Li Wang

Affiliations:
  • Illinois Institute of Technology, Chicago, IL, USA


According to our database1, Li Wang authored at least 12 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Prediction Based Run-Time Reconfiguration on Many-Core Embedded Systems.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2014
Improving System Reliability Against Rational Attacks Under Given Resources.
IEEE Trans. Syst. Man Cybern. Syst., 2014

2013
Reliability guaranteed energy-aware frame-based task set execution strategy for hard real-time systems.
J. Syst. Softw., 2013

Optimal Voting Strategy against Random and Targeted Attacks.
Int. J. Secur. Softw. Eng., 2013

Energy minimization for checkpointing-based approach to guaranteeing real-time systems reliability.
Proceedings of the 16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013

2012
Profit and Penalty Aware Scheduling for Real-Time Online Services.
IEEE Trans. Ind. Informatics, 2012

Performance Comparisons of Parallel Power Flow Solvers on GPU System.
Proceedings of the 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2012

A genetic algorithm based approach to maximizing real-time system value under resource constraints.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Overall System Value Maximization for Resource Constrained Heterogeneous Real-Time Systems.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
Temperature, Power, and Makespan Aware Dependent Task Scheduling for Data Centers.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

Optimal Voting Strategy Against Rational Attackers.
Proceedings of the CRiSIS 2011, 2011

2010
Improving complex distributed software system availability through information hiding.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010


  Loading...