Sciweavers

892 search results - page 108 / 179
» Action respecting embedding
Sort
View
86
Voted
ICICS
2004
Springer
15 years 6 months ago
On Some Weak Extensions of AES and BES
In 2002, Murphy and Robshaw introduced an extension BES of AES and argued this could compromise the security of AES. We introduce here two block-ciphers CES and Big-BES that are so...
Jean Monnerat, Serge Vaudenay
103
Voted
HUC
2009
Springer
15 years 5 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
ERSA
2006
133views Hardware» more  ERSA 2006»
15 years 2 months ago
An FPGA based Co-Design Architecture for MIMO Lattice Decoders
MIMO systems have attracted great attentions because of their huge capacity. The hardware implementation of MIMO decoder becomes a challenging task as the complexity of the MIMO sy...
Cao Liang, Jing Ma, Xin-Ming Huang
VLSISP
2008
132views more  VLSISP 2008»
15 years 18 days ago
Scenario Selection and Prediction for DVS-Aware Scheduling of Multimedia Applications
Modern multimedia applications usually have real-time constraints and they are implemented using application-domain specific embedded processors. Dimensioning a system requires acc...
Stefan Valentin Gheorghita, Twan Basten, Henk Corp...
98
Voted
EMSOFT
2010
Springer
14 years 10 months ago
Reducing stack with intra-task threshold priorities in real-time systems
In the design of hard real-time systems, the feasibility of the task set is one of the primary concerns. However, in embedded systems with scarce resources, optimizing resource us...
Gang Yao, Giorgio C. Buttazzo