Sciweavers

1243 search results - page 110 / 249
» FPZL Schedulability Analysis
Sort
View
99
Voted
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
15 years 5 months ago
Worst case delay analysis for memory interference in multicore systems
Abstract—Employing COTS components in real-time embedded systems leads to timing challenges. When multiple CPU cores and DMA peripherals run simultaneously, contention for access...
Rodolfo Pellizzoni, Andreas Schranzhofer, Jian-Jia...
RTSS
2008
IEEE
15 years 7 months ago
Control-Driven Tasks: Modeling and Analysis
The standard design of control systems is based on the periodic sampling. Every period the data is read from the input, the control law is computed, and the output is written to t...
Manel Velasco, Pau Martí, Enrico Bini
ACISP
2007
Springer
15 years 6 months ago
An Analysis of the Hermes8 Stream Ciphers
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In parti...
Steve Babbage, Carlos Cid, Norbert Pramstaller, H&...
122
Voted
ASIACRYPT
1998
Springer
15 years 4 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
89
Voted
SODA
2004
ACM
76views Algorithms» more  SODA 2004»
15 years 2 months ago
A maiden analysis of Longest Wait First
We consider server scheduling strategies to minimize average flow time in a multicast pull system where data items have uniform size. The algorithm Longest Wait First (LWF) always...
Jeff Edmonds, Kirk Pruhs