Sciweavers

1540 search results - page 52 / 308
» Embedded Systems Resources: Views on Modeling and Analysis
Sort
View
ECRTS
2003
IEEE
14 years 1 months ago
A Synthetic Utilization Bound for Aperiodic Tasks with Resource Requirements
Utilization bounds for schedulability of aperiodic tasks are new in real-time scheduling literature. All aperiodic bounds known to date apply only to independent tasks. They eithe...
Tarek F. Abdelzaher, Vivek Sharma
IWNAS
2008
IEEE
14 years 2 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
RR
2009
Springer
14 years 2 months ago
A Logic Based Approach to the Static Analysis of Production Systems
In this paper we present an embedding of propositional production systems into µ-calculus, and first-order production systems into fixed-point logic, with the aim of using these...
Jos de Bruijn, Martín Rezk
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 7 months ago
Policies of System Level Pipeline Modeling
Pipelining is a well understood and often used implementation technique for increasing the performance of a hardware system. We develop several SystemC/C++ modeling techniques tha...
Edwin A. Harcourt