نتایج جستجو برای: multiple byte fault
تعداد نتایج: 821636 فیلتر نتایج به سال:
A capsule-based active network transports capsules containing code to be executed on network nodes through which they pass. Active networks facilitate the deployment of new protocols, which can be used without any changes to the underlying network infrastructure. This paper describes the design, implementation, and evaluation of a high-performance active network node which supports multiple mob...
We present an algorithm for implementing byte-range locks using MPI passive-target one-sided communication. This algorithm is useful in any scenario in which multiple processes of a parallel program need to acquire exclusive access to a range of bytes. One application of this algorithm is for implementing MPI-IO’s atomic-access mode in the absence of atomicity guarantees from the underlying fil...
This paper studies “colliding keys” of RC4 that create the same initial state and hence generate the same pseudo-random byte stream. It is easy to see that RC4 has colliding keys when its key size is very large, but it was unknown whether such key collisions exist for shorter key sizes. We present a new state transition sequence of the key scheduling algorithm for a related key pair of an arbit...
This paper presents a new method to generate test patterns for multiple stuck-at faults in combinational circuits. We assume the presence of all multiple faults of all multiplicities and we do not resort to their explicit enumeration: the target fault is a single component of possibly several multiple faults. New line and gate models are introduced to handle multiple fault effect propagation th...
| This paper proposes a methodology, implemented in a tool, to automatically generate the main classes of Error Control Codes (ECCs) widely applied in computer memory systems to increase reliability and data integrity. New code construction techniques extending the features of previous Single Error Correcting (SEC)-Double Error Detecting (DED)-Single Byte Error Detecting (SBD) codes have been i...
Thread Level Speculation (TLS) has been suggested as a mean to automatically (or semi-automatically) extract parallelism from sequential programs. While there have been multiple attempts both in hardware and software to implement real time TLS, to the best of our knowledge all attempts have so far been on a byte code level or with statically typed languages. In this study, we examine the potent...
The MC68030 is a virtual memory microprocessor based on an MC68020 core with additional enhanced performance features. Increased internal parallelism is provided by multiple internal data buses and address buses, and a versatile bus controller that supports synchronous burst cycle accesses in order to maximize performance with paged mode, nibble mode, and static column DRAM technology, or even ...
Kernel of the symmetric block ciphering methods presented here is the coupling of XOR operations and of invertible substitution tables S with all possible 256**t byte groups (with t=1, 2, 3, ... Bytes, fixed at the beginning) being derived from keys: K(block) := S(S(block) ⊗ Eo) ⊗ Eu with-Eo upper and Eu lower triangular (byte-group-)matrix with (byte-block-length/t)**2 values, value 1 at all n...
Fault detection, fault isolation and fault diagnosis are addressed within a statistical framework. The corresponding inference problems are stated. Several statistical tools for solving these inference problems are described. Particular emphasis is put on dealing with nuisance parameters and deciding between multiple hypotheses. How to use these tools for solving FDI problems is discussed. An e...
At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It mandated in National Standard for Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI), because algorithm developed use wireless sensor networks to provide safety network environment. The uses 128-bit size 32-bit round key. consists of 32 rounds one reverse translation R. In this paper, we p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید