Sciweavers

707 search results - page 78 / 142
» Experimental comparison of control architectures
Sort
View
MOBIHOC
2010
ACM
13 years 7 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
DAC
2003
ACM
14 years 10 months ago
Implications of technology scaling on leakage reduction techniques
The impact of technology scaling on three run-time leakage reduction techniques (Input Vector Control, Body Bias Control and Power Supply Gating) is evaluated by determining limit...
Yuh-Fang Tsai, David Duarte, Narayanan Vijaykrishn...
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
14 years 2 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
IEEEPACT
2000
IEEE
14 years 1 months ago
Region Formation Analysis with Demand-Driven Inlining for Region-Based Optimization
Region-based compilation repartitions a program into more desirable compilation units for optimization and scheduling, particularly beneficial for ILP architectures. With region-...
Tom Way, Ben Breech, Lori L. Pollock
ISORC
2000
IEEE
14 years 1 months ago
Hierarchical Feedback Adaptation for Real Time Sensor-Based Distributed Applications
This paper presents an innovative hierarchical feedback adaptation method that efficiently controls the dynamic QoS behavior of real-time distributed data-flow applications, such ...
Mihaela Cardei, Ionut Cardei, Rakesh Jha, Allalagh...