Author of the publication

Reducing stack with intra-task threshold priorities in real-time systems.

, and . EMSOFT, page 109-118. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory Bandwidth Management for Efficient Performance Isolation in Multi-Core Platforms., , , , and . IEEE Trans. Computers, 65 (2): 562-576 (2016)Reducing stack with intra-task threshold priorities in real-time systems., and . EMSOFT, page 109-118. ACM, (2010)Sequential Deformation for Accurate Scene Text Detection., , , , , and . ECCV (29), volume 12374 of Lecture Notes in Computer Science, page 108-124. Springer, (2020)Data-Driven Morphological Feature Perception of Single Neuron With Graph Neural Network., , , , , , , , and . IEEE Trans. Medical Imaging, 42 (10): 3069-3079 (October 2023)Using social media information to predict the credit risk of listed enterprises in the supply chain., , , and . Kybernetes, 52 (11): 4993-5016 (2023)Adaptive Grid Partitioning Considering Power Supply and Load Distribution., , , , and . IEEE Access, (2022)Clustering of Typical Wind Power Scenarios Based on K-Means Clustering Algorithm and Improved Artificial Bee Colony Algorithm., , , , and . IEEE Access, (2022)Autonomous Crack and Bughole Detection for Concrete Surface Image Based on Deep Learning., , , , and . IEEE Access, (2021)Multiple Harmonic Current Injection System for Audible Noise Analysis of AC Filter Capacitors in Converter Stations., , , , , and . IEEE Access, (2020)A New k-Anonymous Message Transmission Protocol., and . WISA, volume 3325 of Lecture Notes in Computer Science, page 388-399. Springer, (2004)