Sciweavers

SP
2010
IEEE
158views Security Privacy» more  SP 2010»
13 years 8 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ISPASS
2007
IEEE
13 years 11 months ago
Complete System Power Estimation: A Trickle-Down Approach Based on Performance Events
This paper proposes the use of microprocessor performance counters for online measurement of complete system power consumption. While past studies have demonstrated the use of per...
W. Lloyd Bircher, Lizy K. John
ICONS
2009
IEEE
13 years 11 months ago
Power Saving of Real Time Embedded Sensor for Medical Remote Monitoring
The power saving is one of the important issue in the embedded systems. To reduce the consumption of the microprocessor of such a system, a way is to power down it when it is inac...
Frederic Fauberteau, Serge Midonnet, Dan Istrate
FCCM
2009
IEEE
133views VLSI» more  FCCM 2009»
13 years 11 months ago
Exploiting Partially Reconfigurable FPGAs for Situation-Based Reconfiguration in Wireless Sensor Networks
—Wireless sensor networks (WSNs) are typically composed of very small, battery-operated devices (sensor nodes) containing simple microprocessors with few computational resources....
Rafael Garcia, Ann Gordon-Ross, Alan D. George