Author of the publication

OCC2T: An Early-Read Dual-Track OCC Algorithm For Mixed Mode Systems.

, , and . SAC, page 321-330. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Challenges in Identifying Network Attacks Using Netflow Data., , , and . NCA, page 1-10. IEEE, (2021)A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks., , and . ACM Trans. Internet Things, 2 (1): 4:1-4:32 (2020)Secure Allocation for Graph-Based Virtual Machines in Cloud Environments., and . PST, page 1-7. IEEE, (2021)Towards Understanding Checkpointing in Transiently Powered IoT Networks., , and . TrustCom, page 559-568. IEEE, (2023)Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks., , , and . Guide to Wireless Mesh Networks, Springer, (2009)Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks., , and . Concurr. Comput. Pract. Exp., (2019)A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems., , , and . IEEE Access, (2022)Clairvoyant: a log-based transformer-decoder for failure prediction in large-scale systems., , , and . ICS, page 35:1-35:14. ACM, (2022)Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes., , and . SAC, page 184-193. ACM, (2021)