-
1
-
-
77952887143
-
Synchronized phasor measurement applications in power systems
-
J. Ree, V. Centeno, J. Thorp, and A. Phadke, "Synchronized phasor measurement applications in power systems," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 20-27, 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 20-27
-
-
Ree, J.1
Centeno, V.2
Thorp, J.3
Phadke, A.4
-
2
-
-
33746995009
-
System-level power optimization: Techniques and tools
-
B. Luca and G. D. Micheli, "System-level power optimization: Techniques and tools," ACM Trans. Design Autom. Electron. Syst., vol. 5, no. 2, pp. 115-192, 2000.
-
(2000)
ACM Trans. Design Autom. Electron. Syst.
, vol.5
, Issue.2
, pp. 115-192
-
-
Luca, B.1
Micheli, G.D.2
-
3
-
-
77649188805
-
Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment
-
Mar.
-
M. Qiu, L. T. Yang, Z. Shao, and E. H.-M. Sha, "Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 18, no. 3, pp. 501-504, Mar. 2010.
-
(2010)
IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
, vol.18
, Issue.3
, pp. 501-504
-
-
Qiu, M.1
Yang, L.T.2
Shao, Z.3
Sha, E.H.-M.4
-
4
-
-
65849231067
-
Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
-
Art. 25 Apr. ACM TODAES 2011 Best Paper Award
-
M. Qiu and E. H.-M. Sha, "Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems," ACM Trans. Design Autom. Electron. Syst. (TODAES), vol. 14, no. 2, Art. 25, pp. 1-30, Apr. 2009, ACM TODAES 2011 Best Paper Award.
-
(2009)
ACM Trans. Design Autom. Electron. Syst. (TODAES)
, vol.14
, Issue.2
, pp. 1-30
-
-
Qiu, M.1
Sha, E.H.-M.2
-
6
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
V. Shnayder, M. Hempstead, B. Chen, G. W. Allen, and M. Welsh, "Simulating the power consumption of large-scale sensor network applications," in Proc. 2nd ACM Int. Conf. Embedded Networked Sensor Syst., 2004, pp. 188-200. (Pubitemid 41563359)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.-R.3
Allen, G.W.4
Welsh, M.5
-
7
-
-
33745137852
-
Accurate prediction of power consumption in sensor networks
-
DOI 10.1109/EMNETS.2005.1469097, 1469097, Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II
-
O. Landsiedel, K. Wehrle, and S. Gotz, "Accurate prediction of power consumption in sensor networks," in Proc. 2nd IEEE Workshop Embedded Networked Sensors, 2005, pp. 37-44. (Pubitemid 43897527)
-
(2005)
Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II
, vol.2005
, pp. 37-44
-
-
Landsiedel, O.1
Wehrle, K.2
Gotz, S.3
-
8
-
-
84866494570
-
PowerTOSSIM z: Realistic energy modelling for wireless sensor network environments
-
E. Perla, A. Cathain, R. S. Carbajo, M. Huggard, and C. M. Goldrick, "PowerTOSSIM z: Realistic energy modelling for wireless sensor network environments," in Proc. 3nd ACM Workshop Performance Monitoring Meas. Heterogeneous Wireless Wired Networks, 2008, pp. 35-42.
-
(2008)
Proc. 3nd ACM Workshop Performance Monitoring Meas. Heterogeneous Wireless Wired Networks
, pp. 35-42
-
-
Perla, E.1
Cathain, A.2
Carbajo, R.S.3
Huggard, M.4
Goldrick, C.M.5
-
9
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A. S.Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2005, pp. 324-328. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
10
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded Internet," in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2005, pp. 247-256. (Pubitemid 43727934)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
11
-
-
79958145375
-
Securing wide area measurement systems
-
Tech. Rep.
-
M. Hadley, J. McBride, T. Edgar, L. O'Neil, and J. Johnson, "Securing wide area measurement systems," Pacific Northwest Natl. Lab., Tech. Rep., 2007.
-
(2007)
Pacific Northwest Natl. Lab.
-
-
Hadley, M.1
McBride, J.2
Edgar, T.3
O'Neil, L.4
Johnson, J.5
-
12
-
-
77956064262
-
Smart transmission grid: Vision and framework
-
F. Li, W. Qiao, H. Sun, H.Wan, J.Wang, Y. Xia, Z. Xu, and P. Zhang, "Smart transmission grid: Vision and framework," IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 168-177, 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.2
, pp. 168-177
-
-
Li, F.1
Qiao, W.2
Sun, H.3
Wan, H.4
Wang, J.5
Xia, Y.6
Xu, Z.7
Zhang, P.8
-
13
-
-
77956063489
-
Wide-area frequency monitoring network (FNET) architecture and applications
-
Y. Zhang, P. Markham, T. Xia, L. Chen, Y. Ye, and Z. Wu et al., "Wide-area frequency monitoring network (FNET) architecture and applications," IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 159-167, 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.2
, pp. 159-167
-
-
Zhang, Y.1
Markham, P.2
Xia, T.3
Chen, L.4
Ye, Y.5
Wu, Z.6
-
14
-
-
77952885267
-
A flexible phasor data concentrator design leveraging existing software technologies
-
A. Armenia and J. Chow, "A flexible phasor data concentrator design leveraging existing software technologies," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 73-80, 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 73-80
-
-
Armenia, A.1
Chow, J.2
-
15
-
-
77956061246
-
Next-generation monitoring, analysis, and controlfor the future smart control center
-
P. Zhang, F. Li, and N. Bhatt, "Next-generation monitoring, analysis, and controlfor the future smart control center," IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 186-192, 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.2
, pp. 186-192
-
-
Zhang, P.1
Li, F.2
Bhatt, N.3
-
16
-
-
39349085430
-
Secure key management architecture against sensor-node fabrication attacks
-
DOI 10.1109/GLOCOM.2007.39, 4410949, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
J. Dwoskin, D. Xu, J. Huang, M. Chiang, and R. Lee, "Secure key management architecture against sensor-node fabrication attacks," in IEEE Global Telecommun. Conf., 2007, pp. 166-171. (Pubitemid 351259027)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 166-171
-
-
Dwoskin, J.1
Xu, D.2
Huang, J.3
Chiang, M.4
Lee, R.5
-
17
-
-
38149061688
-
Preventing DoS attacks in wireless sensor networks: A repeated game theory approach
-
A. Agah and S. Das, "Preventing DoS attacks in wireless sensor networks: A repeated game theory approach," Int. J. Network Security, vol. 5, no. 2, pp. 145-153, 2007.
-
(2007)
Int. J. Network Security
, vol.5
, Issue.2
, pp. 145-153
-
-
Agah, A.1
Das, S.2
-
18
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symp. Security Privacy, 2005, pp. 49-63. (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
19
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasure
-
C. Karlof and D.Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasure," Ad-Hoc Network, vol. 1, no. 2, pp. 293-315, 2007.
-
(2007)
Ad-Hoc Network
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
20
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
H. Chan, A. Perrig, and D. Song, "Secure hierarchical in-network aggregation in sensor networks," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 1-10.
-
(2006)
Proc. ACM Conf. Comput. Commun. Security
, pp. 1-10
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
21
-
-
82155177642
-
Power-effi-cient adaptable wireless sensor networks
-
J. Lach, D. Evans, J. McCune, J. Brandon, and L. Hu, "Power-effi- cient adaptable wireless sensor networks," in Proc. Int. Conf. Military Aerosp. Programmable Logic Devices, 2003, pp. 1-8.
-
(2003)
Proc. Int. Conf. Military Aerosp. Programmable Logic Devices
, pp. 1-8
-
-
Lach, J.1
Evans, D.2
McCune, J.3
Brandon, J.4
Hu, L.5
-
22
-
-
38549122795
-
Balancing security and energy consumption in wireless sensor networks
-
Mobile Ad-hoc and Sensor Networks - Third International Conference, MSN 2007, Proceedings
-
C. C. Chang, D. J. Nagel, and S. Muftic, "Balancing security and energy consumption in wireless sensor networks," Lecture Notes in Computer Science, vol. 4864, pp. 469-480, 2007. (Pubitemid 351145018)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4864
, pp. 469-480
-
-
Chang, C.-C.1
Nagel, D.J.2
Muftic, S.3
-
23
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
Networking, Commun.
-
G. D. Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, "On the energy cost of communication and cryptography in wireless sensor networks," in IEEE Int. Conf. Wireless Mobile Comput., Networking, Commun., 2008, pp. 580-585.
-
(2008)
IEEE Int. Conf. Wireless Mobile Comput.
, pp. 580-585
-
-
Meulenaer, G.D.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
24
-
-
69949143009
-
Performance assessment of a class of cross-layer optimized protocols for geographic routing in WSNs
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz, "Performance assessment of a class of cross-layer optimized protocols for geographic routing in WSNs," in Proc. IEEE Int. Symp. Personal, Indoor, Mobile Radio Commun., 2008, pp. 1-5.
-
(2008)
Proc. IEEE Int. Symp. Personal, Indoor, Mobile Radio Commun.
, pp. 1-5
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
25
-
-
39049158752
-
Experimental performance evaluation of cryptographic algorithms on sensor nodes
-
M. Passing and F. Dressler, "Experimental performance evaluation of cryptographic algorithms on sensor nodes," in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2006, pp. 882-887.
-
(2006)
Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst.
, pp. 882-887
-
-
Passing, M.1
Dressler, F.2
-
27
-
-
0004072686
-
-
2 ed. Reading, MA: Pearson/Addison-Wesley
-
V. Alfred, R. Sethi, and J. D. Ullman, Compilers: Principles, Techniques, and Tools, 2 ed. Reading, MA: Pearson/Addison-Wesley, 2007.
-
(2007)
Compilers: Principles, Techniques, and Tools
-
-
Alfred, V.1
Sethi, R.2
Ullman, J.D.3
-
28
-
-
82155177638
-
Energy evaluation of software implementations of block ciphers under memory constraints
-
J. Grossschadl, S. Tillich, C. Rechberger, M. Hofmann, and M. Medwed, "Energy evaluation of software implementations of block ciphers under memory constraints," in Proc. IEEE/ACM DATE, 2007, pp. 1-6.
-
(2007)
Proc. IEEE/ACM DATE
, pp. 1-6
-
-
Grossschadl, J.1
Tillich, S.2
Rechberger, C.3
Hofmann, M.4
Medwed, M.5
|