Sciweavers

58 search results - page 9 / 12
» Efficient Program Power Behavior Characterization
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
14 years 27 days ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli
HPCA
2006
IEEE
14 years 9 months ago
A decoupled KILO-instruction processor
Building processors with large instruction windows has been proposed as a mechanism for overcoming the memory wall, but finding a feasible and implementable design has been an elu...
Miquel Pericàs, Adrián Cristal, Rube...
ICCAD
2009
IEEE
131views Hardware» more  ICCAD 2009»
13 years 6 months ago
Scheduling with soft constraints
In a behavioral synthesis system, a typical approach used to guide the scheduler is to impose hard constraints on the relative timing between operations considering performance, a...
Jason Cong, Bin Liu, Zhiru Zhang
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 8 months ago
Electricity Demand and Energy Consumption Management System
This project describes the electricity demand and energy consumption management system and its application to Southern Peru smelter. It is composted of an hourly demand-forecastin...
Juan Ojeda Sarmiento