Author of the publication

SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors.

, , , , , , , , and . ACM Trans. Cyber Phys. Syst., 7 (1): 6:1-6:25 (January 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solutions for Some Practical Problems in Prioritized Preemptive Scheduling., , and . RTSS, page 181-191. IEEE Computer Society, (1986)Compositional Verification of Architectural Models., , , , , and . NASA Formal Methods, volume 7226 of Lecture Notes in Computer Science, page 126-140. Springer, (2012)Middleware design for Physically-Asynchronous Logically-Synchronous (PALS) systems., , , , and . EMSOFT, page 5:1-5:10. IEEE, (2013)The Design of Safe Networked Supervisory Medical Systems Using Organ-Centric Hierarchical Control Architecture., , , and . IEEE J. Biomed. Health Informatics, 19 (3): 1077-1086 (2015)Model and Integrate Medical Resource Available Times and Relationships in Verifiably Correct Executable Medical Best Practice Guideline Models (Extended Version)., , , , and . CoRR, (2018)Design Verifiably Correct Model Patterns to Facilitate Modeling Medical Best Practice Guidelines with Statecharts (Technical Report)., , , , and . CoRR, (2018)Optimal real-time sampling rate assignment for wireless sensor networks., , , , and . ACM Trans. Sens. Networks, 2 (2): 263-295 (2006)Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System., , , , , and . IEEE Trans. Ind. Informatics, 13 (4): 1900-1909 (2017)A Systematic Approach to Design Distributed Real-Time Systems., and . Computer, 26 (9): 68-78 (1993)Guest Editorial., and . Real Time Syst., 23 (1-2): 5-6 (2002)