Sciweavers

11603 search results - page 68 / 2321
» Embedded System Security
Sort
View
114
Voted
ECRTS
2000
IEEE
15 years 9 months ago
Worst-case utilization bound for EDF scheduling on real-time multiprocessor systems
José María López, Manuel Garc...
RTAS
2010
IEEE
15 years 3 months ago
Scalable Scheduling Policy Design for Open Soft Real-Time Systems
Robert Glaubius, Terry Tidwell, Braden Sidoti, Dav...
145
Voted
INDOCRYPT
2010
Springer
15 years 2 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
WORDS
2005
IEEE
15 years 10 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai