Sciweavers

1850 search results - page 306 / 370
» Power and performance optimization at the system level
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 6 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
MOBISYS
2003
ACM
15 years 11 months ago
Energy Aware Lossless Data Compression
Wireless transmission of a bit can require over 1000 times more energy than a single 32-bit computation. It would therefore seem desirable to perform significant computation to re...
Kenneth C. Barr, Krste Asanovic
ICPADS
2005
IEEE
15 years 5 months ago
I/O Processor Allocation for Mesh Cluster Computers
As cluster systems become increasingly popular, more and more parallel applications require need not only computing power but also significant I/O performance. However, the I/O s...
Pangfeng Liu, Chun-Chen Hsu, Jan-Jan Wu
AINA
2006
IEEE
15 years 6 months ago
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks
In query-based wireless sensor networks (WSNs), the system must perform data sensing and retrieval and possibly aggregate data as a response at runtime. Since a WSN is often deplo...
Anh Phan Speer, Ing-Ray Chen
AIMS
2010
Springer
15 years 4 months ago
On the Combined Behavior of Autonomous Resource Management Agents
Abstract. A central issue in autonomic management is how to coordinate several autonomic management processes, which is assumed to require significant knowledge exchange. This stu...
Siri Fagernes, Alva L. Couch