Proceedings of the 4th Conference on Innovations in Theoretical Computer Science 2013
DOI: 10.1145/2422436.2422470
|View full text |Cite
|
Sign up to set email alerts
|

An energy complexity model for algorithms

Abstract: Energy consumption has emerged as first class computing resource for both server systems and personal computing devices. The growing importance of energy has led to rethink in hardware design, hypervisors, operating systems and compilers. Algorithm design is still relatively untouched by the importance of energy and algorithmic complexity models do not capture the energy consumed by an algorithm.In this paper, we propose a new complexity model to account for the energy used by an algorithm. Based on an abstrac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

9
45
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 55 publications
(61 citation statements)
references
References 32 publications
9
45
0
1
Order By: Relevance
“…The second is symmetric key encryption in which we cover Blowfish, DES, 3DES, and AES ciphers. Our work experimentally validates the applicability of the energy model proposed in [1] on these classes of cryptographic protocols. We also present a generic way to achieve any desired degree of memory parallelism for a given protocol (hash or symmetric key), which can be employed by software engineers to implement energy efficient cryptographic protocols.…”
Section: Introductionsupporting
confidence: 67%
See 4 more Smart Citations
“…The second is symmetric key encryption in which we cover Blowfish, DES, 3DES, and AES ciphers. Our work experimentally validates the applicability of the energy model proposed in [1] on these classes of cryptographic protocols. We also present a generic way to achieve any desired degree of memory parallelism for a given protocol (hash or symmetric key), which can be employed by software engineers to implement energy efficient cryptographic protocols.…”
Section: Introductionsupporting
confidence: 67%
“…(2) How do we modify existing cryptographic protocols to make them energy optimal?". The main impediment for pursuing this direction is a to prove the applicability of a realistic model of energy consumption at the algorithm design by [1] on some of these protocols. We believe that our work will complement this body of existing work.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations