• Publications
  • Influence
CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces
CoolSpots enable a wireless mobile device to automatically switch between multiple radio interfaces, such as WiFi and Bluetooth, in order to increase battery lifetime. The main contribution of thisExpand
  • 425
  • 36
The simulation and evaluation of dynamic voltage scaling algorithms
The reduction of energy consumption in microprocessors can be accomplished without impacting the peak performance through the use of dynamic voltage scaling (DVS). This approach varies the processorExpand
  • 595
  • 30
The Personal Server: Changing the Way We Think about Ubiquitous Computing
The Personal Server is a mobile device that enables you to readily store and access the data and applications you carry with you through interfaces found in the local environment. Unlike conventionalExpand
  • 307
  • 21
Exploiting radio hierarchies for power-efficient wireless device discovery and connection setup
We propose the coordinated use of multiple heterogeneous wireless technologies to optimize the latency and power consumption of mobile systems during device discovery and connection setup. We presentExpand
  • 82
  • 11
Voltage scheduling in the IpARM microprocessor system
Microprocessors represent a significant portion of the energy consumed in portable electronic devices. Dynamic Voltage Scaling (DVS) allows a device to reduce energy consumption by lowering itsExpand
  • 186
  • 8
Voltage Scheduling in the lpARM Microprocessor System
Microprocessors represent a significant portion of the energy consumed in portable electronic devices. Dynamic Voltage Scaling (DVS) allows a device to reduce energy consumption by lowering itsExpand
  • 108
  • 6
Dynamic Voltage Scaling and the Design of a Low-Power Microprocessor System
This paper describes the design of a low-power microprocessor system that can run between 8Mhz at 1.1V and 100MHz at 3.3V. The ramifications of Dynamic Voltage Scaling, which allows the processor toExpand
  • 130
  • 6
Photographic Authentication through Untrusted Terminals
As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person's ability to recognize personal photographs. The results from theExpand
  • 87
  • 6
Comparing autonomic and proactive computing
This paper provides an overview of the relationship between proactive computing and autonomic computing, considering the design of systems that are beyond the scope of our existing computationalExpand
  • 117
  • 5
Dynamic composable computing
In the last 10 years, personal computing has evolved from being primarily a desktop activity to a highly mobile one: the laptop computer, despite its large size and significant weight, has been theExpand
  • 47
  • 5