Sciweavers

1992 search results - page 84 / 399
» On the (limited) power of non-equivocation
Sort
View
MOBISYS
2008
ACM
16 years 1 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
DAC
2003
ACM
16 years 2 months ago
Implications of technology scaling on leakage reduction techniques
The impact of technology scaling on three run-time leakage reduction techniques (Input Vector Control, Body Bias Control and Power Supply Gating) is evaluated by determining limit...
Yuh-Fang Tsai, David Duarte, Narayanan Vijaykrishn...
CHI
2002
ACM
16 years 2 months ago
A flexible 3d sound system for interactive applications
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
Lalya Gaye
ICCD
2002
IEEE
70views Hardware» more  ICCD 2002»
15 years 10 months ago
Dynamic Loop Caching Meets Preloaded Loop Caching - A Hybrid Approach
Dynamically-loaded tagless loop caching reduces instruction fetch power for embedded software with small loops, but only supports simple loops without taken branches. Preloaded ta...
Ann Gordon-Ross, Frank Vahid
92
Voted
COCOON
2007
Springer
15 years 8 months ago
Priority Algorithms for the Subset-Sum Problem
Greedy algorithms are simple, but their relative power is not well understood. The priority framework [5] captures a key notion of “greediness” in the sense that it processes (...
Yuli Ye, Allan Borodin