Sciweavers

3146 search results - page 563 / 630
» The use of compiler optimizations for embedded systems softw...
Sort
View
IPPS
2002
IEEE
15 years 9 months ago
Model-Based Control of Adaptive Applications: An Overview
Model-based control utilizes performance models of applications to choose performant system configurations for execution of applications. The performance models used in this resea...
Vikram S. Adve, Afolami Akinsanmi, James C. Browne...
CSMR
2010
IEEE
14 years 11 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 9 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
162
Voted
CODES
2009
IEEE
15 years 11 months ago
FRA: a flash-aware redundancy array of flash storage devices
Since flash memory has many attractive characteristics such as high performance, non-volatility, low power consumption and shock resistance, it has been widely used as storage med...
Yangsup Lee, Sanghyuk Jung, Yong Ho Song
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 9 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...