نتایج جستجو برای: execution mode

تعداد نتایج: 299922  

Journal: :JCP 2008
Santosh D. Chede Kishore D. Kulat

Processor is an important computing element in portable battery operated real time embedded system and it consumes most of the battery energy. Energy consumption, processor memory space are considered as basic design constraints in ARM based system and heuristic algorithm is developed for energy consumption as well as memory space management. This Algorithm includes rate monotonic fixed priorit...

2004
Wenzhang Zhu Cho-Li Wang Weijian Fang

Thread migration is to support the movement of threads across machine boundaries in a distributed computing environment. It can improve load balancing and the execution efficiency of multithreaded programs. In this paper, we introduce a new approach that employs the technique of Just-in-Time (JIT) recompilation to support transparent thread migration. With JIT recompilation, the native thread e...

2001
Stefan Pleisch André Schiper

Fault tolerance is fundamental to the further development of mobile agent applications. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the agent, i.e., it ensures that the agent arrives at its destination. In this paper, we present FATOMAS, a Java-based fault-tolerant mobile agent system based on an algorithm presented in an earlier paper. In contrary to...

Journal: :CoRR 2018
Matthew McClintic Devon Maloney Michael Scires Gabriel Marcano Matthew Norman Aurora Wright

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in order to gain early code execution. The attack utilizes the block shuffling vulnerability of the ECB cipher mode to rearrange keys in the Nintendo 3DS’s encrypted keystore. Because the shuffled keys will deterministically decrypt the encrypted firmware binary to incorrect plaintext data and execute it, and because the devic...

2017
Xuan Wang Bing Chu Eric Rogers

Iterative learning control has been developed for processes or systems that complete the same finite duration task over and over again. The mode of operation is that after each execution is complete the system resets to the starting location, the next execution is completed and so on. Each execution is known as a trial and its duration is termed the trial length. Once each trial is complete the...

2014
Hideya Koshino Takehiro Minamoto Ken Yaoi Mariko Osaka Naoyuki Osaka

The Default Mode Network (DMN) regions exhibit deactivation during a wide variety of resource demanding tasks. However, recent brain imaging studies reported that they also show activation during various cognitive activities. In addition, studies have found a negative correlation between the DMN and the working memory network (WMN). Here, we investigated activity in the DMN and WMN regions duri...

2016
Min Chen

With the growing popularity of mobile devices, a new type of peer-to-peer communication mode for mobile cloud computing has been introduced. By applying a variety of short-range wireless communication technologies to establish connections with nearby mobile devices, we can construct a mobile cloudlet in which each mobile device can either works as a computing service provider or a service reque...

1998
Denis Javaux

rules also exist for uncommanded mode transitions. A very similar example concerns the ability of G/S to disengage the other pitch modes: G/S will engage when the conditions for its engagement are met, whatever the status of the other pitch modes. Because there is a single set of conditions for five different contexts (one for each of the pitch modes), a single abstract rule can be learned. The...

Journal: :CoRR 1998
Philippe Wenger Damien Chablat

The goal of this paper is to explain, using a typical example, the distribution of the different assembly modes in the workspace and their effective role in the execution of trajectories. The singular and non-singular changes of assembly mode are described and compared to each other. The non-singular change of assembly mode is more deeply analysed and discussed in the context of trajectory plan...

2012
Pontus Ekberg

We derive demand-bound functions for mixedcriticality sporadic tasks, and use these to determine EDFschedulability. Tasks have different demand-bound functions for each criticality mode. We show how to shift execution demand from highto low-criticality mode by tuning the relative deadlines. This allows us to shape the demand characteristics of each task. We propose an efficient algorithm for tu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید