Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90066-3
Iztok Savnik , Tomaž Mohorič , Vanja Josifovski
The query language OVAL which is intended for the integration with the database programming language based on C++ is proposed in this paper. The work addresses the impedance mismatch problem [1] between the syntax and the semantics of the programming and query language. The query language OVAL is based on the functional query language FQL [3] extending it for the manipulation of complex objects. The salient features of the OVAL query language are: (i) functional nature of the query language, which makes the language suitable for the integration with the procedural programming languages and provides modular style of query definition, (ii) the use of schema information for expressing queries and (iii) recursive evaluation of the algebraic operations on set structured complex objects.
{"title":"Extending database programming language with declarative querying facilities","authors":"Iztok Savnik , Tomaž Mohorič , Vanja Josifovski","doi":"10.1016/0165-6074(94)90066-3","DOIUrl":"10.1016/0165-6074(94)90066-3","url":null,"abstract":"<div><p>The query language OVAL which is intended for the integration with the database programming language based on C++ is proposed in this paper. The work addresses the <em>impedance mismatch</em> problem [1] between the syntax and the semantics of the programming and query language. The query language OVAL is based on the functional query language FQL [3] extending it for the manipulation of complex objects. The salient features of the OVAL query language are: (i) functional nature of the query language, which makes the language suitable for the integration with the procedural programming languages and provides modular style of query definition, (ii) the use of schema information for expressing queries and (iii) recursive evaluation of the algebraic operations on set structured complex objects.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 905-908"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90066-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90068-X
Hoon Chang , Jacob A. Abraham
Several timing verification algorithms for combinational circuits have been proposed in the last few years. However, similar algorithms do not exist for sequential circuits. Existing algorithms have difficulty in performing timing verification even for combinational circuits due to the excessive computation time and memory requirement for identifying the critical path. This paper presents a critical path analysis algorithm for sequential circuits. The algorithm can be used to identify the critical path of a sequential circuit while considering exact operation of the circuit without assuming the use of scan techniques. The input sequence which sensitizes the critical path is determined as well.
{"title":"An efficient critical path tracing algorithm for sequential circuits","authors":"Hoon Chang , Jacob A. Abraham","doi":"10.1016/0165-6074(94)90068-X","DOIUrl":"10.1016/0165-6074(94)90068-X","url":null,"abstract":"<div><p>Several timing verification algorithms for combinational circuits have been proposed in the last few years. However, similar algorithms do not exist for sequential circuits. Existing algorithms have difficulty in performing timing verification even for combinational circuits due to the excessive computation time and memory requirement for identifying the critical path. This paper presents a critical path analysis algorithm for sequential circuits. The algorithm can be used to identify the critical path of a sequential circuit while considering exact operation of the circuit without assuming the use of scan techniques. The input sequence which sensitizes the critical path is determined as well.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 913-916"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90068-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90021-3
Jos Nijhuis , Herman van Aartsen, Emilija Barakova, Walter Jansen, Ben Spaanenburg
Once a fuzzy controller is specified by a rule-set, it can be implemented in dedicated hardware or as a software program. For industrial applications, an inexpensive micro-controller with limited resources is often selected. The implementation (or mapping) issue then leads to a tradeoff between operation speed and memory usage. This paper presents a set of basic transformation rules that allows the designer to optimize such a mapping.
{"title":"On the optimal mapping of fuzzy rules on standard micro-controllers","authors":"Jos Nijhuis , Herman van Aartsen, Emilija Barakova, Walter Jansen, Ben Spaanenburg","doi":"10.1016/0165-6074(94)90021-3","DOIUrl":"10.1016/0165-6074(94)90021-3","url":null,"abstract":"<div><p>Once a fuzzy controller is specified by a rule-set, it can be implemented in dedicated hardware or as a software program. For industrial applications, an inexpensive micro-controller with limited resources is often selected. The implementation (or mapping) issue then leads to a tradeoff between operation speed and memory usage. This paper presents a set of basic transformation rules that allows the designer to optimize such a mapping.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 697-700"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90021-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90052-3
Fabrizio Ferrandi
The paper presents a methodology for an efficient testability analysis of complex VLSI circuit. It is based on controllability/observability evaluation using Binary Decision Diagrams (BDD). Efficiency is improved by intelligent use of intermediate results.
{"title":"Reduction of fault detection costs through a BDD formalism","authors":"Fabrizio Ferrandi","doi":"10.1016/0165-6074(94)90052-3","DOIUrl":"10.1016/0165-6074(94)90052-3","url":null,"abstract":"<div><p>The paper presents a methodology for an efficient testability analysis of complex VLSI circuit. It is based on controllability/observability evaluation using Binary Decision Diagrams (BDD). Efficiency is improved by intelligent use of intermediate results.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 841-844"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90052-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123714721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90041-8
T. Pyssysalo
Frame Synchronized Ring (FSR-bus) is a new high speed interconnection network, developed for a wide range of real time applications. The medium access control (MAC) algorithm of the FSR has been analyzed with analytical models and simulations. However, these methods have not been powerful enough for proving some interesting properties of the algorithm. In this paper we explain, how predicate/transition (Pr/T) nets can be used in the modeling of the FSR-bus. In addition, we prove the deadlock freeness and the fairness of the MAC by analyzing the Pr/T-net model of the FSR.
{"title":"Proving properties of a new high speed data bus with predicate/transition nets","authors":"T. Pyssysalo","doi":"10.1016/0165-6074(94)90041-8","DOIUrl":"10.1016/0165-6074(94)90041-8","url":null,"abstract":"<div><p><em>Frame Synchronized Ring (FSR-bus)</em> is a new high speed interconnection network, developed for a wide range of real time applications. The <em>medium access control (MAC)</em> algorithm of the FSR has been analyzed with analytical models and simulations. However, these methods have not been powerful enough for proving some interesting properties of the algorithm. In this paper we explain, how <em>predicate/transition (Pr/T) nets</em> can be used in the modeling of the FSR-bus. In addition, we prove the deadlock freeness and the fairness of the MAC by analyzing the Pr/T-net model of the FSR.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 791-794"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90041-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90065-5
Jarogniew Rykowski, Waldemar Wieczerzycki
The problem of accessing object versions from object-oriented programming language is discussed. Different approaches to consistency checking are discussed and compared. Some extensions to object-oriented languages are proposed to make it possible to version objects both at the compilation time and the application run-time.
{"title":"Using versioned object-oriented data in programming languages","authors":"Jarogniew Rykowski, Waldemar Wieczerzycki","doi":"10.1016/0165-6074(94)90065-5","DOIUrl":"10.1016/0165-6074(94)90065-5","url":null,"abstract":"<div><p>The problem of accessing object versions from object-oriented programming language is discussed. Different approaches to consistency checking are discussed and compared. Some extensions to object-oriented languages are proposed to make it possible to version objects both at the compilation time and the application run-time.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 901-904"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90065-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90037-X
Franz Schönbauer
A pragmatic way is shown to calculate database cache sizes for a given desired level of cache performance, without use of application information. Treating applications as black boxes allows focusing on higher order structures of database accesses to classify applications. Online tracing of all database accesses allows a near-line simulation of cache performance for various cache sizes. These simulations result in typical patterns for application groups which point to areas with strong gradients in the relation between cache size and cache efficiency which can be exploited. The near-line-ness of this calculation lends itself to automatic adaptive cache size regulation.
{"title":"Database cache requirements calculation using near-line data access traces in a 500+ user transaction system","authors":"Franz Schönbauer","doi":"10.1016/0165-6074(94)90037-X","DOIUrl":"10.1016/0165-6074(94)90037-X","url":null,"abstract":"<div><p>A pragmatic way is shown to calculate database cache sizes for a given desired level of cache performance, without use of application information. Treating applications as black boxes allows focusing on higher order structures of database accesses to classify applications. Online tracing of all database accesses allows a near-line simulation of cache performance for various cache sizes. These simulations result in typical patterns for application groups which point to areas with strong gradients in the relation between cache size and cache efficiency which can be exploited. The near-line-ness of this calculation lends itself to automatic adaptive cache size regulation.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 769-772"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90037-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129506426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90029-9
Yonglak Sohn, Sukhoon Kang, Songchun Moon
The most critical problem associated with implementing in multi-level secure database management systems (MLS/DBMSs) is a correct concurrency control under the constraints of multilevel security. This paper provides two concurrency control schemes, one based on multiversion scheme and the other based on the two-phase locking scheme.
{"title":"Concurrency control scheme in multi-level secure database management systems","authors":"Yonglak Sohn, Sukhoon Kang, Songchun Moon","doi":"10.1016/0165-6074(94)90029-9","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90029-9","url":null,"abstract":"<div><p>The most critical problem associated with implementing in <strong>multi-level secure database management systems (MLS/DBMSs)</strong> is a correct concurrency control under the constraints of multilevel security. This paper provides two concurrency control schemes, one based on <em>multiversion</em> scheme and the other based on the <em>two-phase locking</em> scheme.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 733-736"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90029-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72293894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90018-3
C. Bailey, R. Sotudeh
Stack machines, or stack based processors, have long been pigeon-holed as FORTH processors; specialised devices with little relevance for high level language applications. The failure of stack machines to address the issue of high level language support, and C in particular, has prevented wider acceptance of this promising technology despite the potential benefits of simpler hardware and low gate counts. Our research has centred upon eliminating cache and memory dependence, reducing the limits imposed by external bandwidths◊. Having previously introduced a compact multiple-instruction-per-word stack-based encoding strategy in [Bailey93a], we now present a revised model, assessing its performance with compiled C benchmarks⧫, and stressing minimisation of memory dependence.
{"title":"HLL enhancement for stack based processors","authors":"C. Bailey, R. Sotudeh","doi":"10.1016/0165-6074(94)90018-3","DOIUrl":"https://doi.org/10.1016/0165-6074(94)90018-3","url":null,"abstract":"<div><p>Stack machines, or stack based processors, have long been pigeon-holed as FORTH processors; specialised devices with little relevance for high level language applications. The failure of stack machines to address the issue of high level language support, and C in particular, has prevented wider acceptance of this promising technology despite the potential benefits of simpler hardware and low gate counts. Our research has centred upon eliminating cache and memory dependence, reducing the limits imposed by external bandwidths<span><sup>◊</sup></span>. Having previously introduced a compact multiple-instruction-per-word stack-based encoding strategy in [Bailey93a], we now present a revised model, assessing its performance with compiled C benchmarks<span><sup>⧫</sup></span>, and stressing minimisation of memory dependence.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 685-688"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90018-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72293896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1994-12-01DOI: 10.1016/0165-6074(94)90048-5
H. Mecha, M. Fernández, R. Hermida, D. Mozos, K. Olcoz
This paper presents a method to estimate the clock cycle, taking into account the dead times of the operators, that influences the total execution time, and the number of control steps, that settles the control unit size. It accepts a module library and it considers the area importance versus time importance depending on user constraints.
{"title":"Clock cycle estimation based on dead time and control unit area minimization","authors":"H. Mecha, M. Fernández, R. Hermida, D. Mozos, K. Olcoz","doi":"10.1016/0165-6074(94)90048-5","DOIUrl":"10.1016/0165-6074(94)90048-5","url":null,"abstract":"<div><p>This paper presents a method to estimate the clock cycle, taking into account the dead times of the operators, that influences the total execution time, and the number of control steps, that settles the control unit size. It accepts a module library and it considers the area importance versus time importance depending on user constraints.</p></div>","PeriodicalId":100927,"journal":{"name":"Microprocessing and Microprogramming","volume":"40 10","pages":"Pages 821-824"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0165-6074(94)90048-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128685524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}