### Table 1: Runtime performance and memory usage of our power grid and thermal analysis engine. IR is power grid analysis and TH represents thermal analysis.

2003

Cited by 20

### Table 3: Grid reduction and CPU times for transient analysis. Design Exact transient time MG transient time

"... In PAGE 7: ... As explained earlier, the proposed multigrid-like technique is even more advantageous when applied for transient analysis. This is illustrated in Table3 , which shows the time required to run a transient simulation of the power grids of the two designs using a regular solver and the proposed technique. The power grids are simulated for a duration of 4 ns with 0.... ..."

### Table 3: Grid reduction and CPU times for transient analysis. Design Exact transient time MG transient time

"... In PAGE 7: ... As explained earlier, the proposed multigrid-like technique is even more advantageous when applied for transient analysis. This is illustrated in Table3 , which shows the time required to run a transient simulation of the power grids of the two designs using a regular solver and the proposed technique. The power grids are simulated for a duration of 4 ns with 0.... ..."

### Table 3: Grid reduction and CPU times for transient analysis. Design Exact transient time MG transient time

"... In PAGE 7: ... As explained earlier, the proposed multigrid-like technique is even more advantageous when applied for transient analysis. This is illustrated in Table3 , which shows the time required to run a transient simulation of the power grids of the two designs using a regular solver and the proposed technique. The power grids are simulated for a duration of 4 ns with 0.... ..."

### Table 4. Analysis grid

Cited by 1

### Table 1. Nuprl5 Standard Dependency Graph Data. Most fields should be clear. The assortativity of a network was defined by Newman in [18] and is a measure of the variance of the link distribution, or degree-degree correlations often used in social-network analysis. In practice, r is positive for social networks, where the nodes represent people, and negative for non-social networks such as the world wide web, power grids, and biological networks.

2004

Cited by 3

### Table 7 Power analysis

in for

"... In PAGE 19: ... (If the expected e ect size is known in advance, there is little sense in conducting a study with power less than 50%, since the probability of a statistically signi cant result is less than a random coin ip, assuming the e ect is real). Table7 summarizes the number of subjects required in each group to achieve the desired power. Note that we would need at least 22 subjects in each group to achieve a power of 50% in comparing MPI to XMTC-1 (recall that in our study we had 16 subjects in the MPI group and 14 in the XMTC group).... ..."

### Table 2: Runtime(sec) comparison between MNA exact solution and SUPRIME

2003

"... In PAGE 6: ...03 0246810 Figure 4: The responses for RC and RLKC sub- strate models. Figure 5 and Table2 show the simulation results for power- grid substrate co-analysis models. Figure 5 shows the wave- form comparison of the SUPREME and the MNA-based ex- act solution.... ..."

Cited by 5

### Table 3: Optimal power grid results.

2002

"... In PAGE 5: ... It can be seen that for all the cases PSiCo gives much better congestion results than the conventional method. Performance metrics for the initial power grid and the power grid obtained by PSiCo are listed in Table3 , in spe- ciflc, the power wire area as a percentage of the area avail- able on the two layers, the total number of nodes, the num- ber of wires (W) in the power grid and the worst-case voltage droop. These numbers after optimization are shown in the table and may be compared with the corresponding numbers before optimization.... ..."

Cited by 1

### Table 1. Power Grid Vulnerabilities Documented

2003

"... In PAGE 2: ... Lack of security awareness can be found at all levels of the industry from developers of systems and software that control the power grid to the operators of the power control systems and the power engineers themselves [15]. Table1 shows a checklist of the known vulnerabilities documented in [13] that still exist and have been observed in recent assessment visitations conducted by the authors of this paper. It can be seen that all prior vulnerabilities still exist, and new ones, associated with emerging technologies and business needs, have come to bear.... ..."

Cited by 3