-
2
-
-
17944364573
-
Safety critical real-time networks based on Ethernet technology
-
S. P. Yang, N. Sang, G. Z. Xiong. Safety critical real-time networks based on Ethernet technology. Journal of Software, 2005, 16(1): 121-134.
-
(2005)
Journal of Software
, vol.16
, Issue.1
, pp. 121-134
-
-
Yang, S.P.1
Sang, N.2
Xiong, G.Z.3
-
3
-
-
60449117536
-
Achieving long-term surveillance in vigilnet
-
P. Vicaire, T. He, T. Yan. Achieving long-term surveillance in vigilnet. ACM Trans. on Sensor Networks, 2009, 5(1): 1-39.
-
(2009)
ACM Trans. on Sensor Networks
, vol.5
, Issue.1
, pp. 1-39
-
-
Vicaire, P.1
He, T.2
Yan, T.3
-
4
-
-
46749127352
-
Minimum energy transmission scheduling subject to deadline constraints
-
A. Tarello, J. Sun, M. Zafer, et al. Minimum energy transmission scheduling subject to deadline constraints. ACM Wireless Networks, 2008, 14(5): 633-645.
-
(2008)
ACM Wireless Networks
, vol.14
, Issue.5
, pp. 633-645
-
-
Tarello, A.1
Sun, J.2
Zafer, M.3
-
5
-
-
34547987105
-
Energy-efficient wireless packet scheduling with quality of service control
-
X. Zhang, C. Z. Xu. Energy-efficient wireless packet scheduling with quality of service control. IEEE Trans. on Mobile Computing, 2007, 6(10): 1158-1170.
-
(2007)
IEEE Trans. on Mobile Computing
, vol.6
, Issue.10
, pp. 1158-1170
-
-
Zhang, X.1
Xu, C.Z.2
-
6
-
-
33644994675
-
Energy efficient transmission scheduling for delay constrained wireless networks
-
P. Nuggehalli, V. Srinivasan, R. Rao. Energy efficient transmission scheduling for delay constrained wireless networks. IEEE Trans. on Wireless Communications, 2006, 5(2): 531-539.
-
(2006)
IEEE Trans. on Wireless Communications
, vol.5
, Issue.2
, pp. 531-539
-
-
Nuggehalli, P.1
Srinivasan, V.2
Rao, R.3
-
9
-
-
34548359370
-
Energy efficient scheduling with individual packet delay constraints: Offline and online results
-
W. Chen, M. J. Neely, Mitra. U. Energy efficient scheduling with individual packet delay constraints: offline and online results. Proc. of IEEE INFOCOM, 2007: 1136-1144.
-
(2007)
Proc. of IEEE INFOCOM
, pp. 1136-1144
-
-
Chen, W.1
Neely, M.J.2
Mitra., U.3
-
12
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
K. Ren, W. Lou, Y. Zhang. LEDS: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. on Mobile Computing, 2008, 7(5): 585-598.
-
(2008)
IEEE Trans. on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
13
-
-
52349121324
-
Improving security of real-time wireless networks through packet scheduling
-
X. Qin, M. Alghamdi, M. Nijim, et al. Improving security of real-time wireless networks through packet scheduling. IEEE Trans. on Wireless Communications, 2008, 7(9): 3273-3279.
-
(2008)
IEEE Trans. on Wireless Communications
, vol.7
, Issue.9
, pp. 3273-3279
-
-
Qin, X.1
Alghamdi, M.2
Nijim, M.3
-
14
-
-
33846667508
-
Modeling and improving security of a local disk system for write-intensive workloads
-
M. Nijim, X. Qin, T. Xie. Modeling and improving security of a local disk system for write-intensive workloads. ACM Trans. on Storage, 2006, 2(4): 400-423.
-
(2006)
ACM Trans. on Storage
, vol.2
, Issue.4
, pp. 400-423
-
-
Nijim, M.1
Qin, X.2
Xie, T.3
-
15
-
-
33646486528
-
Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling
-
S. Song, K. Hwang, Y. Kwok. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans. on Computers, 2006, 55(6): 703-719.
-
(2006)
IEEE Trans. on Computers
, vol.55
, Issue.6
, pp. 703-719
-
-
Song, S.1
Hwang, K.2
Kwok, Y.3
-
16
-
-
17844381878
-
ISRAM information security risk analysis method
-
B. Karabacak, I. Sogukpinar. ISRAM: information security risk analysis method. Computers & Security, 2005, 24(2): 147-159.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
17
-
-
43949147252
-
System-wide energy minimization for real time tasks: Lower bound and approximation
-
X. Zhong, C. Z. Xu. System-wide energy minimization for real time tasks: lower bound and approximation. ACM Trans. On Embedded Computing Systems, 2008, 7(3): 1-24.
-
(2008)
ACM Trans. on Embedded Computing Systems
, vol.7
, Issue.3
, pp. 1-24
-
-
Zhong, X.1
Xu, C.Z.2
|