Sciweavers

666 search results - page 64 / 134
» Power analysis of embedded operating systems
Sort
View
FSTTCS
2001
Springer
15 years 8 months ago
On Clustering Using Random Walks
Abstract. We propose a novel approach to clustering, based on deterministic analysis of random walks on the weighted graph associated with the clustering problem. The method is cen...
David Harel, Yehuda Koren
AMSTERDAM
2009
15 years 2 months ago
Supplements within a Unidimensional Semantics I: Scope
Potts (2005, 2007) claims that Grice's `conventional implicatures' offer a powerful argument in favor of a multidimensional semantics, one in which certain expressions fa...
Philippe Schlenker
ICCAD
2001
IEEE
84views Hardware» more  ICCAD 2001»
16 years 1 months ago
Stars in VCC: Complementing Simulation with Worst-Case Analysis
tems. STARS manipulates abstract representations of system components to obtain upper bounds on the number of various events in the system, as well as a bound on the response time....
Felice Balarin
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 9 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
114
Voted
DATE
2010
IEEE
204views Hardware» more  DATE 2010»
15 years 9 months ago
Assertion-based verification of RTOS properties
— Today, mobile and embedded real time systems have to cope with the migration and allocation of multiple software tasks running on top of a real time operating system (RTOS) res...
Marcio F. S. Oliveira, Henning Zabel, Wolfgang M&u...