Various methods are considered for meeting deadlines for changing modes in a distributed real-time system with static job planning. The matrix for the distribution of the jobs over the nodes is used to obtain analytic...
An algorithm is presented for statistics collection in the LANET X.25 network: the active-agent algorithm. Experiments are examined to determine the network loading coefficient for auxiliary connections, the probabili...
Time interval measurement is considered for microprocessor systems. The performance is evaluated for existing methods that employ standard DOS functions and schemes for standard timers. A more rapid method is proposed...
An original algorithm is proposed for discrete Fourier transformation of incomp.ete data, which differs from the usual fast Fourier transform in having high frequency resolution, side-lobe suppression, and scope for u...
A dichotomic transformation is considered for a harmonic perturbing signal, which is based on an additive random method of determining the readings. Elementary expressions are derived for the reading distributions, an...
A pragmatic framework is available for maintaining reliable system operations in the context of an unbundled open access environment, while fostering a comp.titive supply/demand market. The proposed framework shows ho...
详细信息
A pragmatic framework is available for maintaining reliable system operations in the context of an unbundled open access environment, while fostering a comp.titive supply/demand market. The proposed framework shows how incentives will meld a decentralized, comp.titive profit-driven market and a centrally directed services market together into a reliable free market.
The relative flexibility is estimated quantitatively in a comp.rison of distributed systems having rigidly set command intervals for the changes in operating mode. The method is used in comp.ring redundant real-time d...
A frequency-domain method a proposed for identifying a nonlinear object or system whose structure or behavior allows one to use a Hammerstein model The static input-output characteristic is decomp.sed to determine the...
This paper deals with load balancing of parallel algorithms for distributed-memory comp.ters. The parallel versions of BLAS subroutines for matrix-vector product and LU factorization are considered. Two task partition...
详细信息
This paper deals with load balancing of parallel algorithms for distributed-memory comp.ters. The parallel versions of BLAS subroutines for matrix-vector product and LU factorization are considered. Two task partitioning algorithms are investigated and speed-ups are calculated. The cases of homogeneous and heterogeneous collections of comp.ters/processors are studied, and special partitioning algorithms for heterogeneous workstation clusters are presented.
In this paper, we present a cryptanalytic attack on large RSA secret exponents. Let e and N denote the public exponent and the modulus of the RSA scheme, respectively. This attack uses the continued fraction algorithm...
详细信息
In this paper, we present a cryptanalytic attack on large RSA secret exponents. Let e and N denote the public exponent and the modulus of the RSA scheme, respectively. This attack uses the continued fraction algorithm to find an estimate of a fraction which involves the secret exponent d from a known close enough estimate of a fraction e/N. According to our proposed attack, the large secret exponent d can be discovered if e < N and 0<(λ(N)-d)<4√N . Furthermore, if the secret exponent is close to λ(N)/2, or even if it is close to some other critical value, it will be discovered.
暂无评论