scispace - formally typeset
Search or ask a question

Showing papers on "Data Corruption published in 1989"


Patent
26 Apr 1989
TL;DR: In this article, a parallel asynchronous elasticity buffer is proposed, where the address of a storage element for writing or reading of data is provided by asynchronous input and output pointers implemented using circular gray code counters.
Abstract: A parallel asynchronous elasticity buffer. Selection of the address of a storage element for writing or reading of data is provided by asynchronous input and output pointers implemented using circular gray code counters. The buffer is initialized once during transmission of each frame of data so that the pointers do not select the same storage element for writing and reading at the same time. Write overflow or read underrun of a storage element is detected before any data corruption can occur by comparing the input and output pointers. An error condition is detected if the input and output pointers overlap for a threshold period, which can be shorter than the period required for writing or reading of a multibit data unit to or from the buffer. The overlap time period is determined by comparing the pointers at one or more sampling times corresponding to selected phases of a clock signal.

74 citations


Proceedings ArticleDOI
27 Nov 1989
TL;DR: The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure.
Abstract: The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure. He starts out with a description of some techniques for detecting compromised data integrity resulting from both fraudulent (intended) and nonfraudulent (unintended) data corruption. Emphasis is placed on three general approaches: (1) building in system quality for preventing certain of these problems, (2) placing routines into data systems for detecting problems that cannot be prevented, and (3) designing functionality into these systems for recovering from compromised integrity. The author examines how selected system features and functionality are designed to help ensure data integrity. The role of the system in assuring data integrity is examined. >

3 citations


Patent
09 May 1989
TL;DR: In this article, the authors propose to demarcate data corruption by checking read/write of a load memory part in case of the occurrence of an error and sending a down-load request in normalcy.
Abstract: PURPOSE:To demarcate data corruption by checking read/write of a load memory part in case of the occurrence of an error and sending a down-load request in case of normalcy CONSTITUTION:A load memory part 4 loads down a control program or fixed data as load data from a host device A CPU part 5 performs data error check of load data at the time of power-on and tests read/write of load data in case of a data error, and the CPU part sends the down-load request to the host device if the error is not a read/write error as the test result Thus, an error cause is easily discriminated to demarcate data corruption, and therefore, the reliability of data is improved

1 citations