Sciweavers

957 search results - page 131 / 192
» Addition Chain Heuristics
Sort
View
DSD
2006
IEEE
116views Hardware» more  DSD 2006»
15 years 6 months ago
Mapping of Fault-Tolerant Applications with Transparency on Distributed Embedded Systems*
In this paper we present an approach for the mapping optimization of fault-tolerant embedded systems for safetycritical applications. Processes and messages are statically schedul...
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Pe...
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
IPPS
2006
IEEE
15 years 5 months ago
Evaluating cooperative checkpointing for supercomputing systems
Cooperative checkpointing, in which the system dynamically skips checkpoints requested by applications at runtime, can exploit system-level information to improve performance and ...
Adam J. Oliner, Ramendra K. Sahoo
NOMS
2006
IEEE
15 years 5 months ago
An Enhanced Estimator to Multi-objective OSPF Weight Setting Problem
— Open Shortest Path First (OSPF) is a routing protocol which is widely used in the Industry. Its functionality mainly depends on the weights assigned to the links. Given the tra...
Mohammed H. Sqalli, Sadiq M. Sait, Mohammed Aijaz ...
RTCSA
2006
IEEE
15 years 5 months ago
Maximizing Guaranteed QoS in (m, k)-firm Real-time Systems
(m,k)-firm constraints have been used to schedule tasks in soft/firm real-time systems under overloaded conditions. In general, they are provided by application designers to guara...
Jian (Denny) Lin, Albert M. K. Cheng