TRANSACTIONS ON COMPUTERS , JUNE 1970 Reviews of Papers in the Computer Field

نویسندگان

  • DONALD L. EPLEY
  • H. S. STONE
چکیده

Wiring schemes which exploit the potential of modern integrated circuit technology are likely to exhibit a high degree of "periodicity," as well as various other attributes. The first contribution of this paper is to formulate a precise definition of periodicity in terms of a graph-theoretic model originated by Yoeli. Roughly speaking, an infinite graph is said to be periodic if it can be generated from a finite template which is moved (periodically) from point to point in the plane. This definition is interesting and useful, and generalizes nicely to infinite graphs in n-space. Now, suppose that in addition to periodicity we require planarity and point symmetry. (Roughly speaking, a graph is point symmetric if it "looks the same" from each of its vertices.) What types of infinite graphs satisfy all three of these requirements? The second contribution of this paper is to reveal that there are exactly eleven such graphs, and they correspond to the three regular and eight semi-regular tesselations of the plane. A planar tesselation is a set of polygons fitting together side by side which cover the plane simply and without gaps. A tesselation is regular if each face is the same regular polygon. The three regular tesselations are composed of triangles, squares, and hexagons, respectively. A semiregular tesselation permits the faces to be different, but the same regular polygons must surround each vertex. An example of a semi-regular tesselation is one in which each vertex is surrounded by a square and two octagons. It is interesting to compare these results with those of Eric Wagner, who has considered various wiring schemes that do not meet all ofTurner's conditions. For example, Wagner proposes an array which would appear

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

B70-6 Computing Methods in Optimization Problems

In this section, the IEEE Computer Group publishes reviews of books in the computer field and related areas. Readers are invited to send comments on these reviews for possible publication in the Correspondence section of this TRANSACTIONS. Please address your comments and suggestions to the Book Reviews Editor: Louis A. Schmittroth, Department of Computer Science, Montana State University, Boze...

متن کامل

A Brief History of the IEEE Transactions on Computers

THE IEEE (Institute of Electrical and Electronics Engineers) Computer Society has traced its origin to the formation of the AIEE (American Institute of Electrical Engineers) Large-Scale Computing Devices Committee (CDC) during May and June 1946, which was formally approved by the AIEE Board of Directors on January 29, 1948. The IRE (Institute of Radio Engineers) Professional Group on Electronic...

متن کامل

On the Addition of Binary Numbers

An upper bound is derived for the time required to add numbers modulo 2n, using circuit elements with a limited fan-in and unit delay, and assuming that all numbers have the usual binary encoding. The upper bound is within a factor (1 + ε) of Winograd’s lower bound (which holds for all encodings), where ε → 0 as n → ∞, and only O(n log n) circuit elements are required. CommentsOnly the Abst...

متن کامل

Prospects for FPGA-based Reprogrammable Systems

Field-Programmable Gate Arrays (FPGAs) are currently used in two major classes of systems, namely in logic emulation of digital circuits, and in reconfigurable computer systems. This paper reviews the current status of research into both these areas, especially reconfigurable computers, and comments on their future prospects. Three papers are reviewed in some detail, but several others are also...

متن کامل

Special Section on Secure Computer Architectures

COMPUTER architectures are profoundly affected by a new security landscape, caused by the dramatic evolution of information technology over the past decade. First, secure computer architectures have to support a wide range of security applications that extend well beyond the desktop environment, and that also include handheld, mobile, and embedded architectures, as well as high-end computing se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006