Sciweavers

393 search results - page 17 / 79
» Personnel scheduling: Models and complexity
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
SCHEDULING
2010
116views more  SCHEDULING 2010»
14 years 10 months ago
On supporting Lean methodologies using constraint-based scheduling
Lean Manufacturing often simply referred to as Lean is a process management philosophy that aims to improve the way in which products are manufactured. It does this through ide...
Roman van der Krogt, John Geraghty, Mustafa Ramzi ...
EURODAC
1994
IEEE
139views VHDL» more  EURODAC 1994»
15 years 4 months ago
OSCAR: optimum simultaneous scheduling, allocation and resource binding based on integer programming
: This paper presents an approach to high-level synthesis which is based upon a 0/1 integer programming model. In contrast to other approaches, this model allows solving all three ...
Birger Landwehr, Peter Marwedel, Rainer Dömer
RTSS
2002
IEEE
15 years 4 months ago
Approximate Schedulability Analysis
The schedulability analysis problem for many realistic task models is intractable. Therefore known algorithms either have exponential complexity or at best can be solved in pseudo...
Samarjit Chakraborty, Simon Künzli, Lothar Th...
COMCOM
2010
118views more  COMCOM 2010»
14 years 9 months ago
Mini-slot scheduling for IEEE 802.16d chain and grid mesh networks
This work considers the mini-slot scheduling problem in IEEE 802.16d wireless mesh networks (WMNs). An efficient mini-slot scheduling needs to take into account the transmission o...
Jia-Ming Liang, Ho-Cheng Wu, Jen-Jee Chen, Yu-Chee...