Sciweavers

3563 search results - page 286 / 713
» Scheduling Algorithms for Procrastinators
Sort
View
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 11 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
146
Voted
ICN
2005
Springer
15 years 10 months ago
Maximizing System Value Among Interested Packets While Satisfying Time and Energy Constraints
: Data filtering is an important approach to reduce energy consumption. Following this idea, Interest is used as a constraint to filter uninterested data in sensor networks. Within...
Lei Shu, Sungyoung Lee, Xiaoling Wu, Jie Yang
159
Voted
CISS
2007
IEEE
15 years 11 months ago
Coverage-Based Information Retrieval for Lifetime Maximization in Sensor Networks
—We consider information retrieval in a wireless sensor network deployed to monitor a spatially correlated random field. We address sensor scheduling in each data collection und...
Tong Zhao, Qing Zhao
CAIP
2007
Springer
156views Image Analysis» more  CAIP 2007»
15 years 9 months ago
Classification of Optical Flow by Constraints
In this paper, we analyse mathematical properties of spatial optical-flow computation algorithm. First by numerical analysis, we derive the convergence property on variational opti...
Yusuke Kameda, Atsushi Imiya
DATE
2008
IEEE
130views Hardware» more  DATE 2008»
15 years 6 months ago
A Dual-Priority Real-Time Multiprocessor System on FPGA for Automotive Applications
This paper presents the implementation of a dualpriority scheduling algorithm for real-time embedded systems on a shared memory multiprocessor on FPGA. The dual-priority microkern...
Antonino Tumeo, Marco Branca, Lorenzo Camerini, Ma...