Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
Checkpointing is a commonly used approach to provide fault-tolerance and improve system dependability. However, using a constant and preconfigured checkpointing frequency may comp...
Energy efficient office lighting systems can save 40% in electricity consumption in areas that receive significant amounts of daylight. In spite of the savings they can generate, ...
Yao-Jung Wen, Jessica Granderson, Alice M. Agogino