L Benini, G Micheli - ACM Transactions on Design Automation of …, 2000 - dl.acm.org
This tutorial surveys design methods for energy-efficient system-level design. We consider electronic sytems consisting of a hardware platform and software layers. We consider the …
Power side-channel attacks exploit variations in power consumption to extract secrets from a device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
Z Wang, M O'Boyle - Proceedings of the IEEE, 2018 - ieeexplore.ieee.org
In the last decade, machine-learning-based compilation has moved from an obscure research niche to a mainstream activity. In this paper, we describe the relationship between …
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of …
A unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical …
Is your memory hierarchy stopping your microprocessor from performing at the high level it should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem …
M Harman, Y Jia, Y Zhang - 2015 IEEE 8th International …, 2015 - ieeexplore.ieee.org
Search Based Software Testing (SBST) formulates testing as an optimisation problem, which can be attacked using computational search techniques from the field of Search Based …
S Hao, D Li, WGJ Halfond… - 2013 35th international …, 2013 - ieeexplore.ieee.org
Optimizing the energy efficiency of mobile applications can greatly increase user satisfaction. However, developers lack viable techniques for estimating the energy …
G Mouzon, MB Yildirim, J Twomey - International Journal of …, 2007 - Taylor & Francis
This paper develops operational methods for the minimization of the energy consumption of manufacturing equipment. It is observed that there can be a significant amount of energy …