Sciweavers

1992 search results - page 66 / 399
» On the (limited) power of non-equivocation
Sort
View
CCS
2004
ACM
15 years 5 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
NIPS
2007
15 years 1 months ago
Managing Power Consumption and Performance of Computing Systems Using Reinforcement Learning
Electrical power management in large-scale IT systems such as commercial datacenters is an application area of rapidly growing interest from both an economic and ecological perspe...
Gerald Tesauro, Rajarshi Das, Hoi Chan, Jeffrey O....
ISCA
2011
IEEE
287views Hardware» more  ISCA 2011»
14 years 3 months ago
Scalable power control for many-core architectures running multi-threaded applications
Optimizing the performance of a multi-core microprocessor within a power budget has recently received a lot of attention. However, most existing solutions are centralized and cann...
Kai Ma, Xue Li, Ming Chen, Xiaorui Wang
ICCD
2007
IEEE
183views Hardware» more  ICCD 2007»
15 years 8 months ago
Constraint satisfaction in incremental placement with application to performance optimization under power constraints
We present new techniques for explicit constraint satisfaction in the incremental placement process. Our algorithm employs a Lagrangian Relaxation (LR) type approach in the analyt...
Huan Ren, Shantanu Dutt
IPPS
2005
IEEE
15 years 5 months ago
Reducing Power with Performance Constraints for Parallel Sparse Applications
Sparse and irregular computations constitute a large fraction of applications in the data-intensive scientific domain. While every effort is made to balance the computational wor...
Guangyu Chen, Konrad Malkowski, Mahmut T. Kandemir...