Sciweavers

462 search results - page 23 / 93
» Characterization-Free Behavioral Power Modeling
Sort
View
COOPIS
2004
IEEE
15 years 1 months ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
ICASSP
2010
IEEE
14 years 9 months ago
Convergence behavior of the Active Mask segmentation algorithm
We study the convergence behavior of the Active Mask (AM) framework, originally designed for segmenting punctate image patterns. AM combines the flexibility of traditional active...
Doru-Cristian Balcan, Gowri Srinivasa, Matthew C. ...
78
Voted
TODAES
2008
104views more  TODAES 2008»
14 years 9 months ago
Wavelet-based dynamic power management for nonstationary service requests
The goal of dynamic power management is to reduce power dissipation in system level by putting system components into different states. This paper proposes a wavelet based approac...
Ali Abbasian, Safar Hatami, Ali Afzali-Kusha, Mass...
ICC
2009
IEEE
113views Communications» more  ICC 2009»
15 years 4 months ago
Green Support for PC-Based Software Router: Performance Evaluation and Modeling
—We consider a new generation of COTS Software Routers (SRs), able to effectively exploit multi-Core/CPU HW platforms. Our main objective is to evaluate and to model the impact o...
Raffaele Bolla, Roberto Bruschi, Andrea Ranieri
DAC
2005
ACM
15 years 10 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede