— Recent studies indicate that a considerable amount of an L2 cache leakage power is dissipated in its peripheral circuits, e.g., decoders, word-lines and I/O drivers. In additio...
Houman Homayoun, Alexander V. Veidenbaum, Jean-Luc...
The work presents a modeling and analysis framework for heterogeneous industrial networks architectures which is based on a tight integration of a network simulator with embedded ...
Franco Fummi, Stefano Martini, Marco Monguzzi, Gio...
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
We are interested in whether humans create a model of their partner when they jointly manipulate an object in a virtual task without haptic feedback. In such a scenario the partne...
In this work, we investigate the viability of a novel combination of evoked responses as input signals for a general-purpose brain-machine interface (BMI). We demonstrate response...
Rudolph L. Mappus IV, Paul M. Corballis, Melody Mo...