Author image not provided
 Weidong Ye

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.67
Citation Count2
Publication count3
Publication years2017-2017
Available for download3
Average downloads per article323.00
Downloads (cumulative)969
Downloads (12 Months)969
Downloads (6 Weeks)124
SEARCH
ROLE


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


4 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 4 of 4
Sort by:

1 published by ACM
December 2017 ACM Transactions on Computer Systems (TOCS): Volume 35 Issue 3, December 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 32,   Downloads (12 Months): 32,   Downloads (Overall): 32

Full text available: PDFPDF
Many emerging applications such as the Internet of Things, wearables, implantables, and sensor networks are constrained by power and energy. These applications rely on ultra-low-power processors that have rapidly become the most abundant type of processor manufactured today. In the ultra-low-power embedded systems used by these applications, peak power and ...
Keywords: hardware–software coanalysis, Internet of Things, application-specific hardware, ultra-low-power processors, Peak power analysis

2 published by ACM
October 2017 MICRO-50 '17: Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 31,   Downloads (12 Months): 129,   Downloads (Overall): 129

Full text available: PDFPDF
The growing movement to connect literally everything to the internet ( internet of things or IoT ) through ultra-low-power embedded microprocessors poses a critical challenge for information security. Gate-level tracking of information flows has been proposed to guarantee information flow security in computer systems. However, such solutions rely on non-commodity, ...
Keywords: security, ultra-low-power processors, hardware-software co-analysis, information flow, internet of things

3 published by ACM
June 2017 ISCA '17: Proceedings of the 44th Annual International Symposium on Computer Architecture
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 25,   Downloads (12 Months): 338,   Downloads (Overall): 338

Full text available: PDFPDF
A large number of emerging applications such as implantables, wearables, printed electronics, and IoT have ultra-low area and power constraints. These applications rely on ultra-low-power general purpose microcontrollers and microprocessors, making them the most abundant type of processor produced and used today. While general purpose processors have several advantages, such ...
Keywords: application-specific processors, bespoke processors, Internet of Things, ultra-low-power processors, hardware-software co-analysis
Also published in:
September 2017  ACM SIGARCH Computer Architecture News - ISCA'17: Volume 45 Issue 2, May 2017

4 published by ACM
April 2017 ASPLOS '17: Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 36,   Downloads (12 Months): 470,   Downloads (Overall): 470

Full text available: PDFPDF
Many emerging applications such as IoT, wearables, implantables, and sensor networks are power- and energy-constrained. These applications rely on ultra-low-power processors that have rapidly become the most abundant type of processor manufactured today. In the ultra-low-power embedded systems used by these applications, peak power and energy requirements are the primary ...
Keywords: power, energy management, embedded computing, internet of things (iot)
Also published in:
May 2017  ACM SIGPLAN Notices - ASPLOS '17: Volume 52 Issue 4, April 2017 May 2017  ACM SIGARCH Computer Architecture News - Asplos'17: Volume 45 Issue 1, March 2017



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us