Sciweavers

201 search results - page 38 / 41
» Evaluating Run-Time Techniques for Leakage Power Reduction
Sort
View
METRICS
1998
IEEE
13 years 11 months ago
Getting a Handle on the Fault Injection Process: Validation of Measurement Tools
In any manufacturing environment, the fault injection rate might be considered one of the most meaningful criterion to evaluate the goodness of the development process. In our fie...
Sebastian G. Elbaum, John C. Munson
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 8 months ago
Practical guide to controlled experiments on the web: listen to your customers not to the hippo
The web provides an unprecedented opportunity to evaluate ideas quickly using controlled experiments, also called randomized experiments (single-factor or factorial designs), A/B ...
Ron Kohavi, Randal M. Henne, Dan Sommerfield
DEXAW
2005
IEEE
263views Database» more  DEXAW 2005»
14 years 1 months ago
Energy Aware Routing Protocol for Heterogeneous Wireless Sensor Networks
In this paper we present Energy Aware Random Asynchronous Wakeup (RAW-E), a novel crosslayer power management and routing protocol for heterogeneous wireless sensor and actor netw...
Vamsi Paruchuri, Arjan Durresi, Leonard Barolli
CF
2004
ACM
13 years 11 months ago
Reducing traffic generated by conflict misses in caches
Off-chip memory accesses are a major source of power consumption in embedded processors. In order to reduce the amount of traffic between the processor and the off-chip memory as ...
Pepijn J. de Langen, Ben H. H. Juurlink
POPL
2012
ACM
12 years 3 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...