نتایج جستجو برای: schedule analysis
تعداد نتایج: 2857212 فیلتر نتایج به سال:
We describe an SPA attack on an 8-bit smart card implementation of the Serpent block cipher. Our attack uses measurements taken during an on-the-fly key expansion together with linearity in the cipher’s key schedule algorithm to drastically reduce the search time for an initial key. An implementation finds 256-bit keys in 3.736 ms on average. Our work shows that linearity in key schedule design...
Resource allocation for manufacturing systems (including scheduling, reactive scheduling, and control of discrete event systems) is a typical non-linear dynamic system, often at the edge of chaos. In previous work, we developed an architecture for resource allocation where a reactive scheduler co-operates with an autonomous on-line shop floor control (SFC) system to combine high performance wit...
This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte fault on the round key. It efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts. Several countermeasures are also proposed. This weakness can be resolved without modifying the structure of the AES al...
Cost and schedule measures are the most important support activities for the success of a project; it provides the basis for process improvement and project management. This paper reports practical experiences on using EVM (Earned Value Management) and SPC(Statistical Process Control) in cost/ schedule measure. The analysis of experience data indicates the distributions of CPI(Cost Performance ...
In this paper, we define a set inequalities that are satisfied by stable multi-skill workforce schedules. In our analysis, a schedule is said to be stable if it does not contain a blocking pair, extending the notion of blocking pair in the Marriage Model of Gale-Shapley. Skill efficiency is chosen as the criterion in the preference structure. The proposed algorithm either constructs a stable mu...
conclusions dental academics were unsure about the means of infection and prevention against hbv. many of them had not completed the immunization scheme and did not have the test of seroconversion. the serological analysis revealed unprotection, even after students completed the vaccination schedule. results of the 179 students surveyed, 58.1% knew about the degree of virulence of the hepatitis...
BACKGROUND A strategy of administering a neonatal rotavirus vaccine at birth to target early prevention of rotavirus gastroenteritis may address some of the barriers to global implementation of a rotavirus vaccine. METHODS We conducted a randomized, double-blind, placebo-controlled trial in Indonesia to evaluate the efficacy of an oral human neonatal rotavirus vaccine (RV3-BB) in preventing r...
PURPOSE To assess the efficacy and tolerability of sunitinib dosing schedule of 2 weeks on and 1 week off (schedule 2/1) vs. the traditional schedule of 4 weeks on and 2 week off (schedule 4/2) and its influence on health-related quality of life (HRQoL) in Chinese patients with metastatic renal cell carcinoma (mRCC). MATERIALS AND METHODS A retrospective analysis of 108 patients with mRCC who...
Keynote presentations Climate Reconstructions Challenges in Space and Time Johannes P. Werner and PAGES2k Reconstructing past climate is more than just an academic exercise. Knowing about the evolution of past climate can help us not only validating climate models, but also show what the future could bring things that happened in the past, like extreme droughts (Wetter et al. 2014), are valid s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید