Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Energy Conservation | 4 |
Mathematics | 4 |
Telecommunications | 2 |
Bayesian Statistics | 1 |
Behavior Patterns | 1 |
Computer Networks | 1 |
Computer Oriented Programs | 1 |
Computer Security | 1 |
Computer System Design | 1 |
Computers | 1 |
Costs | 1 |
More ▼ |
Source
ProQuest LLC | 4 |
Publication Type
Dissertations/Theses -… | 4 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Pawaskar, Sachin S. – ProQuest LLC, 2013
In the context of the big picture as energy demands rise due to growing economies and growing populations, there will be greater emphasis on sustainable supply, conservation, and efficient usage of this vital resource. Even at a smaller level, the need for minimizing energy consumption continues to be compelling in embedded, mobile, and server…
Descriptors: Handheld Devices, Computers, Energy Conservation, Energy Management
He, Jing – ProQuest LLC, 2012
Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…
Descriptors: Computer Networks, Telecommunications, Topology, Energy Conservation
Korthikanti, Vijay Anand Reddy – ProQuest LLC, 2011
Energy consumption by computer systems has emerged as an important concern, both at the level of individual devices (limited battery capacity in mobile systems) and at the societal level (the production of Green House Gases). In parallel architectures, applications may be executed on a variable number of cores and these cores may operate at…
Descriptors: Energy, Computer System Design, Computer Oriented Programs, Performance
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference