timing schema, the buffered prefetch scheme significantly improves the worst case execution times of tasks.
{"title":"A worst case timing analysis technique for instruction prefetch buffers","authors":"Minsuk Lee , Sang Lyul Min, Chong Sang Kim","doi":"10.1016/0165-6074(94)90017-5","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90017-5","url":null,"abstract":"<div><p>Predictable performance is crucial for real-time computing systems. We propose a buffered threaded prefetch scheme as a predictable and high performance instruction memory hierarchy. We also give extensions to the timing schema[3] to analyze the timing effects of the proposed scheme. In the extended timing schema, we associate with each program construct what we call a WCTA (Worst Case Timing Abstraction), which contains detailed timing information of the program construct. By defining a concatenation operation on WCTAs, our revised timing schema accurately accounts for the timing effects of the buffered threaded prefetching not only within but also across program constructs. This paper shows, through analysis using a timing tool based on the extended timing schema, the buffered prefetch scheme significantly improves the worst case execution times of tasks.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 681-684"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90017-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72293897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90024-8
Mária Törő , Gábor Ziegler
{"title":"Validation of abstract test suites with use of SDL","authors":"Mária Törő , Gábor Ziegler","doi":"10.1016/0165-6074(94)90024-8","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90024-8","url":null,"abstract":"","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 711-714"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90024-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72293929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90071-X
Chrissavgi Dre, George Branis, Costas Goutis
In this paper, we introduce a new image compression scheme that it involves three steps: First a multiresolution decomposition of the images is performed using the Wavelet Transform (WT). A thresholding algorithm is then used for the wavelet coefficients. Finally, the coefficients derived from the second step are vector quantized using a multiresoltuion codebook. The LGB algorithm is used for the Vector Quantization (VQ). Our experimental results showed that the Lena image can be coded by a two-level system at the rate of 0.24 bpp having a PSNR of 30.40 db.
{"title":"Image coding using vector quantization of wavelet coefficients","authors":"Chrissavgi Dre, George Branis, Costas Goutis","doi":"10.1016/0165-6074(94)90071-X","DOIUrl":"10.1016/0165-6074(94)90071-X","url":null,"abstract":"<div><p>In this paper, we introduce a new image compression scheme that it involves three steps: First a multiresolution decomposition of the images is performed using the Wavelet Transform (WT). A thresholding algorithm is then used for the wavelet coefficients. Finally, the coefficients derived from the second step are vector quantized using a multiresoltuion codebook. The LGB algorithm is used for the Vector Quantization (VQ). Our experimental results showed that the Lena image can be coded by a two-level system at the rate of 0.24 bpp having a <em>PSNR</em> of 30.40 <em>db</em>.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 927-930"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90071-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123016322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01Epub Date: 2003-07-30DOI: 10.1016/0165-6074(94)90058-2
Zdenek Blazek
This submission describes a system of data entry and acquisition for monitoring and diagnostics of aircraft. We shall discuss a four processor system in which single processors communicate with each other via serial links. All important parts will be described in following paragraphs.
{"title":"Multiprocessor flight data acquisition system","authors":"Zdenek Blazek","doi":"10.1016/0165-6074(94)90058-2","DOIUrl":"10.1016/0165-6074(94)90058-2","url":null,"abstract":"<div><p>This submission describes a system of data entry and acquisition for monitoring and diagnostics of aircraft. We shall discuss a four processor system in which single processors communicate with each other via serial links. All important parts will be described in following paragraphs.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 871-874"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90058-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01Epub Date: 2003-07-30DOI: 10.1016/0165-6074(94)90040-X
Patrick Bonnin , Edwige E. Pissaloux , T. Dillon
This paper presents an effort to define a method for evaluation of parallel architectures dedicated to vision. A definition of the benchmark concept, and a characterisation of a standard set of general-purpose vision algorithms which could constitue a benchmark are proposed. These algorithms are independent of machine architecture, environments, programming models and parallelisation techniques supported. A detailed example illustrating the proposed approach is given.
{"title":"Towards a definition of benchmarks for parallel computers dedicated to image processing/understanding","authors":"Patrick Bonnin , Edwige E. Pissaloux , T. Dillon","doi":"10.1016/0165-6074(94)90040-X","DOIUrl":"10.1016/0165-6074(94)90040-X","url":null,"abstract":"<div><p>This paper presents an effort to define a method for evaluation of parallel architectures dedicated to vision. A definition of the benchmark concept, and a characterisation of a standard set of general-purpose vision algorithms which could constitue a benchmark are proposed. These algorithms are independent of machine architecture, environments, programming models and parallelisation techniques supported. A detailed example illustrating the proposed approach is given.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 783-787"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90040-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129332353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90068-X
Hoon Chang , Jacob A. Abraham
Several timing verification algorithms for combinational circuits have been proposed in the last few years. However, similar algorithms do not exist for sequential circuits. Existing algorithms have difficulty in performing timing verification even for combinational circuits due to the excessive computation time and memory requirement for identifying the critical path. This paper presents a critical path analysis algorithm for sequential circuits. The algorithm can be used to identify the critical path of a sequential circuit while considering exact operation of the circuit without assuming the use of scan techniques. The input sequence which sensitizes the critical path is determined as well.
{"title":"An efficient critical path tracing algorithm for sequential circuits","authors":"Hoon Chang , Jacob A. Abraham","doi":"10.1016/0165-6074(94)90068-X","DOIUrl":"10.1016/0165-6074(94)90068-X","url":null,"abstract":"<div><p>Several timing verification algorithms for combinational circuits have been proposed in the last few years. However, similar algorithms do not exist for sequential circuits. Existing algorithms have difficulty in performing timing verification even for combinational circuits due to the excessive computation time and memory requirement for identifying the critical path. This paper presents a critical path analysis algorithm for sequential circuits. The algorithm can be used to identify the critical path of a sequential circuit while considering exact operation of the circuit without assuming the use of scan techniques. The input sequence which sensitizes the critical path is determined as well.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 913-916"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90068-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90021-3
Jos Nijhuis , Herman van Aartsen, Emilija Barakova, Walter Jansen, Ben Spaanenburg
Once a fuzzy controller is specified by a rule-set, it can be implemented in dedicated hardware or as a software program. For industrial applications, an inexpensive micro-controller with limited resources is often selected. The implementation (or mapping) issue then leads to a tradeoff between operation speed and memory usage. This paper presents a set of basic transformation rules that allows the designer to optimize such a mapping.
{"title":"On the optimal mapping of fuzzy rules on standard micro-controllers","authors":"Jos Nijhuis , Herman van Aartsen, Emilija Barakova, Walter Jansen, Ben Spaanenburg","doi":"10.1016/0165-6074(94)90021-3","DOIUrl":"10.1016/0165-6074(94)90021-3","url":null,"abstract":"<div><p>Once a fuzzy controller is specified by a rule-set, it can be implemented in dedicated hardware or as a software program. For industrial applications, an inexpensive micro-controller with limited resources is often selected. The implementation (or mapping) issue then leads to a tradeoff between operation speed and memory usage. This paper presents a set of basic transformation rules that allows the designer to optimize such a mapping.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 697-700"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90021-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90041-8
T. Pyssysalo
Frame Synchronized Ring (FSR-bus) is a new high speed interconnection network, developed for a wide range of real time applications. The medium access control (MAC) algorithm of the FSR has been analyzed with analytical models and simulations. However, these methods have not been powerful enough for proving some interesting properties of the algorithm. In this paper we explain, how predicate/transition (Pr/T) nets can be used in the modeling of the FSR-bus. In addition, we prove the deadlock freeness and the fairness of the MAC by analyzing the Pr/T-net model of the FSR.
{"title":"Proving properties of a new high speed data bus with predicate/transition nets","authors":"T. Pyssysalo","doi":"10.1016/0165-6074(94)90041-8","DOIUrl":"10.1016/0165-6074(94)90041-8","url":null,"abstract":"<div><p><em>Frame Synchronized Ring (FSR-bus)</em> is a new high speed interconnection network, developed for a wide range of real time applications. The <em>medium access control (MAC)</em> algorithm of the FSR has been analyzed with analytical models and simulations. However, these methods have not been powerful enough for proving some interesting properties of the algorithm. In this paper we explain, how <em>predicate/transition (Pr/T) nets</em> can be used in the modeling of the FSR-bus. In addition, we prove the deadlock freeness and the fairness of the MAC by analyzing the Pr/T-net model of the FSR.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 791-794"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90041-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90065-5
Jarogniew Rykowski, Waldemar Wieczerzycki
The problem of accessing object versions from object-oriented programming language is discussed. Different approaches to consistency checking are discussed and compared. Some extensions to object-oriented languages are proposed to make it possible to version objects both at the compilation time and the application run-time.
{"title":"Using versioned object-oriented data in programming languages","authors":"Jarogniew Rykowski, Waldemar Wieczerzycki","doi":"10.1016/0165-6074(94)90065-5","DOIUrl":"10.1016/0165-6074(94)90065-5","url":null,"abstract":"<div><p>The problem of accessing object versions from object-oriented programming language is discussed. Different approaches to consistency checking are discussed and compared. Some extensions to object-oriented languages are proposed to make it possible to version objects both at the compilation time and the application run-time.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 901-904"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90065-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}