Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 61, Issue 10October 2012
Reflects downloads up to 04 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Global Signal Vulnerability (GSV) Analysis for Selective State Element Hardening in Modern Microprocessors

Global Signal Vulnerability (GSV) analysis is a novel method for assessing the susceptibility of modern microprocessor state elements to failures in the field of operation. In order to effectively allocate design for reliability resources, GSV analysis ...

research-article
Cache Latency Control for Application Fairness or Differentiation in Power-Constrained Chip Multiprocessors

Limiting the peak power consumption of chip multiprocessors (CMPs) has recently received a lot of attention. In order to enable chip-level power capping, the peak power consumption of last-level (e.g., L2) on-chip caches in a CMP often needs to be ...

research-article
Robust Pipelined Memory System with Worst Case Performance Guarantee for Network Processing

Many network processing applications require wirespeed access to large data structures or a large amount of packet and flow-level data. Therefore, it is essential for the memory system of a router to be able to support both read and write accesses to ...

research-article
Dynamic Cluster Reconfiguration for Energy Conservation in Computation Intensive Service

This paper considers the problem of dynamic cluster reconfiguration for computation intensive services. In order to provide a quality-of-service in terms of overload probability, we formulate the problem of energy consumption as a constrained ...

research-article
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches

Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information or range measurements, which cannot be easily obtained in resource-limited ad hoc and ...

research-article
Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks

Compression, as a popular technique to reduce data size by exploiting data redundancy, can be used in delay sensitive wireless sensor networks (WSNs) to reduce end-to-end packet delay as it can reduce packet transmission time and contention on the ...

research-article
Toward Adaptive Sleep Schedules for Balancing Energy Consumption in Wireless Sensor Networks

In this work, we assume a geographic area populated by tiny sensors, each perhaps no larger than a dime. In order to save their energy, the sensors spend most of their lifetime in sleep mode and wake up for short periods of time to participate in ...

research-article
Access Time Analysis for IEEE P1687

The IEEE P1687 (IJTAG) standard proposal aims at providing a standardized interface between the IEEE Standard 1149.1 test access port (TAP) and on-chip embedded test, debug and monitoring logic (instruments), such as scan chains and temperature sensors. ...

research-article
Test Point Insertion with Control Points Driven by Existing Functional Flip-Flops

This paper presents a novel test point insertion method for pseudorandom built-in self-test (BIST) to reduce the area overhead. The proposed method replaces dedicated flip-flops for driving control points by existing functional flip-flops. For each ...

research-article
Temperature-Aware DVFS for Hard Real-Time Applications on Multicore Processors

This paper addresses the problem of determining the feasible speeds and voltages of multicore processors with hard real-time and temperature constraints. This is an important problem, which has applications in time-critical execution of programs like ...

research-article
A New Performance Metric for Construction of Robust and Efficient Wireless Backbone Network

With the popularity of wireless devices and the increasing demand of network applications, it is emergent to develop more effective communications paradigm to enable new and powerful pervasive applications, and to allow services to be accessed anywhere, ...

research-article
Content Discovery and Caching in Mobile Networks with Infrastructure

We address content discovery in wireless networks with infrastructure, where mobile nodes store, advertise, and consume content while Broker entities running on infrastructure devices let demand and offer meet. We refer to this paradigm as match-making, ...

Comments