Sciweavers

1992 search results - page 84 / 399
» On the (limited) power of non-equivocation
Sort
View
MOBISYS
2008
ACM
15 years 11 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
DAC
2003
ACM
16 years 26 days ago
Implications of technology scaling on leakage reduction techniques
The impact of technology scaling on three run-time leakage reduction techniques (Input Vector Control, Body Bias Control and Power Supply Gating) is evaluated by determining limit...
Yuh-Fang Tsai, David Duarte, Narayanan Vijaykrishn...
CHI
2002
ACM
16 years 7 days ago
A flexible 3d sound system for interactive applications
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
Lalya Gaye
ICCD
2002
IEEE
70views Hardware» more  ICCD 2002»
15 years 8 months ago
Dynamic Loop Caching Meets Preloaded Loop Caching - A Hybrid Approach
Dynamically-loaded tagless loop caching reduces instruction fetch power for embedded software with small loops, but only supports simple loops without taken branches. Preloaded ta...
Ann Gordon-Ross, Frank Vahid
COCOON
2007
Springer
15 years 6 months ago
Priority Algorithms for the Subset-Sum Problem
Greedy algorithms are simple, but their relative power is not well understood. The priority framework [5] captures a key notion of “greediness” in the sense that it processes (...
Yuli Ye, Allan Borodin