Learn More
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and(More)
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the(More)
—With ever increasing complexity in new mechanical structures, as well as aging structures in operation, locating damage with structural health monitoring techniques is becoming increasingly important. Permanent deployment of structural health monitoring systems is limited by the availability of sensor technology. Previous efforts to miniaturize the(More)
Recent advances in Dynamic Power Management (DPM) techniques have resulted in designs that support a rich set of power management options, both at the hardware and software levels. This has resulted in an explosion of the design space when analyzing the system-level tradeoffs of candidate DPM strategy designs. This paper proposes a design space exploration(More)
A warm welcome to PADS 2011, the 25 th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation. This year's conference has attracted a significant number of high quality submissions ‐ a fact that we not only attribute to the fact of having the stunning Nice (France) as our conference site, but also to the past years' efforts of the(More)
We present a novel, quality-driven, architectural-level approach that trades-off the output quality to enable power-aware processing of multimedia streams. The error tolerance of multimedia data is exploited to selectively eliminate computation while maintaining a specified output quality. We construct relaxed, synthesized power macro-models for(More)
  • 1