Sciweavers

2382 search results - page 143 / 477
» An Energy Backpropagation Algorithm
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 7 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
OSDI
1994
ACM
15 years 3 months ago
Scheduling for Reduced CPU Energy
The energy usage of computer systems is becoming more important, especially for battery operated systems. Displays, disks, and cpus, in that order, use the most energy. Reducing t...
Mark Weiser, Brent B. Welch, Alan J. Demers, Scott...
CCS
2007
ACM
15 years 8 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
DEXAW
2005
IEEE
263views Database» more  DEXAW 2005»
15 years 7 months ago
Energy Aware Routing Protocol for Heterogeneous Wireless Sensor Networks
In this paper we present Energy Aware Random Asynchronous Wakeup (RAW-E), a novel crosslayer power management and routing protocol for heterogeneous wireless sensor and actor netw...
Vamsi Paruchuri, Arjan Durresi, Leonard Barolli
SCOPES
2004
Springer
15 years 7 months ago
Combined Data Partitioning and Loop Nest Splitting for Energy Consumption Minimization
For mobile embedded systems, the energy consumption is a limiting factor because of today’s battery capacities. Besides the processor, memory accesses consume a high amount of en...
Heiko Falk, Manish Verma