Sciweavers

3104 search results - page 135 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
TCOS
2010
14 years 10 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
IWPC
2003
IEEE
15 years 9 months ago
Comprehension of Software Analysis Data Using 3D Visualization
The paper presents a software visualization application-framework that utilizes a variety of 3D metaphors to represent large software system and related analysis data. The 3D repr...
Andrian Marcus, Louis Feng, Jonathan I. Maletic
VLSISP
2008
139views more  VLSISP 2008»
15 years 3 months ago
Fault Tolerance Analysis of Communication System Interleavers: the 802.11a Case Study
The study of Multiple Soft errors on memory modules caused by radiation effects represents an interesting field of current research. The fault tolerance of these devices in radiati...
Pilar Reyes, Pedro Reviriego, Juan Antonio Maestro...
TSP
2010
14 years 10 months ago
A recursive method for the approximation of LTI systems using subband processing
Using the subband technique, an LTI system can be implemented by the composition of an analysis filterbank, followed by a transfer matrix (subband model) and a synthesis filterbank...
Damián Marelli, Minyue Fu
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
15 years 9 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy