Author of the publication

Scheduling of Soft Real-Time Systems for Context-Aware Applications.

, , , , and . DATE, page 318-323. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial for MobiCASE 2011 Special Issue., and . Mob. Networks Appl., 18 (1): 1-2 (2013)Probabilistic constructive optimization techniques., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 23 (6): 859-868 (2004)Security and Privacy Protection in Wireless Sensor Networks., , and . Handbook of Sensor Networks, CRC Press, (2004)To hardware prefetch or not to prefetch?: a virtualized environment study and core binding approach., and . ASPLOS, page 357-368. ACM, (2013)A methodology for in-network evaluation of integrated logical-statistical models., , , , and . SenSys, page 197-210. ACM, (2008)Minimizing Global Interconnect in DSP Systems using Bypassing., , and . ICASSP (2), page 77-80. IEEE, (2007)A Localized Multi-Hop Desynchronization Algorithm for Wireless Sensor Networks., and . INFOCOM, page 2906-2910. IEEE, (2009)Computational forensic techniques for intellectual property protection., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 23 (6): 987-994 (2004)DAPA: Diagnosing Application Performance Anomalies for Virtualized Infrastructures., , and . Hot-ICE, USENIX Association, (2012)Copy detection for intellectual property protection of VLSI designs., , , , and . ICCAD, page 600-605. IEEE Computer Society, (1999)