Sciweavers

4498 search results - page 51 / 900
» The Power of Data
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive ...
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang...
VTC
2008
IEEE
145views Communications» more  VTC 2008»
15 years 4 months ago
Combined Effect of Inter-Path Interference Cancellation And Random Transmit Power Control on DS-CDMA Packet Mobile Communication
— In mobile communication systems, high speed packet data services are demanded. In the high speed data transmission, throughput degrades severely due to severe inter-path interf...
Eisuke Kudoh, Haruki Ito, ZhiSen Wang, Fumiyuki Ad...
DATE
2006
IEEE
93views Hardware» more  DATE 2006»
15 years 3 months ago
Software annotations for power optimization on mobile devices
Modern applications for mobile devices, such as multimedia video/audio, often exhibit a common behavior: they process streams of incoming data in a regular, predictable way. The r...
Radu Cornea, Alexandru Nicolau, Nikil D. Dutt
ICCD
2006
IEEE
189views Hardware» more  ICCD 2006»
15 years 6 months ago
A Capacity Co-allocation Configurable Cache for Low Power Embedded Systems
— Traditional level-one instruction caches and data caches for embedded systems typically have the same capacities. Configurable caches either shut down a part of the cache to su...
Chuanjun Zhang
ISMVL
2005
IEEE
107views Hardware» more  ISMVL 2005»
15 years 3 months ago
Multiple-Valued Caches for Power-Efficient Embedded Systems
In this paper, we propose three novel cache models using Multiple-Valued Logic (MVL) paradigm to reduce the cache data storage area and cache energy consumption for embedded syste...
Emre Özer, Resit Sendag, David Gregg