Author of the publication

n-Modular Redundant Real-Time Middleware: Design and Implementation.

, , , and . EWiLi, volume 1697 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Microeconomic Approach to Optimal File Allocation., and . ICDCS, page 28-35. IEEE Computer Society, (1986)SPEE: A Secure Program Execution Environment tool using code integrity checking., , and . J. High Speed Networks, 15 (1): 21-32 (2006)Addressing application integrity attacks using a reconfigurable architecture., , and . FPGA, page 250. ACM, (2004)PyLOM: a language and run-time system for planning applications., , and . SPLASH (Companion Volume), page 91-92. ACM, (2013)Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards., , , and . IAS, page 125-130. IEEE, (2010)Dynamic load balancing schemes for computing accessible surface area of protein molecules., , and . HiPC, page 326-333. IEEE Computer Society, (1998)Algorithms for budget-constrained survivable topology design., , and . ICC, page 2162-2166. IEEE, (2002)Application-Kernel Collaboration Mechanisms for Real-Time Cluster Server under Overloading., , , , and . HPCC, page 258-265. IEEE Computer Society, (2008)Performance Study of a Compiler/Hardware Approach to Embedded Systems Security., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 543-548. Springer, (2005)Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems., , , , and . CSE (2), page 830-836. IEEE Computer Society, (2009)