Sciweavers

711 search results - page 40 / 143
» Managing Power Consumption and Performance of Computing Syst...
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
GECCO
2010
Springer
153views Optimization» more  GECCO 2010»
13 years 11 months ago
Multi-task evolutionary shaping without pre-specified representations
Shaping functions can be used in multi-task reinforcement learning (RL) to incorporate knowledge from previously experienced tasks to speed up learning on a new task. So far, rese...
Matthijs Snel, Shimon Whiteson
DAC
2005
ACM
14 years 8 months ago
User-perceived latency driven voltage scaling for interactive applications
Power has become a critical concern for battery-driven computing systems, on which many applications that are run are interactive. System-level voltage scaling techniques, such as...
Le Yan, Lin Zhong, Niraj K. Jha
SENSYS
2004
ACM
14 years 1 months ago
Versatile low power media access for wireless sensor networks
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...
Joseph Polastre, Jason L. Hill, David E. Culler
SIGUCCS
2003
ACM
14 years 29 days ago
Integrating WebCT with diverse campus systems
The University of Delaware has a powerful legacy SIS system. The University plans to replace this system in 2004-05. In the meantime, we have populated WebCT rosters using custom ...
Jeff Whisler