Sciweavers

564 search results - page 83 / 113
» Modeling Hard-Disk Power Consumption
Sort
View
IJSN
2008
90views more  IJSN 2008»
13 years 8 months ago
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
: In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh network...
Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho,...
TSMC
2010
13 years 3 months ago
Multiobjective Optimization of Temporal Processes
Abstract--This paper presents a dynamic predictiveoptimization framework of a nonlinear temporal process. Datamining (DM) and evolutionary strategy algorithms are integrated in the...
Zhe Song, Andrew Kusiak
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
14 years 2 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
ISLPED
2007
ACM
169views Hardware» more  ISLPED 2007»
13 years 10 months ago
Throughput of multi-core processors under thermal constraints
We analyze the effect of thermal constraints on the performance and power of multi-core processors. We propose system-level power and thermal models, and derive expressions for (a...
Ravishankar Rao, Sarma B. K. Vrudhula, Chaitali Ch...
WOSP
2010
ACM
14 years 3 months ago
SLA-driven planning and optimization of enterprise applications
We propose a model-based methodology to size and plan enterprise applications under Service Level Agreements (SLAs). Our approach is illustrated using a real-world Enterprise Reso...
Hui Li, Giuliano Casale, Tariq N. Ellahi