Sciweavers

226 search results - page 37 / 46
» A Study on Impact of Leakage Current on Dynamic Power
Sort
View
ICN
2009
Springer
14 years 2 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
CAL
2006
13 years 7 months ago
User-Driven Frequency Scaling
Abstract-- We propose and evaluate User-Driven Frequency Scaling (UDFS) for improved power management on processors that support Dynamic Voltage and Frequency Scaling (DVFS), e.g, ...
Arindam Mallik, Bin Lin, Gokhan Memik, Peter A. Di...
MKWI
2008
117views Business» more  MKWI 2008»
13 years 9 months ago
The Emergence of Partnership Networks in the Enterprise Application Development Industry - An SME Perspective
: The IS development industry is currently undergoing profound changes. The well established, large system developers (hubs) take the lead in establishing partner networks with muc...
Jens Arndt, Thomas Kude, Jens Dibbern
ICDCS
2008
IEEE
14 years 2 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
ISPD
2006
ACM
68views Hardware» more  ISPD 2006»
14 years 1 months ago
Solving hard instances of floorplacement
Physical Design of modern systems on chip is extremely challenging. Such digital integrated circuits often contain tens of millions of logic gates, intellectual property blocks, e...
Aaron N. Ng, Igor L. Markov, Rajat Aggarwal, Venky...