Sciweavers

628 search results - page 4 / 126
» On the Twofish Key Schedule
Sort
View
WIOPT
2010
IEEE
13 years 8 months ago
On the use of packet scheduling in self-optimization processes: Application to coverage-capacity optimization
—Self-organizing networks (SON) is commonly seen as a way to increase network performance while simplifying its management. This paper investigates Packet Scheduling (PS) in the ...
Richard Combes, Zwi Altman, Eitan Altman
PE
2002
Springer
207views Optimization» more  PE 2002»
13 years 9 months ago
Delay characteristics in discrete-time GI-G-1 queues with non-preemptive priority queueing discipline
Priority scheduling for packets is becoming a hot topic, as attemps are being made to integrate voice services in existing data networks. In this paper, we consider a discrete-tim...
Joris Walraevens, Bart Steyaert, Herwig Bruneel
JOC
2000
130views more  JOC 2000»
13 years 9 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
JSSPP
2010
Springer
13 years 7 months ago
Hierarchical Scheduling of DAG Structured Computations on Manycore Processors with Dynamic Thread Grouping
Many computational solutions can be expressed as directed acyclic graphs (DAGs) with weighted nodes. In parallel computing, scheduling such DAGs onto manycore processors remains a ...
Yinglong Xia, Viktor K. Prasanna, James Li
PLDI
2012
ACM
12 years 2 days ago
Sound and precise analysis of parallel programs through schedule specialization
Parallel programs are known to be difficult to analyze. A key reason is that they typically have an enormous number of execution interleavings, or schedules. Static analysis over...
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfen...