Sciweavers

3639 search results - page 143 / 728
» Provenance as Dependency Analysis
Sort
View
ARITH
2007
IEEE
15 years 4 months ago
Accurate Multiple-Precision Gauss-Legendre Quadrature
Numerical integration is an operation that is frequently available in multiple precision numerical software packages. The different quadrature schemes used are considered well stu...
Laurent Fousse
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 4 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
FGCN
2007
IEEE
119views Communications» more  FGCN 2007»
15 years 4 months ago
A Novel Adaptive Load Shedding Scheme for Data Stream Processing
In this paper, we present a novel feedback control-based load shedding scheme for data stream processing. Firstly we apply system identification to establish a dynamic model to de...
Yunyi Zhang, Chongzheng Huang, Deyun Zhang
PROVSEC
2007
Springer
15 years 4 months ago
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
Security of a modern block cipher is commonly measured in terms of its resistance to known attacks. While the provable security approach to block ciphers dates back to the first C...
Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
RTCSA
2006
IEEE
15 years 4 months ago
Algorithms for Determining the Demand-Based Load of a Sporadic Task System
The load parameter of a sporadic task system is defined to be the largest possible cumulative execution requirement that can be generated by jobs of the task system over any time...
Nathan Fisher, Theodore P. Baker, Sanjoy K. Baruah