Exploiting Application Resiliency for Energy-Efficient ... - IEEE Xplore
Recommend Documents
Section 6 closes with the outlook for multi-level memory resilience. Figure 1. .... wear-leveling approaches have been proposed to mitigate aging and extend ...
DSM allows legacy spectrum owners to lease their channels to unlicensed ... providers (WSPs) lease spectrum access rights and secondary users (SUs) ...
email: [email protected]. AbstractâThe feasibility study of a harmonic RFID chipless sensing tag is presented. The tag sensor is composed by an.
frontal face verification. Index TermsâFrontal face verification, linear discriminant analysis (LDA), nonnegative matrix factorization (NMF), sub- space techniques ...
network Facebook through an application called HappyMovie. This application tries to ... The method used to make the group recom- mendation is based on three .... Facebook. The main page of the application (Figure 1) shows three buttons: ...
server to each user's computer, event oriented database using. Binary Large Object ... be developed and implemented for real-time monitoring, operation and ...
Fig. 1. Stages of MAS application development, distinguishing simulation .... have provided a new RTI agent as the means of both controlling ..... New York, NY,.
Exploiting Class Hierarchies for Knowledge. Transfer in Hyperspectral Data. Suju Rajan, Joydeep Ghosh, Fellow, IEEE, and Melba M. Crawford, Senior Member, ...
which exploits the ground reflections to reduce the error in three dimensional localization and detect reliably the line-of-sight signals. The presented approach ...
Email {sbae, mangalag, vijay}@cse.psu.edu ... Abstract - Clock skew scheduling (CSS) is an effective ... design structural constraints that affect the CSS and.
May 22, 2017 - [7] W. Ni and X. Dong, âHybrid block diagonalization for massive .... Communication: Physical Layer Exploration Lab Using the NI USRP ( ...
climate control, e-ticketing. The new system has minimal hardware and installation cost overheads, since it exploits the already installed CCTV cameras.
Exploiting Wikipedia for Directional Inferential Text Similarity. Leong Chee Wee. Computer and Information Sciences. University of Delaware [email protected].
Jet Propulsion Laboratory. California Institute of Technology. Pasadena, CA, USA [email protected]. Azad M. Madni, Life Fellow, IEEE. Viterbi School of ...
Jun 3, 2014 - Rooting and jailbreaking. Although it can jeopardize device security, many users at- tempt to root their mobile devices and obtain superuser.
Jun 3, 2014 - machines in the 1980s, security has been a seri- ous issue for computing systems. And although computer systems have changed a lot since ...
Jun 3, 2014 - cluded that Android is the biggest target, and F-secure3 reported that the number of mobile malware samples grew from several hundreds to ...
opportunity to help move the public conversation away from doom and ... resilience is to get your head around the .....
never mind provide solutions to an abstract, undefined challenge that is still 35 years down the road. Designers can be
designer and urban planner at ... es of coordination at the city scale. As a city, what if you plan to address your own
periodically modulated media. I. INTRODUCTION. AN IMPORTANT direction in the development of free- electron lasers (FEL's) is a search for methods that will.
(DFE) based on the use of a Channel-Matched-Filter (CMF). The DIT coefficients are directly calculated from the uniform power delay profile of the CMF. The IS1 ...
Feb 6, 2015 - This paper revisits blind source separation of instantaneously mixed quasi-stationary ... Combined with non-negativity of source powers, this.
AbstractâIn previous works the authors proposed to use. Hit-and-Run (H&R) versions of Markov Chain Monte Carlo. (MCMC) algorithms for various problems of ...
Exploiting Application Resiliency for Energy-Efficient ... - IEEE Xplore
communications, or biomedical systems are inherently complexity/energy-scalable and can even tolerate a degree of imprecision in their computations and ...
Exploiting Application Resiliency for Energy-Efficient and AdequatelyReliable Operation Georgios Karakonstantis, David Atienza and Andy Burg EPFL, Lausanne, Switzerland Currently, manufacturers go to great lengths for mitigating the effects of parametric variations and scaled supply voltages by adopting conservative layout rules and by introducing several mechanisms providing redundancy on various layers of design abstraction. Such measures may have accomplished to hide any inaccurate behavior of nanometer circuits from the application layers and maintain acceptable yield levels, but unfortunately the large energy, performance, and area overheads that they incur limit their viability, especially as we move beyond the 45nm node. Such a reality has urged us to rethink the current design flows and question if such considerable overhead is really required given that many modern signal-processing workloads such as in multimedia, communications, or biomedical systems are inherently complexity/energy-scalable and can even tolerate a degree of imprecision in their computations and stored data. By taking advantage of this inherent resilience of many applications and trading off output precision and quality of service we could reduce energy usage and reliability costs, since by allowing some computations to be approximate we can alleviate the burden of correctness overhead imposed by the traditional design paradigm. In this paper, we discuss methods that could reveal and exploit the resilience and certain characteristics of biomedical and communication applications for achieving adequatelyreliable and energy efficient operation, while limiting or even avoiding the penalties required by traditional approaches.