Sciweavers

2945 search results - page 519 / 589
» Designing and Implementing Malicious Hardware
Sort
View
VLSID
2007
IEEE
97views VLSI» more  VLSID 2007»
16 years 4 months ago
Efficient Microprocessor Verification using Antecedent Conditioned Slicing
We present a technique for automatic verification of pipelined microprocessors using model checking. Antecedent conditioned slicing is an efficient abstraction technique for hardw...
Shobha Vasudevan, Vinod Viswanath, Jacob A. Abraha...
PERCOM
2007
ACM
16 years 4 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
MOBIHOC
2008
ACM
16 years 4 months ago
Towards energy efficient VoIP over wireless LANs
Wireless LAN (WLAN) radios conserve energy by staying in sleep mode. With real-time applications like VoIP, it is not clear how much energy can be saved by this approach since pac...
Vinod Namboodiri, Lixin Gao
ICDCS
2009
IEEE
16 years 1 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
EUROSYS
2009
ACM
16 years 1 months ago
Koala: a platform for OS-level power management
Managing the power consumption of computing platforms is a complicated problem thanks to a multitude of hardware configuration options and characteristics. Much of the academic r...
David C. Snowdon, Etienne Le Sueur, Stefan M. Pett...