Sciweavers

1540 search results - page 52 / 308
» Embedded Systems Resources: Views on Modeling and Analysis
Sort
View
148
Voted
ECRTS
2003
IEEE
15 years 9 months ago
A Synthetic Utilization Bound for Aperiodic Tasks with Resource Requirements
Utilization bounds for schedulability of aperiodic tasks are new in real-time scheduling literature. All aperiodic bounds known to date apply only to independent tasks. They eithe...
Tarek F. Abdelzaher, Vivek Sharma
134
Voted
IWNAS
2008
IEEE
15 years 10 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
164
Voted
AIM
2002
15 years 3 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
128
Voted
RR
2009
Springer
15 years 10 months ago
A Logic Based Approach to the Static Analysis of Production Systems
In this paper we present an embedding of propositional production systems into µ-calculus, and first-order production systems into fixed-point logic, with the aim of using these...
Jos de Bruijn, Martín Rezk
132
Voted
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 3 months ago
Policies of System Level Pipeline Modeling
Pipelining is a well understood and often used implementation technique for increasing the performance of a hardware system. We develop several SystemC/C++ modeling techniques tha...
Edwin A. Harcourt