Sciweavers

40 search results - page 1 / 8
» emsoft 2005
Sort
View
68
Voted
EMSOFT
2005
Springer
15 years 6 months ago
The formal verification of a reintegration protocol
Lee Pike, Steven D. Johnson
64
Voted
EMSOFT
2005
Springer
15 years 6 months ago
Exploiting last idle periods of links for network power management
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Mustaf...
65
Voted
EMSOFT
2005
Springer
15 years 6 months ago
Code aware resource management
Luca de Alfaro, Vishwanath Raman, Marco Faella, Ru...
75
Voted
EMSOFT
2005
Springer
15 years 6 months ago
Power consumption profile analysis for security attack simulation in smart cards at high abstraction level
Klaus Rothbart, Ulrich Neffe, Christian Steger, Re...