Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-based Encryption Applied to Data Leakage Prevention Solutions., , , , , and . SECRYPT, page 566-571. SciTePress, (2017)Social Computing for Home Energy Efficiency: Technological and Stakeholder Ecosystems., , , , and . HCI (18), volume 6778 of Lecture Notes in Computer Science, page 229-238. Springer, (2011)Network Quality-Aware Architecture for Adaptive Video Streaming From Drones., , , and . IEEE Internet Comput., 24 (1): 5-13 (2020)The Quality for Service (Q4S) Protocol., , , , and . RFC, (July 2020)Real-time modelling of DDS for event-driven applications., and . REACTION, Universidad Carlos III de Madrid, (2012)Increasing schedulability in distributed hard real-time systems., and . RTS, page 99-107. IEEE Computer Society, (1995)Analysis of Connection Schemes between the ICU and the DPU of the NISP Instrument of the Euclid Mission., , , , , , , , , and . IWINAC (2), volume 7931 of Lecture Notes in Computer Science, page 385-394. Springer, (2013)Minimizing the effects of jitter in distributed hard real-time systems., and . J. Syst. Archit., 42 (6-7): 431-447 (1996)Optimized Deadline Assignment and Schedulability Analysis for Distributed Real-Time Systems with Local EDF Scheduling., , , and . ESA, page 150-156. CSREA Press, (2010)Towards a real-time distributed systems annex in Ada., and . IRTAW, page 62-66. ACM, (2000)