Sciweavers

17449 search results - page 102 / 3490
» Availability
Sort
View
RTSS
2002
IEEE
14 years 3 months ago
Scheduling Aperiodic Requests under the Rate-Based Execution Model
Aperiodic requests with unknown execution times and unknown arrival patterns are dynamically mapped to ratebased execution (RBE) tasks with variable rates and scheduled such that ...
Steve Goddard, Xin Liu
GECCO
2009
Springer
241views Optimization» more  GECCO 2009»
14 years 3 months ago
A fast high quality pseudo random number generator for nVidia CUDA
Previously either due to hardware GPU limits or older versions of software, careful implementation of PRNGs was required to make good use of the limited numerical precision availa...
William B. Langdon
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
14 years 2 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
IPPS
2000
IEEE
14 years 2 months ago
ACDS: Adapting Computational Data Streams for High Performance
Data-intensive, interactive applications are an important class of metacomputing (Grid) applications. They are characterized by large, time-varying data flows between data provid...
Carsten Isert, Karsten Schwan
ISORC
1999
IEEE
14 years 2 months ago
Automated Dependability Analysis of UML Designs
This paper deals with the automatic dependability analysis of systems designed using UML. An automatic transformations is defined for the generation of models to capture systems d...
Andrea Bondavalli, Ivan Mura, István Majzik