Search results

Filter

Filetype

Your search for "Cheap fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The process was smooth and quick..imwG" yielded 88971 hits

Automated Bug Assignment: Ensemble-based Machine Learning in Large Scale Industrial Contexts

Bug report assignment is an important part of software maintenance. In particular, incorrect assignments of bug reports to development teams can be very expensive in large software development projects. Several studies propose automating bug assignment techniques using machine learning in open source software contexts, but no study exists for large-scale proprietary projects in industry. The goal

On the probability of non-shared multipath clusters in cellular networks

In Space Division Multiple Access (SDMA) systems, users are separated based on their positions. The base-station (BS) signals typically reach the users through multipath clusters. The goal of this work is to find the probability that a randomly selected user will receive the signal from the BS via at least one nonshared (by any other user) multipath cluster. This probability, referred to as PSucce

A distributed MAC scheme to achieve QoS in ad hoc networks

Real-time applications introduce new requirements on wireless networks and impose quality thresholds on parameters like delay, jitter, throughput, and packet loss in order to run smoothly. This paper addresses this issue by presenting a MAC scheme that offers real-time applications the opportunity to reserve transmission time based on their QoS requirements for contention-free medium access. Our s

Our commitment to climate change is dependent on past, present and future emissions and decisions

The present day global climate change is fueled by our use of fossil fuels and land use change. The already observed warming and other distinct changes in the climate system stem from these human influences and are ongoing. Due to climate system inertia, a part of the climate system's response to this historical forcing remains to manifest itself, which it will do over time. At the same time, soci

In vivo evaluation of large-scale IR-based traceability recovery

Modern large-scale software development is a complex undertaking and coordinating various processes is crucial to achieve efficiency. The alignment between requirements and test activities is one important aspect. Production and maintenance of software result in an ever-increasing amount of information. To be able to work efficiently under such circumstances, navigation in all available data needs

A Survey on Fast Correlation Attacks

Fast correlation attacks, pioneered by Meier and Staffelbach in 1988, constitute an important class of attacks on stream ciphers. They exploit a correlation between the keystream and the output of a linear feedback shift register (LFSR) within the cipher. Several factors affect the feasibility of such an attack, e.g., the amount of available keystream and the number of taps in the LFSR. Notably, f

Design exploration of a 65 nm Sub-VT CMOS digital decimation filter chain

This paper presents an analysis on energy dissipation of digital half-band filters operating in the sub-threshold (sub-VT) region with throughput and supply voltage constraints. A 12-bit filter is implemented along with various unfolded structures, used to form a decimation filter chain. The designs are synthesized in a 65 nm low-leakage CMOS technology with various threshold voltages. A sub-VT en

Design and Measurement of a Variable-Rate Viterbi Decoder in 130-nm Digital CMOS

This paper discusses design and measurements of a flexible Viterbi decoder fabricated in 130-nm digital CMOS. Flexibility was incorporated by providing various code rates and modulation schemes to adjust to varying channel conditions. Based on previous trade-off studies, flexible building blocks were carefully designed to cause as little area penalty as possible. The chip runs down to a minimal co

Improved distinguishers for HC-128

HC-128 is an eSTREAM final portfolio stream cipher. Several authors have investigated its security and, in particular, distinguishing attacks have been considered. Still, no one has been able to provide a distinguisher stronger than the one presented by Wu in the original HC-128 paper. In this paper we first argue that the keystream requirement in Wu’s original attack is underestimated by a factor

High-level energy estimation in the sub-VT domain: simulation and measurement of a cardiac event detector

This paper presents a flow that is suitable to estimate energy dissipation of digital standard-cell based designs which are determined to be operated in the sub-threshold regime. The flow is applicable on gate-level netlists, where back-annotated toggle information is used to find the minimum energy operation point, corresponding maximum clock frequency, as well as the dissipated energy per clock

Fair Flow Rate Optimization by Effective Placement of Directional Antennas in Wireless Mesh Networks

Directional antennas have been used to solve interference and connectivity issues in wireless networks for some time. Many scenarios have been presented and often positive conclusions are drawn, i.e., showing the increase in capacity. However, to date the research has mainly focused on either antenna placement or transmission scheduling but not the two combined. Such consideration will become incr

Greedy distinguishers and nonrandomness detectors

We present the concept of greedy distinguishers and show how some simple observations and the well known greedy heuristic can be combined into a very powerful strategy (the Greedy Bit Set Algorithm) for efficient and systematic construction of distinguishers and nonrandomness detectors. We show how this strategy can be applied to a large array of stream and block ciphers, and we show that our meth

The (in-) validity of the WSSUS assumption in vehicular radio channels

The assumption of wide-sense-stationarity (WSS) and uncorrelated scattering (US) of wireless propagation channels is widespread for the design and analysis of wireless propagation channels. However, the assumption is only valid within a limited range. In this paper, we investigate the extension of this range not only in time (WSS), but also in frequency (US), for measured vehicular propagation cha

Climate change: changing means and changing extremes

Ongoing global warming not only involves changes in temperature and the global mean; it affects more or less every part of the climate. Regional temperature changes are often greater or smaller than corresponding changes in the global mean. In some cases the direction of change may also be different. For example, temperature changes are higher over land than over the ocean. Precipitation increases

A generalized birthday approach for efficiently finding linear relations in l-sequences

Feedback with carry shift registers (FCSRs) have previously been available in two configurations, the Fibonacci and Galois architectures. Recently, a generalized and unifying FCSR structure and theory was presented. The new ring FCSR model repairs some weaknesses of the older architectures. Most notably, the carry cell bias property that was exploited for an attack on the eSTREAM final portfolio c

Low complexity likelihood information generation for spatial-multiplexing MIMO signal detection

Abstract in UndeterminedSignal detection algorithms providing likelihood informationfor coded spatial-multiplexing multiple-input multipleoutput(MIMO) wireless communication system pose a criticaldesign challenge due to their prohibitively high computationalcomplexity. In this paper, we present a low-complexity soft-outputdetection algorithm by adopting four implementation-friendlyalgorithm-level

The use of hair as an indicator of occupational (14)C contamination.

This paper presents a study in which the specific activity of (14)C in hair has been investigated as an easily determined bio-indicator of the integrated (14)C exposure (over several months). The study includes 28 Swedish workers handling (14)C-labelled compounds, or working in a (14)C-enriched environment. Hair samples from personnel at a Swedish nuclear power plant showed very low levels of (14)

Mass transport of contaminated soil released into surface water by landslides (Göta River, SW Sweden)

Landslides of contaminated soil into surface water represent an overlooked exposure pathway that has not been addressed properly in existing risk analysis for landslide hazard, contaminated land, or river basin management. A landslide of contaminated soil into surface water implies an instantaneous exposure of the water to the soil, dramatically changing the prerequisites for the mobilisation and

Fractional Routing on Pairs of Failure-disjoint Paths

Given a set of commodities and a network where some arcs can fail while others are reliable, we consider a routing problem with respect to a survivability requirement that each commodity can be split among pairs of failure-disjoint paths. Two paths p and p′ form a pair of failure-disjoint paths if they share only reliable arcs. The same flow is sent over p and p′, but the flow sent on a common rel