Search results

Filter

Filetype

Your search for "Cheap fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The process was smooth and quick..imwG" yielded 89743 hits

In vivo evaluation of large-scale IR-based traceability recovery

Modern large-scale software development is a complex undertaking and coordinating various processes is crucial to achieve efficiency. The alignment between requirements and test activities is one important aspect. Production and maintenance of software result in an ever-increasing amount of information. To be able to work efficiently under such circumstances, navigation in all available data needs

A Survey on Fast Correlation Attacks

Fast correlation attacks, pioneered by Meier and Staffelbach in 1988, constitute an important class of attacks on stream ciphers. They exploit a correlation between the keystream and the output of a linear feedback shift register (LFSR) within the cipher. Several factors affect the feasibility of such an attack, e.g., the amount of available keystream and the number of taps in the LFSR. Notably, f

Design exploration of a 65 nm Sub-VT CMOS digital decimation filter chain

This paper presents an analysis on energy dissipation of digital half-band filters operating in the sub-threshold (sub-VT) region with throughput and supply voltage constraints. A 12-bit filter is implemented along with various unfolded structures, used to form a decimation filter chain. The designs are synthesized in a 65 nm low-leakage CMOS technology with various threshold voltages. A sub-VT en

Design and Measurement of a Variable-Rate Viterbi Decoder in 130-nm Digital CMOS

This paper discusses design and measurements of a flexible Viterbi decoder fabricated in 130-nm digital CMOS. Flexibility was incorporated by providing various code rates and modulation schemes to adjust to varying channel conditions. Based on previous trade-off studies, flexible building blocks were carefully designed to cause as little area penalty as possible. The chip runs down to a minimal co

Improved distinguishers for HC-128

HC-128 is an eSTREAM final portfolio stream cipher. Several authors have investigated its security and, in particular, distinguishing attacks have been considered. Still, no one has been able to provide a distinguisher stronger than the one presented by Wu in the original HC-128 paper. In this paper we first argue that the keystream requirement in Wu’s original attack is underestimated by a factor

High-level energy estimation in the sub-VT domain: simulation and measurement of a cardiac event detector

This paper presents a flow that is suitable to estimate energy dissipation of digital standard-cell based designs which are determined to be operated in the sub-threshold regime. The flow is applicable on gate-level netlists, where back-annotated toggle information is used to find the minimum energy operation point, corresponding maximum clock frequency, as well as the dissipated energy per clock

Fair Flow Rate Optimization by Effective Placement of Directional Antennas in Wireless Mesh Networks

Directional antennas have been used to solve interference and connectivity issues in wireless networks for some time. Many scenarios have been presented and often positive conclusions are drawn, i.e., showing the increase in capacity. However, to date the research has mainly focused on either antenna placement or transmission scheduling but not the two combined. Such consideration will become incr

Greedy distinguishers and nonrandomness detectors

We present the concept of greedy distinguishers and show how some simple observations and the well known greedy heuristic can be combined into a very powerful strategy (the Greedy Bit Set Algorithm) for efficient and systematic construction of distinguishers and nonrandomness detectors. We show how this strategy can be applied to a large array of stream and block ciphers, and we show that our meth

The (in-) validity of the WSSUS assumption in vehicular radio channels

The assumption of wide-sense-stationarity (WSS) and uncorrelated scattering (US) of wireless propagation channels is widespread for the design and analysis of wireless propagation channels. However, the assumption is only valid within a limited range. In this paper, we investigate the extension of this range not only in time (WSS), but also in frequency (US), for measured vehicular propagation cha

Climate change: changing means and changing extremes

Ongoing global warming not only involves changes in temperature and the global mean; it affects more or less every part of the climate. Regional temperature changes are often greater or smaller than corresponding changes in the global mean. In some cases the direction of change may also be different. For example, temperature changes are higher over land than over the ocean. Precipitation increases

A generalized birthday approach for efficiently finding linear relations in l-sequences

Feedback with carry shift registers (FCSRs) have previously been available in two configurations, the Fibonacci and Galois architectures. Recently, a generalized and unifying FCSR structure and theory was presented. The new ring FCSR model repairs some weaknesses of the older architectures. Most notably, the carry cell bias property that was exploited for an attack on the eSTREAM final portfolio c

Low complexity likelihood information generation for spatial-multiplexing MIMO signal detection

Abstract in UndeterminedSignal detection algorithms providing likelihood informationfor coded spatial-multiplexing multiple-input multipleoutput(MIMO) wireless communication system pose a criticaldesign challenge due to their prohibitively high computationalcomplexity. In this paper, we present a low-complexity soft-outputdetection algorithm by adopting four implementation-friendlyalgorithm-level

The use of hair as an indicator of occupational (14)C contamination.

This paper presents a study in which the specific activity of (14)C in hair has been investigated as an easily determined bio-indicator of the integrated (14)C exposure (over several months). The study includes 28 Swedish workers handling (14)C-labelled compounds, or working in a (14)C-enriched environment. Hair samples from personnel at a Swedish nuclear power plant showed very low levels of (14)

Mass transport of contaminated soil released into surface water by landslides (Göta River, SW Sweden)

Landslides of contaminated soil into surface water represent an overlooked exposure pathway that has not been addressed properly in existing risk analysis for landslide hazard, contaminated land, or river basin management. A landslide of contaminated soil into surface water implies an instantaneous exposure of the water to the soil, dramatically changing the prerequisites for the mobilisation and

Fractional Routing on Pairs of Failure-disjoint Paths

Given a set of commodities and a network where some arcs can fail while others are reliable, we consider a routing problem with respect to a survivability requirement that each commodity can be split among pairs of failure-disjoint paths. Two paths p and p′ form a pair of failure-disjoint paths if they share only reliable arcs. The same flow is sent over p and p′, but the flow sent on a common rel

Hardware Acceleration of the Robust Header Compression (RoHC) Algorithm

In LTE base-stations, RoHC is a processingintensive algorithm that may limit the system from serving a large number of users when it is used to compress the VoIP packets of mobile traffic. In this paper, a hardware-software and a full-hardware solution are proposed to accelerate the RoHC compression algorithm in LTE base-stations and enhance the system throughput and capacity. Results for both sol

Case studies synthesis: a thematic, cross-case, and narrative synthesis worked example

Case studies are largely used for investigating software engineering practices. They are characterized by their flexible nature, multiple forms of data collection, and are mostly informed by qualitative data. Synthesis of case studies is necessary to build a body of knowledge from individual cases. There are many methods for such synthesis, but they are yet not well explored in software engineerin

A Digitally Assisted Non-Linearity Mitigation System for Tunable Channel Select Filters

This brief presents a low-complexity system for digitally assisting a channel select filter (CSF) to mitigate both even- and odd-order nonlinearities. The proposed solution is scalable and can be utilized for nonlinearity mitigation in different analog transceiver blocks. The system consists of an auxiliary path with a low-resolution analog to digital converter (ADC) enabling digital recreation an

Challenges in aligning requirements engineering and verification in a large-scale industrial context

[Context and motivation] When developing software, coordination between different organizational units is essential in order to develop a good quality product, on time and within budget. Particularly, the synchronization between requirements and verification processes is crucial in order to assure that the developed software product satisfies customer requirements. [Question/problem] Our research

An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers

We describe a state recovery attack on the X-FCSR family of stream ciphers. In this attack we analyse each block of output keystream and try to solve for the state. The solver will succeed when a number of state conditions are satisfied. For X-FCSR-256, our best attack has a computational complexity of only 2^{4.7} table lookups per block of keystream, with an expected 2^{44.3} such blocks before