ACM Computing Surveys (CSUR)
WebExpress: a system for optimizing Web browsing in a wireless environment
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
Optimizing matrix multiply using PHiPAC: a portable, high-performance, ANSI C coding methodology
ICS '97 Proceedings of the 11th international conference on Supercomputing
Energy-efficient design of battery-powered embedded systems
ISLPED '99 Proceedings of the 1999 international symposium on Low power electronics and design
Introduction to data compression (2nd ed.)
Introduction to data compression (2nd ed.)
Algorithmic transforms for efficient energy scalable computation
ISLPED '00 Proceedings of the 2000 international symposium on Low power electronics and design
A unified header compression framework for low-bandwidth links
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Source code optimization and profiling of energy consumption in embedded systems
ISSS '00 Proceedings of the 13th international symposium on System synthesis
A low-bandwidth network file system
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Critical power slope: understanding the runtime effects of frequency scaling
ICS '02 Proceedings of the 16th international conference on Supercomputing
An Empirical Study of Delta Algorithms
ICSE '96 Proceedings of the SCM-6 Workshop on System Configuration Management
Low Power Embedded Software Optimization Using Symbolic Algebra
Proceedings of the conference on Design, automation and test in Europe
Network Conscious Text Compression System (NCTCSys)
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
Increasing effective link bandwidth by suppressing replicated data
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Cryptographically Generated Addresses for Constrained Devices*
Wireless Personal Communications: An International Journal
Alternative source coding model for mobile text communication
Proceedings of the 2005 ACM symposium on Applied computing
DIALM-POMC '05 Proceedings of the 2005 joint workshop on Foundations of mobile computing
Sensor network software update management: a survey
International Journal of Network Management
Multi-signatures in the plain public-Key model and a general forking lemma
Proceedings of the 13th ACM conference on Computer and communications security
Data compression algorithms for energy-constrained devices in delay tolerant networks
Proceedings of the 4th international conference on Embedded networked sensor systems
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Alternatives for detecting redundancy in storage systems data
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Transactions on Mobile Computing
Improving SDRAM access energy efficiency for low-power embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Efficient aggregation using first hop selection in WSNs
International Journal of Sensor Networks
quFiles: a unifying abstraction for mobile data management
Proceedings of the 9th workshop on Mobile computing systems and applications
Fault-Tolerant Compression Algorithms for Delay-Sensitive Sensor Networks with Unreliable Links
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
A novel identity-based multi-signcryption scheme
Computer Communications
Efficient and Short Certificateless Signature
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Design, implementation, and evaluation of EnviroMic: A storage-centric audio sensor network
ACM Transactions on Sensor Networks (TOSN)
Universally Composable Multiparty Computation with Partially Isolated Parties
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Energy efficient architecture of sensor network node based on compression accelerator
Proceedings of the 19th ACM Great Lakes symposium on VLSI
Dynamic data compression in multi-hop wireless networks
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Towards update-conscious compilation for energy-efficient code dissemination in WSNs
ACM Transactions on Architecture and Code Optimization (TACO)
QoS parameterization algorithm in data collection for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Stream-oriented lossless packet compression in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Energy-efficient node-level compression arbitration for wireless sensor networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Energy-efficient and non-interactive self-certification in MANETs
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Secure feedback service in wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Efficient ID-based digital signatures with message recovery
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Toward development of high secure sensor network nodes using an FPGA-based architecture
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Short signature from the bilinear pairing
ICICA'10 Proceedings of the First international conference on Information computing and applications
Using Compression Energy Efficiently in Mobile Environment
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Identity-Based aggregate and multi-signature schemes based on RSA
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Identity-Based multi-signatures from RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Strongly secure certificateless short signatures
Journal of Systems and Software
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
International Journal of Ad Hoc and Ubiquitous Computing
Journal of Systems Architecture: the EUROMICRO Journal
Lattice-based message recovery signature schemes
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
Wireless transmission of a bit can require over 1000 times more energy than a single 32-bit computation. It would therefore seem desirable to perform significant computation to reduce the number of bits transmitted. If the energy required to compress data is less than the energy required to send it, there is a net energy savings and consequently, a longer battery life for portable computers. This paper reports on the energy of lossless data compressors as measured on a StrongARM SA-110 system. We show that with several typical compression tools, there is a net energy increase when compression is applied before transmission. Reasons for this increase are explained, and hardware-aware programming optimizations are demonstrated. When applied to Unix compress, these optimizations improve energy efficiency by 51%. We also explore the fact that, for many usage models, compression and decompression need not be performed by the same algorithm. By choosing the lowest-energy compressor and decompressor on the test platform, rather than using default levels of compression, overall energy to send compressible web data can be reduced 31%. Energy to send harder-to-compress English text can be reduced 57%. Compared with a system using a single optimized application for both compression and decompression, the asymmetric scheme saves 11% or 12% of the total energy depending on the dataset.