Sciweavers

774 search results - page 82 / 155
» Experiences of low power design implementation and verificat...
Sort
View
ISSTA
2004
ACM
14 years 2 months ago
Faster constraint solving with subtypes
Constraints in predicate or relational logic can be translated into boolean logic and solved with a SAT solver. For faster solving, it is common to exploit the typing of predicate...
Jonathan Edwards, Daniel Jackson, Emina Torlak, Vi...
MOBISYS
2011
ACM
12 years 11 months ago
Exploiting FM radio data system for adaptive clock calibration in sensor networks
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message pa...
Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, R...
HUC
2010
Springer
13 years 10 months ago
WATTR: a method for self-powered wireless sensing of water activity in the home
We present WATTR, a novel self-powered water activity sensor that utilizes residential water pressure impulses as both a powering and sensing source. Consisting of a power harvest...
Tim Campbell, Eric Larson, Gabe Cohn, Ramses Alcai...
IEEEPACT
2003
IEEE
14 years 2 months ago
Memory Hierarchy Design for a Multiprocessor Look-up Engine
We investigate the implementation of IP look-up for core routers using multiple microengines and a tailored memory hierarchy. The main architectural concerns are limiting the numb...
Jean-Loup Baer, Douglas Low, Patrick Crowley, Neal...
DAC
2006
ACM
14 years 9 months ago
A parallelized way to provide data encryption and integrity checking on a processor-memory bus
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking Engine), enabling to guarantee confidentiality and integrity of data exchanged b...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...