Journal: IEEE Transactions on Computers

Volume 56, Issue 9

1153 -- 1155Rodrigo Capobianco Guido, Li Deng, Shoji Makino. Guest Editors Introduction: Special Section on Emergent Systems, Algorithms and Architectures for Speech-Based Human-Machine Interaction
1156 -- 1168Julian Odell, Kunal Mukerjee. Architecture, User Interface, and Enabling Technology in Windows Vista s Speech Systems
1169 -- 1175Maycel Isaac Faraj, Josef Bigün. Synergy of Lip-Motion and Acoustic Features in Biometric Speech and Speaker Recognition
1176 -- 1188Roger K. Moore. PRESENCE: A Human-Inspired Architecture for Speech-Based Human-Machine Interaction
1189 -- 1198Shi-Xiong Zhang, Man-Wai Mak, Helen Meng. Speaker Verification via High-Level Feature Based Phonetic-Class Pronunciation Modeling
1199 -- 1211Sakriani Sakti, Konstantin Markov, Satoshi Nakamura. Incorporating Knowledge Sources Into a Statistical Acoustic Model for Spoken Language Communication Systems
1212 -- 1224José M. Pardo, Xavier Anguera, Chuck Wooters. Speaker Diarization For Multiple-Distant-Microphone Meetings Using Several Sources of Information
1225 -- 1233Chien-Lin Huang, Chung-Hsien Wu. Generation of Phonetic Units for Mixed-Language Speech Recognition Based on Acoustic and Contextual Analysis
1234 -- 1244Po-Chuan Lin, Jia-Ching Wang, Jhing-Fa Wang, Hao-Ching Sung. Unsupervised Speaker Change Detection Using SVM Training Misclassification Rate
1245 -- 1254Chi-Chun Hsia, Chung-Hsien Wu, Jian-Qi Wu. Conversion Function Clustering and Selection Using Linguistic and Spectral Information for Emotional Voice Conversion
1255 -- 1268Martin Omaña, Daniele Rossi, Cecilia Metra. Latch Susceptibility to Transient Faults and New Hardening Approach
1269 -- 1282Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede. Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2:::n:::)
1283 -- 1291Mathieu Cluzeau. Reconstruction of a Linear Scrambler
1292 -- 1296Yossef Oren, Adi Shamir. Remote Password Extraction from RFID Tags

Volume 56, Issue 8

1009 -- 1023Jung-Chun Kao, Radu Marculescu. Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
1024 -- 1039Francisco José Alfaro, José L. Sánchez, M. Menduiña, José Duato. A Formal Model to Manage the InfiniBand Arbitration Tables Providing QoS
1040 -- 1054Sung Hoon Baek, Kyu Ho Park. Matrix-Stripe-Cache-Based Contiguity Transform for Fragmented Writes in RAID-5
1055 -- 1070Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal. Design and Performance Evaluation of Efficient Consensus Protocols for Mobile Ad Hoc Networks
1071 -- 1086Fariza Sabrina, Salil S. Kanhere, Sanjay Jha. Design, Analysis and Implementation of a Novel Multiple Resource Scheduler
1087 -- 1104Preetam Ghosh, Kalyan Basu, Sajal K. Das. A Novel Photonic Container Switched Architecture and Scheduler to Design the Core Transport Network
1105 -- 1118Cheng-Yeh Wang, Chih-Bin Kuo, Jing-Yang Jou. Hybrid Wordlength Optimization Methods of Pipelined FFT Processors
1119 -- 1132Abusaleh M. Jabir, Dhiraj K. Pradhan. A Graph-Based Unified Technique for Computing and Representing Coefficients over Finite Fields
1133 -- 1145Abusaleh M. Jabir, Dhiraj K. Pradhan, T. L. Rajaprabhu, A. K. Singh. A Technique for Representing Multiple Output Binary Functions with Applications to Verification and Simulation
1146 -- 1152Xrysovalantis Kavousianos, Emmanouil Kalligeros, Dimitris Nikolos. Optimal Selective Huffman Coding for Test-Data Compression

Volume 56, Issue 7

0 -- 0Ming Ma, Yuanyuan Yang. Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks
865 -- 875Roy Friedman, Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal. Asynchronous Agreement and Its Relation with Error-Correcting Codes
876 -- 880Bella Bose, Samir Elmougy, Luca G. Tallini. Systematic t-Unidirectional Error-Detecting Codes over Zm
881 -- 888Mehmet Hakan Karaata, Mohamed G. Gouda. A Stabilizing Deactivation/Reactivation Protocol
889 -- 908Ali Raza Butt, Chris Gniady, Y. Charlie Hu. The Performance Impact of Kernel Prefetching on Buffer Cache Replacement Algorithms
909 -- 916Ashkan Hosseinzadeh Namin, Huapeng Wu, Majid Ahmadi. Comb Architectures for Finite Field Multiplication in F(2^m)
917 -- 9249Antonio Caruso, Stefano Chessa, Piero Maestrini. Worst-Case Diagnosis Completeness in Regular Graphs under the PMC Model
925 -- 936Yuan-Shun Dai, Gregory Levitin, Kishor S. Trivedi. Performance and Reliability of Tree-Structured Grid Services Considering Data Dependence and Failure Correlation
937 -- 945Richard C. Murphy, Peter M. Kogge. On the Memory Access Patterns of Supercomputer Applications: Benchmark Selection and Its Implications
959 -- 976B. John Oommen, Sudip Misra, Ole-Christoffer Granmo. Routing Bandwidth-Guaranteed Paths in MPLS Traffic Engineering: A Multiple Race Track Learning Approach
977 -- 991Chan-Gun Lee, Aloysius K. Mok, Prabhudev Konana. Monitoring of Timing Constraints with Confidence Threshold Requirements
992 -- 998Peter J. Leadbitter, Dan Page, Nigel P. Smart. Nondeterministic Multithreading
999 -- 1005Jingxi Jia, Bharadwaj Veeravalli, Debasish Ghose. Adaptive Load Distribution Strategies for Divisible Load Processing on Resource Unaware Multilevel Tree Networks
1006 -- 1007Yu-Chen Kuo, Teng-Yi Chiu. Comments on On the Nondomination of Cohorts Coteries

Volume 56, Issue 6

721 -- 726Fabrizio Lombardi. Editor s Note
727 -- 739Tomás Lang, Alberto Nannarelli. A Radix-10 Digit-Recurrence Division Unit: Algorithm and Architecture
740 -- 753Li Zhao, Laxmi N. Bhuyan, Ravi R. Iyer, Srihari Makineni, Donald Newell. Hardware Support for Accelerating Data Movement in Server Platform
754 -- 768KwangJin Park, Hyunseung Choo. Energy-Efficient Data Dissemination Schemes for Nearest Neighbor Query Processing
769 -- 784Yeim-Kuan Chang, Yung-Chieh Lin. Dynamic Segment Trees for Ranges and Prefixes
785 -- 798Sobeeh Almukhaizim, Yiorgos Makris. Concurrent Error Detection Methods for Asynchronous Burst-Mode Machines
799 -- 814Alexander Thomasian, Gang Fu, Chunqi Han. Performance of Two-Disk Failure-Tolerant Disk Arrays
815 -- 825Young Choon Lee, Albert Y. Zomaya. Practical Scheduling of Bag-of-Tasks Applications on Grids with Dynamic Resilience
826 -- 838Tsutomu Sasao, Shinobu Nagayama, Jon T. Butler. Numerical Function Generators Using LUT Cascades
839 -- 852Diego R. Llanos Ferraris, David Orden, Belén Palop. New Scheduling Strategies for Randomized Incremental Algorithms in the Context of Speculative Parallelization
853 -- 858Luca Allulli, Roberto Baldoni, Luigi Laura, Sara Tucci Piergiovanni. On the Complexity of Removing Z-Cycles from a Checkpoints and Communication Pattern
859 -- 863Guoliang Xue, S. Kami Makki. Multiconstrained QoS Routing: A Norm Approach

Volume 56, Issue 5

577 -- 589Upavan Gupta, Nagarajan Ranganathan. Multievent Crisis Management Using Noncooperative Multistep Games
590 -- 605Wee Hock Desmond Ng, Michael P. Howarth, Zhili Sun, Haitham S. Cruickshank. Dynamic Balanced Key Tree Management for Secure Multicast Communications
606 -- 621Francesco Poletti, Antonio Poggiali, Davide Bertozzi, Luca Benini, Pol Marchal, Mirko Loghi, Massimo Poncino. Energy-Efficient Multiprocessor Systems-on-Chip for Embedded Computing: Exploring Programming Models and Their Architectural Support
622 -- 634Shorin Kyo, Shin ichiro Okazaki, Tamio Arai. An Integrated Memory Array Processor for Embedded Image Recognition Systems
635 -- 649Luca Breveglieri, Israel Koren, Paolo Maistri. An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
650 -- 661Zhaoliang Pan, Melvin A. Breuer. Estimating Error Rate in Defective Logic Using Signature Analysis
662 -- 672Katherine Compton, Scott Hauck. Automatic Design of Area-Efficient Configurable ASIC Cores
673 -- 680Ali Ahmadinia. Optimal Free-Space Management and Routing-Conscious Dynamic Placement for Reconfigurable Devices
681 -- 691Yuan-Shun Dai, Yi Pan, Xukai Zou. A Hierarchical Modeling and Analysis for Grid Service Reliability
692 -- 705Pao-Ann Hsiung, Yean-Ru Chen, Yen-Hung Lin. Model Checking Safety-Critical Systems Using Safecharts
706 -- 710Sándor Imre. Quantum Existence Testing and Its Application for Finding Extreme Values in Unsorted Databases
710 -- 715Wei-Chieh Ke, Bing-Hong Liu, Ming-Jer Tsai. Constructing a Wireless Sensor Network to Fully Cover Critical Grids by Deploying Minimum Sensors on Grid Points Is NP-Complete
716 -- 717Haining Fan, M. Anwar Hasan. Comments on Five, Six, and Seven-Term Karatsuba-Like Formulae
718 -- 719Richard West, Yuting Zhang. Comments on Dynamic Window-Constrained Scheduling of Real-Time Streams in Media Servers

Volume 56, Issue 4

433 -- 443Madhusudhanan Anantha, Bella Bose, Luca G. Tallini. ARQ Protocols and Unidirectional Codes
444 -- 458Tibor Horvath, Tarek F. Abdelzaher, Kevin Skadron, Xue Liu. Dynamic Voltage Scaling in Multitier Web Servers with End-to-End Delay Control
459 -- 473Sang Seok Lim, Kyu Ho Park. TPF: TCP Plugged File System for Efficient Data Delivery over TCP
474 -- 487Frank Zhigang Wang, Sining Wu, Na Helian, Michael Andrew Parker, Yike Guo, Yuhui Deng, Vineet R. Khare. Grid-Oriented Storage: A Single-Image, Cross-Domain, High-Bandwidth Architecture
488 -- 501Min Lee, Euiseong Seo, Joonwon Lee, Jinsoo Kim. PABC: Power-Aware Buffer Cache Management for Low Power Consumption
502 -- 510Rami G. Melhem. Low Diameter Interconnections for Routing in High-Performance Parallel Systems
511 -- 527Alper Sen, Vijay K. Garg. Formal Verification of Simulation Traces Using Computation Slicing
528 -- 544Andrea Fedeli, Franco Fummi, Graziano Pravadelli. Properties Incompleteness Evaluation by Functional Verification
545 -- 556Xiaoyu Ruan, Rajendra S. Katti. Data-Independent Pattern Run-Length Compression for Testing Embedded Cores in SoCs
557 -- 562Dong Xiang, Kaiwei Li, Jiaguang Sun, Hideo Fujiwara. Reconfigured Scan Forest for Test Application Cost, Test Data Volume, and Test Power Reduction
563 -- 566Hachiro Fujita, Kohichi Sakaniwa. Modified Low-Density MDS Array Codes for Tolerating Double Disk Failures in Disk Arrays
567 -- 571Dong-U Lee, John D. Villasenor. A Bit-Width Optimization Methodology for Polynomial-Based Function Evaluation
572 -- 576Riyaz A. Patel, Mohammed Benaissa, Said Boussakta. Fast Modulo 2:::n::: - (2:::n-2:::+1) Addition: A New Class of Adder for RNS

Volume 56, Issue 3

289 -- 304Jason D. Bakos, Donald M. Chiarulli, Steven P. Levitan. Lightweight Error Correction Coding for System-Level Interconnects
305 -- 313Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava. Double Point Compression with Applications to Speeding Up Random Point Multiplication
314 -- 327Kirk W. Cameron, Rong Ge, Xian-He Sun. log::n::P and log::3::P: Accurate Analytical Models of Point-to-Point Communication in Distributed Systems
328 -- 343Yutao Zhong, Steven G. Dropsho, Xipeng Shen, Ahren Studer, Chen Ding. Miss Rate Prediction Across Program Inputs and Cache Configurations
344 -- 357Fumiko Harada, Toshimitsu Ushio, Yukikazu Nakamoto. Adaptive Resource Allocation Control for Fair QoS Management
358 -- 372Xiliang Zhong, Cheng-Zhong Xu. Energy-Aware Modeling and Scheduling for Dynamic Voltage Scaling with Statistical Real-Time Guarantee
373 -- 384Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen. Space-Optimal, Wait-Free Real-Time Synchronization
385 -- 401Umut Balli, Haisang Wu, Binoy Ravindran, Jonathan Stephen Anderson, E. Douglas Jensen. Utility Accrual Real-Time Scheduling under Variable Cost Functions
402 -- 414James Chien-Mo Li, Hung-Mao Lin, Fang-Min Wang. Column Parity Row Selection (CPRS) BIST Diagnosis Technique: Modeling and Analysis
415 -- 428Cecilia Metra, Daniele Rossi, T. M. Mak. Won t On-Chip Clock Calibration Guarantee Performance Boost and Product Quality?
429 -- 431K. Wendy Tang, Ridha Kamoua. An Upper Bound for the Bisection Width of a Diagonal Mesh

Volume 56, Issue 2

145 -- 146André DeHon, Craig S. Lent, Fabrizio Lombardi. Introduction to the Special Section on Nano Systems and Computing
147 -- 160Ravi K. Venkatesan, Ahmed S. Al-Zawawi, Krishnan Sivasubramanian, Eric Rotenberg. ZettaRAM: A Power-Scalable DRAM Alternative through Charge-Voltage Decoupling
161 -- 173Love Kothari, Nicholas P. Carter. Architecture of a Self-Checkpointing Microprocessor that Incorporates Nanomagnetic Devices
174 -- 190Saket Srivastava, Sanjukta Bhanja. Hierarchical Probabilistic Macromodeling for QCA Circuits
191 -- 201Omar Paranaiba Vilela Neto, Marco Aurélio Cavalcanti Pacheco, Carlos R. Hall Barbosa. Neural Network Simulation and Evolutionary Synthesis of QCA Circuits
202 -- 207Zeljko Zilic, Katarzyna Radecka. Scaling and Better Approximating Quantum Fourier Transform by Higher Radices
208 -- 223Joseph J. Sharkey, Dmitry V. Ponomarev. Exploiting Operand Availability for Efficient Simultaneous Multithreading
224 -- 233Haining Fan, M. Anwar Hasan. A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields
234 -- 242Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih. Fast Multicomputation with Asynchronous Strategy
243 -- 252Han Liang, Piyush Mishra, Kaijie Wu. Error Correction On-Demand: A Low Power Register Transfer Level Concurrent Error Correction Technique
253 -- 266Giorgio C. Buttazzo, Manel Velasco, Pau Martí. Quality-of-Control Management in Overloaded Real-Time Systems
267 -- 281Juan Piernas, Toni Cortes, José M. García. The Design of New Journaling File Systems: The DualFS Case
282 -- 286Gang Chen, Guoqiang Bai, Hongyi Chen. A New Systolic Architecture for Modular Division

Volume 56, Issue 12

1585 -- 1596Emmanuel Touloupis, James A. Flint, Vassilios A. Chouliaras, David D. Ward. Study of the Effects of SEU-Induced Faults on a Pipeline Protected Microprocessor
1597 -- 1611Hui Chen, Yang Xiao. On-Bound Selection Cache Replacement Policy for Wireless Data Access
1612 -- 1618Xiaofan Yang, Yuan Yan Tang. Efficient Fault Identification of Diagnosable Systems under the Comparison Model
1619 -- 1628Dong Xiang, Mingjing Chen, Hideo Fujiwara. Using Weighted Scan Enable Signals to Improve Test Effectiveness of Scan-Based BIST
1629 -- 1642Prasad Calyam, Chang-Gun Lee, Eylem Ekici, Mark Haffner, Nathan Howes. Orchestration of Network-Wide Active Measurements for Supporting Distributed Computing Applications
1643 -- 1653Rodney Van Meter, Kae Nemoto, W. J. Munro. Communication Links for Distributed Quantum Computation
1654 -- 1665Guangyan Zhang, Jiwu Shu, Wei Xue, Weimin Zheng. Design and Implementation of an Out-of-Band Virtualization System for Large SANs
1666 -- 1680Rodolfo Pellizzoni, Marco Caccamo. Real-Time Management of Hardware and Software Tasks for FPGA-based Embedded Systems
1681 -- 1695Xiaochun Xu, Sartaj Sahni. Approximation Algorithms for Sensor Deployment
1696 -- 1706Paolo Montuschi, Javier D. Bruguera, Luigi Ciminiera, José-Alejandro Piñeiro. A Digit-by-Digit Algorithm for mth Root Extraction
1707 -- 1720Pierre Chardaire, Musbah Barake, Geoff P. McKeown. A PROBE-Based Heuristic for Graph Partitioning
1721 -- 1726Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco Re, Adelio Salsano. Analysis of Errors and Erasures in Parity Sharing RS Codecs

Volume 56, Issue 11

1441 -- 1455Nevine AbouGhazaleh, Bruce R. Childers, Daniel Mossé, Rami G. Melhem. Near-Memory Caching for Improved Energy Consumption
1456 -- 1469Ray K. Lam, Dah-Ming Chiu, John C. S. Lui. On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks
1470 -- 1483Nicola Petra, Davide De Caro, Antonio G. M. Strollo. A Novel Architecture for Galois Fields GF(2^m) Multipliers Based on Mastrovito Scheme
1484 -- 1492Riyaz A. Patel, Mohammed Benaissa, Said Boussakta. Fast Parallel-Prefix Architectures for Modulo 2n-1 Addition with a Single Representation of Zero
1493 -- 1504Sid Ahmed Ali Touati. On the Periodic Register Need in Software Pipelining
1505 -- 1519Sebastian Fischmeister, Oleg Sokolsky, Insup Lee. A Verifiable Language for Programming Real-Time Communication Schedules
1520 -- 1533Ajay Joshi, Yue Luo, Lizy K. John. Applying Statistical Sampling for Fast and Efficient Simulation of Commercial Workloads
1534 -- 1548Chung-Ho Chen, Kuo-Su Hsiao. Scalable Dynamic Instruction Scheduler through Wake-Up Spatial Locality
1549 -- 1563Joshua J. Yi, Resit Sendag, David J. Lilja, Douglas M. Hawkins. Speed versus Accuracy Trade-Offs in Microarchitectural Simulations
1564 -- 1574Ge Nong, Sen Zhang. Efficient Algorithms for the Inverse Sort Transform
1575 -- 1577Pi-Rong Sheu, Shan-Tai Chen. On the Hardness of Approximating the Multicast Delay Variation Problem
1578 -- 1584Ajay D. Kshemkalyani. Temporal Predicate Detection Using Synchronized Clocks

Volume 56, Issue 10

1297 -- 1307Madhusudhanan Anantha, Bella Bose, Bader F. AlBdaiwi. Mixed-Radix Gray Codes in Lee Metric
1308 -- 1319Jean-Pierre David, Kassem Kalach, Nicolas Tittley. Hardware Complexity of Modular Multiplication and Exponentiation
1320 -- 1328Luigi Dadda. Multioperand Parallel Decimal Adder: A Mixed Binary and BCD Approach
1329 -- 1341Sourav Pal, Sumantra R. Kundu, Mainak Chatterjee, Sajal K. Das. Combinatorial Reverse Auction based Scheduling in Multi-Rate Wireless Systems
1342 -- 1357Oliverio J. Santana, Alex Ramírez, Mateo Valero. Enlarging Instruction Streams
1358 -- 1371Haisang Wu, Binoy Ravindran, E. Douglas Jensen. Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model with Energy Bounds
1372 -- 1386Hakan Aydin. Exact Fault-Sensitive Feasibility Analysis of Real-Time Tasks
1387 -- 1400Wu Jigang, Thambipillai Srikanthan, Xiaodong Wang. Integrated Row and Column Rerouting for Reconfiguration of VLSI Arrays with Four-Port Switches
1401 -- 1414Shobha Vasudevan, Vinod Viswanath, Robert W. Sumners, Jacob A. Abraham. Automatic Verification of Arithmetic Circuits in RTL Using Stepwise Refinement of Term Rewriting Systems
1415 -- 1424Fadi A. Aloul, Arathi Ramani, Karem A. Sakallah, Igor L. Markov. Solution and Optimization of Systems of Pseudo-Boolean Constraints
1425 -- 1430Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann. Can-Follow Concurrency Control
1431 -- 1434Régis Leveugle. Early Analysis of Fault-based Attack Effects in Secure Circuits
1435 -- 1437Haining Fan, M. Anwar Hasan. Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Volume 56, Issue 1

2 -- 17Tao Li, Lizy Kurian John, Anand Sivasubramaniam, Narayanan Vijaykrishnan, Juan Rubio. OS-Aware Branch Prediction: Improving Microprocessor Control Flow Prediction for Operating Systems
18 -- 31Xiaotong Zhuang, Hsien-Hsin S. Lee. Reducing Cache Pollution via Dynamic Data Prefetch Filtering
32 -- 43Kun Suk Kim, Sartaj Sahni. Efficient Construction of Pipelined Multibit-Trie Router-Tables
44 -- 57Jaewook Chung, M. Anwar Hasan. Low-Weight Polynomial Form Integers for Efficient Modular Multiplication
58 -- 72Mohammad J. Akhbarizadeh, Mehrdad Nourani, Rina Panigrahy, Samar Sharma. A TCAM-Based Parallel Architecture for High-Speed Packet Forwarding
73 -- 79Guey-Yun Chang, Gen-Huey Chen, Gerard J. Chang. (t, k) - Diagnosis for Matching Composition Networks under the MM* Model
80 -- 94Jiannong Cao, Guojun Wang, Keith C. C. Chan. A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks
95 -- 108Song Jiang, Kei Davis, Xiaodong Zhang. Coordinated Multilevel Buffer Cache Management with Consistent Access Locality Quantification
109 -- 119Berk Sunar, William J. Martin, Douglas R. Stinson. A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
120 -- 133Anuja Sehgal, Krishnendu Chakrabarty. Optimization of Dual-Speed TAM Architectures for Efficient Modular Testing of SOCs
134 -- 138Errol L. Lloyd, Guoliang Xue. Relay Node Placement in Wireless Sensor Networks