简介:ThispaperpresentsanotherformalproofforthecorrectnessoftheDeadlineDrivenScheduler(DDS).ThisproofisgivenintermsofDurationCalculuswhichprovidesabstractionforrandompreemptionofprocessor.Comparedwithotherapproaches,thisproofreliesonmanyintuitivefacts.Thereforethisproofismoreintuitive,whileitisstillformal.
简介:ItisgenerallyacknowledgedthatmobilecommunicationbasestationsarecomposedofhardwarecomponentssuchasFieldProgrammingGateArray(FPGA),DigitalSignalProcessor(DSP),whichpromisereliableandfluentservicesforthemobileusers.However,withtheincreasingdemandforenergy-efficiency,approachesoflowpower-consumptionandhigh-flexibilityareneededurgently.Inthiscircumstance,GeneralPurposeProcessor(GPP)attractspeople'sattentionforitslow-costandflexibility.BenefitedfromthedevelopmentofmodernGPPinmulti-core,SingleInstructionMultipleData(SIMD)instructions,largercache,etc.,GPPsarecapableofperforminghigh-densitydigitalprocessing.Inthispaper,wecompareseveralsoftware-definedradio(SDR)prototypesandproposethegeneralarchitectureofGPP-basedsoftbasestations.Then,theschematicdesignofresourceallocationandalgorithmoptimizationinsoftbasestationimplementationarestudied.Asanapplicationexample,aprototypeofGPP-basedsoftbasestationreferringtothe3rdGenerationPartnershipProject(3GPP)LongTermEvolution(LTE)isrealizedandevaluated.Tothebestofourknowledge,itisthefirstSoft-LTEprototypeeverreported.Intheend,weevaluatethetimingperformanceoftheLTEsoftbasestationandapacketlossratiooflessthan0.003isobtained.
简介:Somepreliminaryresultsonstrictboundedreallemmafortime-varyingcontinuouslinearsystemsareproposed,whereuncertaintyininitialconditions,terminalcostandextremeofthecostfunctionaredealtwithexplicitly.Basedontheseresults,anewrecursiveapproachisproposedinthenecessityproofofstrictboundedreallemmaforgeneralizedlinearsystemwithfinitediscretejumps.
简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.