226 - 250 of 989
Number of results to display per page
226 Structured, technology independent VLSI designRapid advancement in new semiconductor technologies has created a need for the design of existing integrated circuits using these new technologies. These new technologies are required to provide improved performance, smaller feature sizes and lower costs. The conversion of an integrated circuit fro...VLSI design; semiconductor technologies1989
227 The set theory of arithmetic decompositionThe Set Theory of Arithmetic Decomposition is a method for designing complex addition/ subtraction circuits at any radix using strictly positional, sign-local number systems. The specification of an addition circuit is simply an equation that describes the inputs and the outputs as weighted digit se...Arithmetic decomposition; Addition/ subtraction circuits1989
228 Path-programmable logicPath-Programmable Logic (PPL) is a structured IC design methodology under development at the University of Utah. PPL employs a sea-of-wires approach to design. In PPL, design is done entirely using cells for both functionality and interconnect. PPL cells may have modifiers that change either their ...Path-Programmable Logic; PPL1989
229 Automatic compensating cleanup operationToday's part geometries are becoming ever more complex and require more accurate tool path to manufacture. Machining process efficiency is also a major consideration for designers as well as manufacturing engineers. Although the current advanced CAD/CAM systems have greatly improved the efficiency ...Part geometries1989
230 An abstract machine for parallel graph reductionAn abstract machine for parallel graph reduction on a shared memory multiprocessor is described. This is intended primarily for normal order (lazy) evaluation of functional programs. It is absolutely essential in such a design to adapt an efficient sequential model since during execution under limit...Parallel graph reduction1989
231 Password cracking: a game of witsA password cracking algorithm seems like a slow and bulky item to put in a worm, but the worm makes this work by being persistent and efficient. The worm is aided by some unfortunate statistics about typical password choices.Password cracking algorithm; Computer worms1989
232 Cascade: hardware for high/variable precision arithmeticThe Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root and computation...1989
233 Automatic sculptured five-axis milling with check surfacesAn approach to 5-axis milling of B-spline surfaces is presented. Within its domain, it provides better check surface handling than APT. The scheme for tool position generation is based on a B-spline curve refinement method and a set of criteria for tolerance control which allows the tool positions ...B-spline surfaces; 5-axis milling; Tool paths1989
234 CAGD-based computer visionAbstract-Three-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, computer aided geometric design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this simil...1989-11
235 C-RISC A C language reduced instruction set computerThis project is the implementation of a Reduced Instruction Set Computer (RISC) on a tiny chip. RISC technology is based on the idea that a small number of simple instructions can be used to create a fast, flexible computer. Our RISC uses this principle while staying within the confines of the tiny ...RISC; C language1990
236 Zo: A framework for autonomous agent behavior specification and analysisWe describe a framework for the specification and analysis of autonomous agents1 . In general, such agents require several levels of behavioral specifications, including: low-level reflex actions, mid-level controllers to deal with the physical aspects of the world, and highlevel representations for...Z-Infinity; Autonomous agents; Behavior1990
237 CBCV: A CAD-based vision systemThe CBCV system has been developed in order to provide the capability of automatically synthesizing executable vision modules for various functions like object recognition, pose determinaion, quality inspection, etc. A wide range of tools exist for both 2D and 3D vision, including not only software...CBCV1990
238 An axiomatic approach for solving geometric problems symbolicallyThis paper describes a new approach for solving geometric constraint problems and problems in geometry theorem proving. We developed a rewrite-rule mechanism operating on geometric predicates. Termination and completeness of the problem solving algorithm can be obtained through well foundedness and ...Geometric constraint problems; Geometry theorem proving; Knuth-Bendix completion algorithm1990
239 Design and verification of the rollback chip using HOP: a case study of formal methods applied to hardware designThe use of formal methods in hardware design improves the quality of designs in many ways: it promotes better understanding of the design; it permits systematic design refinement through the discovery of invariants; and it allows design verification (informal or formal). In this paper we illustrate ...Rollback chip; Verification; HOP; Hardware design; RBC1990
240 DI - An object-oriented user interface toolbox for modula-2 applicationsThe DI dialog interface tool library for Modula-2 applications described in this paper facilitates the design and implementation of graphical, object-oriented user interfaces for workstations with a graphical screen, a mouse and a keyboard. Much emphasis is put on the portability of the application...DI dialog interface tool1990
241 On the potential of asynchronous pipelined processorsAn asynchronous version of the pipelined R3000 and DLX processors, the A3000, is being designed. Simulation was employed t o investigate the potential speed-up obtainable due t o the asynchronous operation. Preliminary results show up to a 64% improvement in performance.Pipelined processors; Pipelined R3000; DLX processors; A30001990
242 DPOS programming manualThis manual describes the basic concepts of the DPOS Metalanguage and the programming language DPOS Scheme.DPOS; Programming manual1990
243 Detecting ambiguities: an optimistic approach to robustness problems in computational geometryComputational geometry algorithms deal with geometric objects, usually represented by coordinates in an n-dimensional Euclidean space. Most efficient algorithms implement geometric operations as floating point arithmetic operations on the coordinates. Since floating point numbers can only approxima...Ambiguities; Computational geometry; Robustness problems1990
244 Some recent asynchronous system design methodologiesWe present an in-depth study of some techniques for asynchronous system design, analysis, and verification. After defining basic terminology, we take one simple example - a four-phase t o two-phase converter - and present its design using (a) classical flow-tables; (b) Signal Transition Graphs of [...Asynchronous system design1990
245 Sequencing computational events in heterogeneous distributed systemsDistributed systems are growing in number, size, and complexity. Some technological advances have been made to program these systems, most notably the remote procedure call. However, the nature of heterogeneous distributed systems allows for much more complex interactions and new programming techno...Sequencing; Computational events; Heterogeneous distributed systems1990
246 Robust regularized set operations on polyhedraThis paper describes a provably correct and robust implementation of regularized set operations on polyhedral objects. Although the algorithm described here does not assume manifold polyhedra and handles all possible degenerate cases, it turns out to be quite simple. The geometric operations and rel...Robust regularized set operations1990
247 A distributed object-oriented graphical programming systemThis report presents the design of a distributed parallel object system (DPOS) and its implementation using a graphical editing interface. DPOS brings together concepts of object-oriented programming and graphical programming with aspects of modern functional languages. Programs are defined as netwo...Distributed parallel object system; DPOS1990
248 Concurrent SchemeThis paper describes an evolution of the Scheme language to support parallelism with tight coupling of control and data. Mechanisms are presented to address the difficult and related problems of mutual exclusion and data sharing which arise in concurrent language systems. The mechanisms are tailored...Concurrent Scheme; Parallelism1990
249 A scheduling strategy for shared memory multiprocessorsAn efficient scheduling strategy for shared memory multiprocessors is described. The rapid dissemination of tasks to available procesors and ready queues is crucial to the performance of any parallel system. Such overheads determine the attainable speedup and performance of the system. Poor techniq...Shared memory multiprocessors1990
250 hopCP: language definition, semantics and examplesWe describe a formalism for high level modeling of hardware based on flow graphs and nonatomic actions called hopCP. A module is the description of a hardware system in hopCP, which contains a flow graph to model the behavioral aspects and ports which represent the communication links. Operations ar...hopCP1990
226 - 250 of 989