Author of the publication

An Efficient Resource Allocation Scheme for Gang Scheduling.

, , , , and . IWCC, page 187-194. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Copresent Cycling Experience., , , , , and . HCI (2), volume 8005 of Lecture Notes in Computer Science, page 20-25. Springer, (2013)Using Assurance Cases and Boolean Logic Driven Markov Processes to Formalise Cyber Security Concerns for Safety-Critical Interaction with Global Navigation Satellite Systems.. ECEASST, (2011)Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications.. SAFECOMP, volume 9337 of Lecture Notes in Computer Science, page 375-384. Springer, (2015)A survey of logic formalisms to support mishap analysis., and . Reliab. Eng. Syst. Saf., 80 (3): 271-291 (2003)A case study in the integration of accident reports and constructivedesign documents.. Reliab. Eng. Syst. Saf., 71 (3): 311-326 (2001)How reliable is satellite navigation for aviation? Checking availability properties with probabilistic verification., , , , and . Reliab. Eng. Syst. Saf., (2015)Exploring the layers of information retrieval evaluation., , and . Interact. Comput., 10 (3): 225-236 (1998)Using Diagrams to Support the Analysis of System 'Failure' and Operator 'Error'., and . BCS HCI, page 245-261. Springer, (1997)Academic integrity: differences between computing assessments and essays., , , , and . Koli Calling, page 23-32. ACM, (2013)On the Problems of Validating DesktopVR.. BCS HCI, page 327-338. Springer, (1998)