Sciweavers

5446 search results - page 901 / 1090
» Mobile computing
Sort
View
124
Voted
MM
2005
ACM
157views Multimedia» more  MM 2005»
15 years 8 months ago
Chameleon: application level power management with performance isolation
In this paper, we present Chameleon—an application-level power management approach for reducing energy consumption in mobile processors. Our approach exports the entire responsi...
Xiaotao Liu, Prashant J. Shenoy, Mark D. Corner
MSWIM
2004
ACM
15 years 8 months ago
Experimental evaluation of wireless simulation assumptions
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. Although it is tempting to assume that a...
David Kotz, Calvin C. Newport, Robert S. Gray, Jas...
BMCBI
2007
187views more  BMCBI 2007»
15 years 3 months ago
BioWMS: a web-based Workflow Management System for bioinformatics
Background: An in-silico experiment can be naturally specified as a workflow of activities implementing, in a standardized environment, the process of data and control analysis. A...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...
SWSTE
2005
IEEE
15 years 9 months ago
Mapping Structures for Flash Memories: Techniques and Open Problems
Flash memory is a type of electrically erasable programmable read-only memory (EEPROM). Because flash memories are nonvolatile and relatively dense, they are now used to store ï¬...
Eran Gal, Sivan Toledo
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 9 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee