Sciweavers

3865 search results - page 743 / 773
» Active memory operations
Sort
View
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
15 years 11 months ago
Thermal-induced leakage power optimization by redundant resource allocation
Traditionally, at early design stages, leakage power is associated with the number of transistors in a design. Hence, intuitively an implementation with minimum resource usage wou...
Min Ni, Seda Ogrenci Memik
ICDCS
2006
IEEE
15 years 11 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan
IJCNN
2006
IEEE
15 years 11 months ago
Design of Optimal PI Controllers for Doubly Fed Induction Generators Driven by Wind Turbines Using Particle Swarm Optimization
– When subjected to transient disturbances in the power grid, the variable frequency converter (VFC) is the most sensitive part in the variable-speed wind turbine generator syste...
Wei Qiao, Ganesh K. Venayagamoorthy, Ronald G. Har...
ISCAS
2006
IEEE
133views Hardware» more  ISCAS 2006»
15 years 11 months ago
Neuronal ion-channel dynamics in silicon
Abstract— We present a simple silicon circuit for modelling voltagedependent ion channels found within neural cells, capturing both the gating particle’s sigmoidal activation (...
Kai M. Hynna, Kwabena Boahen
133
Voted
NDSS
2006
IEEE
15 years 11 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...