Sciweavers

1183 search results - page 80 / 237
» Risk Management with Benchmarking
Sort
View
ICCD
2008
IEEE
118views Hardware» more  ICCD 2008»
16 years 1 months ago
Adaptive techniques for leakage power management in L2 cache peripheral circuits
— Recent studies indicate that a considerable amount of an L2 cache leakage power is dissipated in its peripheral circuits, e.g., decoders, word-lines and I/O drivers. In additio...
Houman Homayoun, Alexander V. Veidenbaum, Jean-Luc...
134
Voted
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
16 years 1 months ago
Remote activation of ICs for piracy prevention and digital right management
— We introduce a remote activation scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock eac...
Yousra Alkabani, Farinaz Koushanfar, Miodrag Potko...
EAGC
2003
Springer
15 years 9 months ago
Job Scheduling and Resource Management Techniques in Economic Grid Environments
Abstract. In this paper, we analyze the problem of grid resource brokering in the presence of economic information about the price of resources. We examine in detail the main tasks...
Rafael Moreno, Ana B. Alonso-Conde
JASIS
2010
129views more  JASIS 2010»
15 years 2 months ago
Science overlay maps: A new tool for research policy and library management
We present a novel approach to visually locate bodies of research within the sciences, both at each moment of time and dynamically. This article describes how this approach fits w...
Ismael Rafols, Alan L. Porter, Loet Leydesdorff
SCS
2004
15 years 5 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay