Sciweavers

1760 search results - page 183 / 352
» Program Analysis Using Weighted Pushdown Systems
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 4 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CASES
2003
ACM
15 years 6 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
CC
2010
Springer
190views System Software» more  CC 2010»
15 years 7 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
102
Voted
AUTOMATICA
2008
123views more  AUTOMATICA 2008»
15 years 28 days ago
Identification with stochastic sampling time jitter
This work investigates how stochastic sampling jitter noise affects the result of system identification, and proposes a modification of known approaches to mitigate the effects of...
Frida Eng, Fredrik Gustafsson
SIGSOFT
2003
ACM
16 years 1 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg