Sciweavers

88 search results - page 17 / 18
» Exploiting redundancy to conserve energy in storage systems
Sort
View
MICRO
2009
IEEE
144views Hardware» more  MICRO 2009»
14 years 3 months ago
Characterizing flash memory: anomalies, observations, and applications
Despite flash memory’s promise, it suffers from many idiosyncrasies such as limited durability, data integrity problems, and asymmetry in operation granularity. As architects, ...
Laura M. Grupp, Adrian M. Caulfield, Joel Coburn, ...
CONCURRENCY
2008
95views more  CONCURRENCY 2008»
13 years 8 months ago
The File Mover: high-performance data transfer for the grid
The exploration in many scientific disciplines (e.g., High-Energy Physics, Climate Modeling, and Life Sciences) involves the production and the analysis of massive data collection...
Cosimo Anglano, Massimo Canonico
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 5 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
JCPHY
2011
89views more  JCPHY 2011»
12 years 11 months ago
Numerically stable fluid-structure interactions between compressible flow and solid structures
We propose a novel method to implicitly two-way couple Eulerian compressible flow to volumetric Lagrangian solids. The method works for both deformable and rigid solids and for a...
Jón Tómas Grétarsson, Nipun K...
MOBIHOC
2003
ACM
14 years 8 months ago
Connected sensor cover: self-organization of sensor networks for efficient query execution
Spatial query execution is an essential functionality of a sensor network, where a query gathers sensor data within a specific geographic region. Redundancy within a sensor networ...
Himanshu Gupta, Samir R. Das, Quinyi Gu