-
1
-
-
1242287735
-
Greening of the internet
-
SIGCOMM '03 ACM New York, NY, USA
-
M. Gupta, and S. Singh Greening of the internet Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications SIGCOMM '03 2003 ACM New York, NY, USA 19 26 10.1145/863955.863959
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 19-26
-
-
Gupta, M.1
Singh, S.2
-
3
-
-
81255164845
-
Saving energy in data center infrastructures
-
S. Ricciardi, D. Careglio, G. Santos-Boada, J. Sole-Pareta, U. Fiore, and F. Palmieri Saving energy in data center infrastructures 2011 First International Conference on Data Compression, Communications and Processing (CCP) 2011 265 270 10.1109/CCP.2011.9
-
(2011)
2011 First International Conference on Data Compression, Communications and Processing (CCP)
, pp. 265-270
-
-
Ricciardi, S.1
Careglio, D.2
Santos-Boada, G.3
Sole-Pareta, J.4
Fiore, U.5
Palmieri, F.6
-
5
-
-
84862025419
-
An energy-aware dynamic {RWA} framework for next-generation wavelength-routed networks
-
Green communication networks. URL
-
S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, and J. Solé-Pareta An energy-aware dynamic {RWA} framework for next-generation wavelength-routed networks Comput. Netw. 56 10 2012 2420 2442 10.1016/j.comnet.2012.03.016 Green communication networks. URL http://www.sciencedirect.com/science/article/pii/S1389128612001156
-
(2012)
Comput. Netw.
, vol.56
, Issue.10
, pp. 2420-2442
-
-
Ricciardi, S.1
Palmieri, F.2
Fiore, U.3
Careglio, D.4
Santos-Boada, G.5
Solé-Pareta, J.6
-
7
-
-
79952808548
-
Energy efficiency in the future internet: A survey of existing approaches and trends in energy-aware fixed network infrastructures
-
R. Bolla, R. Bruschi, F. Davoli, and F. Cucchietti Energy efficiency in the future internet: A survey of existing approaches and trends in energy-aware fixed network infrastructures IEEE Commun. Surv. Tutor. 13 2 2011 223 244 10.1109/SURV.2011.071410.00073
-
(2011)
IEEE Commun. Surv. Tutor.
, vol.13
, Issue.2
, pp. 223-244
-
-
Bolla, R.1
Bruschi, R.2
Davoli, F.3
Cucchietti, F.4
-
8
-
-
83655178297
-
A survey of green networking research
-
A. Bianzino, C. Chaudet, D. Rossi, and J. Rougier A survey of green networking research IEEE Commun. Surv. Tutor. 14 1 2012 3 20 10.1109/SURV.2011.113010.00106
-
(2012)
IEEE Commun. Surv. Tutor.
, vol.14
, Issue.1
, pp. 3-20
-
-
Bianzino, A.1
Chaudet, C.2
Rossi, D.3
Rougier, J.4
-
10
-
-
85028295216
-
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
-
Palmieri F.,Ricciardi S.,Fiore U.,Castiglione A.,Ficco M.Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.Journal of Supercomputing 71(5),2015.pp:1620-1641
-
(2015)
Journal of Supercomputing
, vol.71
, Issue.5
, pp. 1620-1641
-
-
Palmieri, F.1
Ricciardi, S.2
Fiore, U.3
Ficco, M.4
Castiglione, A.5
-
11
-
-
80053404893
-
A survey on energy-efficient data management
-
J. Wang, L. Feng, W. Xue, and Z. Song A survey on energy-efficient data management SIGMOD Rec. 40 2 2011 17 23 10.1145/2034863.2034867
-
(2011)
SIGMOD Rec.
, vol.40
, Issue.2
, pp. 17-23
-
-
Wang, J.1
Feng, L.2
Xue, W.3
Song, Z.4
-
12
-
-
84857778441
-
The energy impact of security mechanisms in modern mobile devices
-
L. Caviglione, and A. Merlo The energy impact of security mechanisms in modern mobile devices Netw. Secur. 2012 2 2012 11 14 10.1016/S1353-4858(12)70015-6
-
(2012)
Netw. Secur.
, vol.2012
, Issue.2
, pp. 11-14
-
-
Caviglione, L.1
Merlo, A.2
-
13
-
-
84938696421
-
A survey of green, energy-aware security and some of its recent development in networking and mobile computing
-
M. Migliardi, A. Merlo, L. Caviglione, A survey of green, energy-aware security and some of its recent development in networking and mobile computing, in: Proc. of the 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014, pp. 297-304.
-
(2014)
Proc. of the 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
, pp. 297-304
-
-
Migliardi, M.1
Merlo, A.2
Caviglione, L.3
-
17
-
-
84873741780
-
Energy management techniques in modern mobile handsets
-
N. Vallina-Rodriguez, and J. Crowcroft Energy management techniques in modern mobile handsets IEEE Commun. Surv. Tutor. 15 1 2013 179 198 10.1109/SURV.2012.021312.00045
-
(2013)
IEEE Commun. Surv. Tutor.
, vol.15
, Issue.1
, pp. 179-198
-
-
Vallina-Rodriguez, N.1
Crowcroft, J.2
-
18
-
-
0346750535
-
Leakage current: Moore's law meets static power
-
N. Kim, T. Austin, D. Baauw, T. Mudge, K. Flautner, J. Hu, M. Irwin, M. Kandemir, and V. Narayanan Leakage current: Moore's law meets static power Computer 36 12 2003 68 75 10.1109/MC.2003.1250885
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 68-75
-
-
Kim, N.1
Austin, T.2
Baauw, D.3
Mudge, T.4
Flautner, K.5
Hu, J.6
Irwin, M.7
Kandemir, M.8
Narayanan, V.9
-
19
-
-
84871233143
-
Revisiting storage for smartphones
-
H. Kim, N. Agrawal, and C. Ungureanu Revisiting storage for smartphones Trans. Storage 8 4 2012 14:1 14:25 10.1145/2385603.2385607
-
(2012)
Trans. Storage
, vol.8
, Issue.4
, pp. 141-1425
-
-
Kim, H.1
Agrawal, N.2
Ungureanu, C.3
-
21
-
-
78149469823
-
A survey of energy efficient {MAC} protocols for {IEEE} 802.11 {WLAN}
-
S.-L. Tsao, and C.-H. Huang A survey of energy efficient {MAC} protocols for {IEEE} 802.11 {WLAN} Comput. Commun. 34 1 2011 54 67 10.1016/j.comcom.2010.09.008
-
(2011)
Comput. Commun.
, vol.34
, Issue.1
, pp. 54-67
-
-
Tsao, S.-L.1
Huang, C.-H.2
-
22
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
K. Kumar, and Y.-H. Lu Cloud computing for mobile users: Can offloading computation save energy? Computer 43 4 2010 51 56 10.1109/MC.2010.98
-
(2010)
Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.-H.2
-
23
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
MobiVirt '08 ACM New York, NY, USA
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian Virtualized in-cloud security services for mobile devices Proceedings of the First Workshop on Virtualization in Mobile Computing MobiVirt '08 2008 ACM New York, NY, USA 31 35 10.1145/1622103.1629656
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
24
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
MCS '11 ACM New York, NY, USA
-
P. Gilbert, B.-G. Chun, L.P. Cox, and J. Jung Vision: Automated security validation of mobile apps at app markets Proceedings of the Second International Workshop on Mobile Cloud Computing and Services MCS '11 2011 ACM New York, NY, USA 21 26 10.1145/1999732.1999740
-
(2011)
Proceedings of the Second International Workshop on Mobile Cloud Computing and Services
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
25
-
-
35148848283
-
Design of a peer-to-peer system for optimized content replication
-
L. Caviglione, and C. Cervellera Design of a peer-to-peer system for optimized content replication Comput. Commun. 30 16 2007 3107 3116 10.1016/j.comcom.2007.05.041
-
(2007)
Comput. Commun.
, vol.30
, Issue.16
, pp. 3107-3116
-
-
Caviglione, L.1
Cervellera, C.2
-
27
-
-
47249127725
-
The case for energy-proportional computing
-
L.A. Barroso, and U. Hölzle The case for energy-proportional computing Computer 40 12 2007 33 37 10.1109/MC.2007.443
-
(2007)
Computer
, vol.40
, Issue.12
, pp. 33-37
-
-
Barroso, L.A.1
Hölzle, U.2
-
28
-
-
80052297709
-
Modeling the energy consumption of distributed ids: A step towards green security, in: A
-
MIPRO
-
M. Migliardi, A. Merlo, Modeling the energy consumption of distributed ids: A step towards green security, in: MIPRO, 2011 Proceedings of the 34th International Convention, 2011, pp. 1452-1457.
-
(2011)
2011 Proceedings of the 34th International Convention
, pp. 1452-1457
-
-
Migliardi, M.1
Merlo, A.2
-
30
-
-
84888109639
-
Improving energy efficiency in distributed intrusion detection systems
-
M. Migliardi, and A. Merlo Improving energy efficiency in distributed intrusion detection systems J. High Speed Netw. 19 3 2013 251 264 10.3233/JHS-130476
-
(2013)
J. High Speed Netw.
, vol.19
, Issue.3
, pp. 251-264
-
-
Migliardi, M.1
Merlo, A.2
-
32
-
-
27344459927
-
Performance and energy efficiency of block ciphers in personal digital assistants
-
PerCom 2005
-
C. Hager, S. Midkiff, J.-M. Park, and T. Martin Performance and energy efficiency of block ciphers in personal digital assistants Third IEEE International Conference on Pervasive Computing and Communications, 2005 PerCom 2005 2005 127 136 10.1109/PERCOM.2005.29
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications, 2005
, pp. 127-136
-
-
Hager, C.1
Midkiff, S.2
Park, J.-M.3
Martin, T.4
-
33
-
-
84901007954
-
Energy consumption of cryptographic algorithms in mobile devices
-
URL
-
J. Toldinas, R. Damasevicius, A. Venckauskas, T. Blazauskas, and J. Ceponis Energy consumption of cryptographic algorithms in mobile devices Elektron. Elektrotech. 20 5 2014 158 161 URL http://dx.doi.org/10.5755/j01.eee.20.5.7118
-
(2014)
Elektron. Elektrotech.
, vol.20
, Issue.5
, pp. 158-161
-
-
Toldinas, J.1
Damasevicius, R.2
Venckauskas, A.3
Blazauskas, T.4
Ceponis, J.5
-
34
-
-
84865200864
-
Engineering a secure mobile messaging framework
-
URL
-
A. Castiglione, G. Cattaneo, M. Cembalo, A.D. Santis, P. Faruolo, F. Petagna, and U.F. Petrillo Engineering a secure mobile messaging framework Comput. Secur. 31 6 2012 771 781 10.1016/j.cose.2012.06.004 URL http://www.sciencedirect.com/science/article/pii/S016740481200096X
-
(2012)
Comput. Secur.
, vol.31
, Issue.6
, pp. 771-781
-
-
Castiglione, A.1
Cattaneo, G.2
Cembalo, M.3
Santis, A.D.4
Faruolo, P.5
Petagna, F.6
Petrillo, U.F.7
-
35
-
-
33746894559
-
Energy efficient watermarking on mobile devices using proxy-based partitioning
-
A. Kejariwal, S. Gupta, A. Nicolau, N. Dutt, and R. Gupta Energy efficient watermarking on mobile devices using proxy-based partitioning IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14 6 2006 625 636 10.1109/TVLSI.2006.878218
-
(2006)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.14
, Issue.6
, pp. 625-636
-
-
Kejariwal, A.1
Gupta, S.2
Nicolau, A.3
Dutt, N.4
Gupta, R.5
-
39
-
-
77956877124
-
The internet of things: A survey
-
URL
-
L. Atzori, A. Iera, and G. Morabito The internet of things: A survey Comput. Netw. 54 15 2010 2787 2805 10.1016/j.comnet.2010.05.010 URL http://dx.doi.org/10.1016/j.comnet.2010.05.010
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
41
-
-
84873537391
-
A defense strategy against energy exhausting attacks in wireless sensor networks
-
URL
-
D. Boubiche, A. Bilami, A defense strategy against energy exhausting attacks in wireless sensor networks, Journal of Emerging Technologies in Web Intelligence, 5 (1) URL http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi05011827.
-
Journal of Emerging Technologies in Web Intelligence
, vol.5
, Issue.1
-
-
Boubiche, D.1
Bilami, A.2
-
42
-
-
46249119386
-
Esecrout: An energy efficient secure routing for sensor networks
-
URL
-
J. Yin, and S.K. Madria Esecrout: An energy efficient secure routing for sensor networks Int. J. Distrib. Sens. Netw. 4 2 2008 67 82 URL http://dx.doi.org/10.1080/15501320802001101
-
(2008)
Int. J. Distrib. Sens. Netw.
, vol.4
, Issue.2
, pp. 67-82
-
-
Yin, J.1
Madria, S.K.2
-
44
-
-
84871820851
-
Vampire attacks: Draining life from wireless ad hoc sensor networks
-
E. Vasserman, and N. Hopper Vampire attacks: Draining life from wireless ad hoc sensor networks IEEE Trans. Mobile Comput. 12 2 2013 318 332 10.1109/TMC.2011.274
-
(2013)
IEEE Trans. Mobile Comput.
, vol.12
, Issue.2
, pp. 318-332
-
-
Vasserman, E.1
Hopper, N.2
-
45
-
-
34748898963
-
The energy cost of cryptographic key establishment in wireless sensor networks
-
ASIACCS '07 ACM New York, NY, USA URL
-
J. Grosschadl, A. Szekely, and S. Tillich The energy cost of cryptographic key establishment in wireless sensor networks Proceedings of the 2Nd ACM Symposium on Information, Computer and Communications Security ASIACCS '07 2007 ACM New York, NY, USA 380 382 10.1145/1229285.1229334 URL http://doi.acm.org/10.1145/1229285.1229334
-
(2007)
Proceedings of the 2Nd ACM Symposium on Information, Computer and Communications Security
, pp. 380-382
-
-
Grosschadl, J.1
Szekely, A.2
Tillich, S.3
-
46
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
PerCom 2005
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz Energy analysis of public-key cryptography for wireless sensor networks Third IEEE International Conference on Pervasive Computing and Communications, 2005 PerCom 2005 2005 324 328 10.1109/PERCOM.2005.18
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications, 2005
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
47
-
-
2642584004
-
Denial-of-service attacks on battery-powered mobile computers
-
PERCOM '04 IEEE Computer Society Washington, DC, USA
-
T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami Denial-of-service attacks on battery-powered mobile computers Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04) PERCOM '04 2004 IEEE Computer Society Washington, DC, USA 309
-
(2004)
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
, pp. 309
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
48
-
-
84978116822
-
Edoctor: Automatically diagnosing abnormal battery drain issues on smartphones
-
nsdi'13 USENIX Association Berkeley, CA, USA URL
-
X. Ma, P. Huang, X. Jin, P. Wang, S. Park, D. Shen, Y. Zhou, L.K. Saul, and G.M. Voelker edoctor: Automatically diagnosing abnormal battery drain issues on smartphones Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation nsdi'13 2013 USENIX Association Berkeley, CA, USA 57 70 URL http://dl.acm.org/citation.cfm?id=2482626.2482634
-
(2013)
Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation
, pp. 57-70
-
-
Ma, X.1
Huang, P.2
Jin, X.3
Wang, P.4
Park, S.5
Shen, D.6
Zhou, Y.7
Saul, L.K.8
Voelker, G.M.9
-
49
-
-
50049091842
-
Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
-
R. Racic, D. Ma, and H. Chen Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery 2006 Securecomm and Workshops 2006 1 10 10.1109/SECCOMW.2006.359550
-
(2006)
2006 Securecomm and Workshops
, pp. 1-10
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
50
-
-
84885416947
-
Text compression and encryption through smart devices for mobile communication
-
R. Pizzolante, B. Carpentieri, A. Castiglione, A. Castiglione, and F. Palmieri Text compression and encryption through smart devices for mobile communication 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) 2013 672 677 10.1109/IMIS.2013.121
-
(2013)
2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
, pp. 672-677
-
-
Pizzolante, R.1
Carpentieri, B.2
Castiglione, A.3
Castiglione, A.4
Palmieri, F.5
-
51
-
-
84906824051
-
Multimedia-based battery drain attacks for android devices
-
U. Fiore, F. Palmieri, A. Castiglione, V. Loia, and A. De Santis Multimedia-based battery drain attacks for android devices 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) 2014 145 150 10.1109/CCNC.2014.6866562
-
(2014)
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)
, pp. 145-150
-
-
Fiore, U.1
Palmieri, F.2
Castiglione, A.3
Loia, V.4
De Santis, A.5
-
53
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
L. Zhang, B. Tiwana, R. Dick, Z. Qian, Z. Mao, Z. Wang, L. Yang, Accurate online power estimation and automatic battery behavior based power model generation for smartphones, in: 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), 2010, pp. 105-114.
-
(2010)
2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS)
, pp. 105-114
-
-
Zhang, L.1
Tiwana, B.2
Dick, R.3
Qian, Z.4
Mao, Z.5
Wang, Z.6
Yang, L.7
-
56
-
-
84934300624
-
Battery exhaustion attack detection with small handheld mobile computers
-
PORTABLE07
-
T. Buennemeyer, M. Gora, R. Marchany, and J. Tront Battery exhaustion attack detection with small handheld mobile computers IEEE International Conference on Portable Information Devices, 2007 PORTABLE07 2007 1 5 10.1109/PORTABLE.2007.35
-
(2007)
IEEE International Conference on Portable Information Devices, 2007
, pp. 1-5
-
-
Buennemeyer, T.1
Gora, M.2
Marchany, R.3
Tront, J.4
-
57
-
-
33845933985
-
Battery-sensing intrusion protection system
-
T. Buennemeyer, G. Jacoby, W. Chiang, R. Marchany, and J. Tront Battery-sensing intrusion protection system 2006 IEEE Information Assurance Workshop 2006 176 183 10.1109/IAW.2006.1652093
-
(2006)
2006 IEEE Information Assurance Workshop
, pp. 176-183
-
-
Buennemeyer, T.1
Jacoby, G.2
Chiang, W.3
Marchany, R.4
Tront, J.5
-
58
-
-
84939136474
-
Modeling energy-efficient secure communications in multi-mode wireless mobile devices
-
A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, A. De Santis, Modeling energy-efficient secure communications in multi-mode wireless mobile devices, J. Comput. Syst. Sci., http://dx.doi.org/10.1016/j.jcss.2014.12.022.
-
J. Comput. Syst. Sci
-
-
Castiglione, A.1
Palmieri, F.2
Fiore, U.3
Castiglione, A.4
De Santis, A.5
-
60
-
-
84862117123
-
Monitoring smartphones for anomaly detection
-
MOBILWARE '08 ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) ICST, Brussels, Belgium, Belgium URL
-
A.-D. Schmidt, F. Peters, F. Lamour, and S. Albayrak Monitoring smartphones for anomaly detection Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications MOBILWARE '08 2007 ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) ICST, Brussels, Belgium, Belgium 40:1 40:6 URL http://dl.acm.org/citation.cfm?id=1361492.1361542
-
(2007)
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
, pp. 401-406
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Albayrak, S.4
-
61
-
-
84877730481
-
Energy consumption in mobile phones: A measurement study and implications for network applications
-
IMC '09 ACM New York, NY, USA URL
-
N. Balasubramanian, A. Balasubramanian, and A. Venkataramani Energy consumption in mobile phones: A measurement study and implications for network applications Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference IMC '09 2009 ACM New York, NY, USA 280 293 10.1145/1644893.1644927 URL http://doi.acm.org/10.1145/1644893.1644927
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 280-293
-
-
Balasubramanian, N.1
Balasubramanian, A.2
Venkataramani, A.3
-
64
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
CODES/ISSS '10 ACM New York, NY, USA
-
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R.P. Dick, Z.M. Mao, and L. Yang Accurate online power estimation and automatic battery behavior based power model generation for smartphones Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis CODES/ISSS '10 2010 ACM New York, NY, USA 105 114 10.1145/1878961.1878982
-
(2010)
Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
, pp. 105-114
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.P.5
Mao, Z.M.6
Yang, L.7
-
65
-
-
79953103885
-
A system-level model for runtime power estimation on mobile devices
-
Y. Xiao, R. Bhaumik, Z. Yang, M. Siekkinen, P. Savolainen, and A. Yla-Jaaski A system-level model for runtime power estimation on mobile devices Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on Int'l Conference on Cyber, Physical and Social Computing (CPSCom) 2010 27 34 10.1109/GreenCom-CPSCom.2010.114
-
(2010)
Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on Int'l Conference on Cyber, Physical and Social Computing (CPSCom)
, pp. 27-34
-
-
Xiao, Y.1
Bhaumik, R.2
Yang, Z.3
Siekkinen, M.4
Savolainen, P.5
Yla-Jaaski, A.6
-
66
-
-
79961068480
-
Self-constructive high-rate system energy modeling for battery-powered mobile systems
-
MobiSys '11 ACM New York, NY, USA
-
M. Dong, and L. Zhong Self-constructive high-rate system energy modeling for battery-powered mobile systems Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services MobiSys '11 2011 ACM New York, NY, USA 335 348 10.1145/1999995.2000027
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 335-348
-
-
Dong, M.1
Zhong, L.2
-
67
-
-
84869034068
-
Appscope: Application energy metering framework for android smartphones using kernel activity monitoring
-
USENIX ATC'12 USENIX Association Berkeley, CA, USA
-
C. Yoon, D. Kim, W. Jung, C. Kang, and H. Cha Appscope: Application energy metering framework for android smartphones using kernel activity monitoring Proceedings of the 2012 USENIX Conference on Annual Technical Conference USENIX ATC'12 2012 USENIX Association Berkeley, CA, USA 36
-
(2012)
Proceedings of the 2012 USENIX Conference on Annual Technical Conference
, pp. 36
-
-
Yoon, C.1
Kim, D.2
Jung, W.3
Kang, C.4
Cha, H.5
-
68
-
-
84886424945
-
Estimating mobile application energy consumption using program analysis
-
ICSE '13 IEEE Press Piscataway, NJ, USA URL
-
S. Hao, D. Li, W.G.J. Halfond, and R. Govindan Estimating mobile application energy consumption using program analysis Proceedings of the 2013 International Conference on Software Engineering ICSE '13 2013 IEEE Press Piscataway, NJ, USA 92 101 URL http://dl.acm.org/citation.cfm?id=2486788.2486801
-
(2013)
Proceedings of the 2013 International Conference on Software Engineering
, pp. 92-101
-
-
Hao, S.1
Li, D.2
Halfond, W.G.J.3
Govindan, R.4
-
69
-
-
84886471860
-
Adaptive and flexible smartphone power modeling
-
A. Nacci, F. Trov, F. Maggi, M. Ferroni, A. Cazzola, D. Sciuto, and M. Santambrogio Adaptive and flexible smartphone power modeling Mobile Netw. Appl. 18 5 2013 600 609 10.1007/s11036-013-0470-y
-
(2013)
Mobile Netw. Appl.
, vol.18
, Issue.5
, pp. 600-609
-
-
Nacci, A.1
Trov, F.2
Maggi, F.3
Ferroni, M.4
Cazzola, A.5
Sciuto, D.6
Santambrogio, M.7
-
70
-
-
84859195111
-
Chameleon: A color-adaptive web browser for mobile oled displays
-
M. Dong, and L. Zhong Chameleon: A color-adaptive web browser for mobile oled displays IEEE Trans. Mob. Comput. 11 5 2012 724 738 10.1109/TMC.2012.40
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, Issue.5
, pp. 724-738
-
-
Dong, M.1
Zhong, L.2
-
71
-
-
80052649754
-
Dynamic voltage scaling of oled displays
-
DAC '11 ACM New York, NY, USA
-
D. Shin, Y. Kim, N. Chang, and M. Pedram Dynamic voltage scaling of oled displays Proceedings of the 48th Design Automation Conference DAC '11 2011 ACM New York, NY, USA 53 58 10.1145/2024724.2024737
-
(2011)
Proceedings of the 48th Design Automation Conference
, pp. 53-58
-
-
Shin, D.1
Kim, Y.2
Chang, N.3
Pedram, M.4
-
72
-
-
84892873906
-
A denial of service attack to gsm networks via attach procedure
-
A. Cuzzocrea, C. Kittl, D. Simos, E. Weippl, L. Xu, Lecture Notes in Computer Science Springer Berlin Heidelberg URL
-
N. Gobbo, A. Merlo, and M. Migliardi A denial of service attack to gsm networks via attach procedure A. Cuzzocrea, C. Kittl, D. Simos, E. Weippl, L. Xu, Security Engineering and Intelligence Informatics Lecture Notes in Computer Science vol. 8128 2013 Springer Berlin Heidelberg 361 376 10.1007/978-3-642-40588-4-25 URL http://dx.doi.org/10.1007/978-3-642-40588-4-25
-
(2013)
Security Engineering and Intelligence Informatics
, vol.8128
, pp. 361-376
-
-
Gobbo, N.1
Merlo, A.2
Migliardi, M.3
-
73
-
-
84904003665
-
A denial of service attack to umts networks using sim-less devices
-
A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, and A. Castiglione A denial of service attack to umts networks using sim-less devices IEEE Transactions on Dependable and Secure Computing 11 3 2014 280 291 10.1109/TDSC.2014.2315198
-
(2014)
IEEE Transactions on Dependable and Secure Computing
, vol.11
, Issue.3
, pp. 280-291
-
-
Merlo, A.1
Migliardi, M.2
Gobbo, N.3
Palmieri, F.4
Castiglione, A.5
|