Wei Zhao

According to our database1, Wei Zhao
  • authored at least 210 papers between 1985 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving.
IEEE Trans. Vehicular Technology, 2017

A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems.
IEEE Trans. Vehicular Technology, 2017

Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data.
IEEE Trans. Parallel Distrib. Syst., 2017

PLAN: Joint Policy- and Network-Aware VM Management for Cloud Data Centers.
IEEE Trans. Parallel Distrib. Syst., 2017

On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid.
IEEE Trans. Information Forensics and Security, 2017

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet of Things Journal, 2017

A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

On human mobility predictability via WLAN logs.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Multiple Region of Interest Coverage in Camera Sensor Networks for Tele-Intensive Care Units.
IEEE Trans. Industrial Informatics, 2016

Data integrity attacks against the distributed real-time pricing in the smart grid.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

2015
On Malware Leveraging the Android Accessibility Framework.
EAI Endorsed Trans. Ubiquitous Environments, 2015

A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems.
IEEE Trans. Computers, 2015

TrustRank: a Cold-Start tolerant recommender system.
Enterprise IS, 2015

Beacon Node Placement for Minimal Localization Error.
CoRR, 2015

A novel thermal-aware structure of TSV cluster.
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015

VM-tracking: Visual-motion sensing integration for real-time human tracking.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Policy-Aware Virtual Machine Management in Data Center Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

A cost-efficiency method on beacon nodes placement for wireless localization.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures.
IEEE Trans. Parallel Distrib. Syst., 2014

Multiple-Scale Salient-Region Detection of SAR Image Based on Gamma Distribution and Local Intensity Variation.
IEEE Geosci. Remote Sensing Lett., 2014

Unsupervised SAR Image Segmentation Based on Conditional Triplet Markov Fields.
IEEE Geosci. Remote Sensing Lett., 2014

Blind Recognition of Touched Keys: Attack and Countermeasures.
CoRR, 2014

Keynote: WInternet: From Net of Things to Internet of Things.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A User-Customizable Urban Traffic Information Collection Method Based on Wireless Sensor Networks.
IEEE Trans. Intelligent Transportation Systems, 2013

Protocol-level attacks against Tor.
Computer Networks, 2013

Effective RSS Sampling for Forensic Wireless Localization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

On Malware Leveraging the Android Accessibility Framework.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

EV-Human: Human localization via visual estimation of body electronic interference.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Theory underlying measurement of AOA with a rotating directional antenna.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Pattern mutation in wireless sensor deployment.
IEEE/ACM Trans. Netw., 2012

The Digital Marauder's Map: A WiFi Forensic Positioning Tool.
IEEE Trans. Mob. Comput., 2012

A Real-Time Vehicle Navigation Algorithm in Sensor Network Environments.
IEEE Trans. Intelligent Transportation Systems, 2012

A context-aware scheme for privacy-preserving location-based services.
Computer Networks, 2012

Heavy-Tailed Prediction Error: A Difficulty in Predicting Biomedical Signals of Noise Type.
Comp. Math. Methods in Medicine, 2012

Asymptotic Identity in Min-Plus Algebra: A Report on CPNS.
Comp. Math. Methods in Medicine, 2012

Real-time decision making for urban vehicle navigation.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Performance Comparison of Positioning Algorithms for Complex GPS Systems.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

An efficient hybrid localization scheme for Heterogeneous Wireless Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Privacy-Preserving OLAP: An Information-Theoretic Approach.
IEEE Trans. Knowl. Data Eng., 2011

Modeling and Detection of Camouflaging Worm.
IEEE Trans. Dependable Sec. Comput., 2011

Protection of query privacy for continuous location based services.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Identifying mobiles hiding behind wireless routers.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Optimal multiple-coverage of sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Monte Carlo Method for Mobile Target Counting.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

On a Hierarchical False Data Injection Attack on Power System State Estimation.
Proceedings of the Global Communications Conference, 2011

2010
Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Self-Disciplinary Worms and Countermeasures: Modeling and Analysis.
IEEE Trans. Parallel Distrib. Syst., 2010

Representation of a Stochastic Traffic Bound.
IEEE Trans. Parallel Distrib. Syst., 2010

Toward statistical QoS guarantees in a differentiated services network.
Telecommunication Systems, 2010

Stochastic performance analysis of non-feedforward networks.
Telecommunication Systems, 2010

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010

A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems.
IEEE Trans. Computers, 2010

Pattern Mutation in Wireless Sensor Deployment.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distrib. Syst., 2009

Two-Terminal Video Coding.
IEEE Trans. Image Processing, 2009

Wyner-Ziv coding based on TCQ and LDPC codes.
IEEE Trans. Communications, 2009

CAP: A Context-Aware Privacy Protection System for Location-Based Services.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

The Digital Marauder's Map: A New Threat to Location Privacy.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems.
IEEE Trans. Knowl. Data Eng., 2008

On Multiterminal Source Code Design.
IEEE Trans. Information Theory, 2008

Connectivity in finite ad-hoc networks.
Science in China Series F: Information Sciences, 2008

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A New Replay Attack Against Anonymous Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Optimized high-order finite difference wave equations modeling on reconfigurable computing platform.
Microprocessors and Microsystems, 2007

Analysis of flow-correlation attacks in anonymity network.
IJSN, 2007

Privacy-Preserving Data Mining Systems.
IEEE Computer, 2007

DSSS-Based Flow Marking Technique for Invisible Traceback.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers.
Proceedings of the 28th IEEE Real-Time Systems Symposium (RTSS 2007), 2007

Multiterminal Video Coding.
Proceedings of the International Conference on Image Processing, 2007

High-Precision BLAS on FPGA-enhanced Computers.
Proceedings of the 2007 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2007

2006
Design and Implementation of QoS-Provisioning System for Voice over IP.
IEEE Trans. Parallel Distrib. Syst., 2006

A New delay control method for real-time flows.
J. Comb. Optim., 2006

Distributed policy processing in active-service based infrastructures.
Int. J. Communication Systems, 2006

Self-adaptive Worms and Countermeasures.
Proceedings of the Stabilization, 2006

A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

Challenges and Opportunities of Computer and Communication Systems Research.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

An Optimized Finite Difference Computing Engine on FPGAs.
Proceedings of the 14th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2006), 2006

Group-Alignment based Accurate Floating-Point Summation on FPGAs.
Proceedings of the 2006 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2006

A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

An Efficient Implementation of High-Accuracy Finite Difference Computing Engine on FPGAs.
Proceedings of the 2006 IEEE International Conference on Application-Specific Systems, 2006

On Detecting Camouflaging Worm.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
An Energy-Efficient Slack Distribution Technique for Multimode Distributed Real-Time Embedded Systems.
IEEE Trans. Parallel Distrib. Syst., 2005

Multi-shared-trees based multicast routing control protocol using anycast selection.
Parallel Algorithms Appl., 2005

Analyzing and enhancing the resilience of structured peer-to-peer systems.
J. Parallel Distrib. Comput., 2005

Distributed Privacy Preserving Information Sharing.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

On Schedulability Bounds of Static Priority Schedulers.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

Real-Time Component-Based Systems.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

Performance Measurements for Privacy Preserving Data Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Effectiveness of Traffic Camouflaging over Computer Networks.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

A new scheme on privacy-preserving data classification.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

On Flow Marking Attacks in Wireless Anonymous Communication Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

SAS: A Scalar Anonymous Communication System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Towards a Dynamic Data Driven Application System for Wildfire Simulation.
Proceedings of the Computational Science, 2005

Anonymity analysis of mix networks against flow-correlation attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Time Domain Numerical Simulation for Transient Waves on Reconfigurable Coprocessor Platform.
Proceedings of the 13th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2005), 2005

FPGA-Based High-Order Finite Difference Algorithm for 2D Acoustic Wave Propagation Problems.
Proceedings of The 2005 International Conference on Engineering of Reconfigurable Systems and Algorithms, 2005

On Multiterminal Source Code Design.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliability, 2004

Distributed Admission Control for Anycast Flows.
IEEE Trans. Parallel Distrib. Syst., 2004

Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw., 2004

A New Scheme on Privacy Preserving Association Rule Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

On Flow Correlation Attacks and Countermeasures in Mix Networks.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Query aggregation for providing efficient data services in sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

On the Modeling and Optimization of Discontinuous Network Congestion Control Systems.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Providing Statistical Delay Guarantees in Wireless Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

On the Confidential Auditing of Distributed Computing Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

A Note on Dynamic Data Driven Wildfire Modeling.
Proceedings of the Computational Science, 2004

Cardinality-based inference control in OLAP systems: an information theoretic approach.
Proceedings of the DOLAP 2004, 2004

Asymmetric Code Design for Remote Multiterminal Source Coding.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004

Detecting Grid-Abuse Attacks by Source-based Monitoring.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Guest Editorial: Special Section on Security in Distributed Computing Systems.
IEEE Trans. Parallel Distrib. Syst., 2003

Integrated End-to-End Delay Analysis for Regulated ATM Networks.
Real-Time Systems, 2003

Utilization-Based Admission Control for Scalable Real-Time Communication.
Real-Time Systems, 2003

Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks.
International Journal of Information Technology and Decision Making, 2003

A Study of Providing Statistical QoS in a Differentiated Sevices Network.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Group aggregation for scalable anycast routing.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003

Effective Delay Control for High Rate Heterogeneous Real-time Flows.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
Proceedings of the IEEE Systems, 2003

On Countermeasures to Traffic Analysis Attacks.
Proceedings of the IEEE Systems, 2003

On resilience of structured peer-to-peer systems.
Proceedings of the Global Telecommunications Conference, 2003

2002
Efficient Internet Multicast Routing Using Anycast Path Selection.
J. Network Syst. Manage., 2002

SmartClick: An Enabler for Human-Centered Wireless Web Service.
Proceedings of the Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS'02), 2002

Implementation of QoS-Provisioning System for Voice over IP.
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002

Scalable Multicast Routing Protocol Using Anycast and Hierarchical-Trees.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

An Optimal Strategy for Anonymous Communication Protocols.
ICDCS, 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2001

An integrated routing and admission control mechanism for real-time multicast connections in ATM networks.
IEEE Trans. Communications, 2001

Energy Consumption of Traffic Padding Schemes in Wireless Ad Hoc Networks.
Scalable Computing: Practice and Experience, 2001

Challenges in Design and Implementation of Middlewares for Real-Time Systems: Guest Editor's Introduction.
Real-Time Systems, 2001

Simulation of Long-Range Dependent Traffic and a Simulator of TCP Arrival Traffic.
Journal of Interconnection Networks, 2001

Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Integrated Routing for Multicast and Anycast Messages.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

2000
A Routing Protocol for Anycast Messages.
IEEE Trans. Parallel Distrib. Syst., 2000

Statistical delay analysis on an ATM switch with self-similar input traffic.
Inf. Process. Lett., 2000

A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks.
Proceedings of the WISE 2000, 2000

Utilization-Based Admission Control for Real-Time Applications.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

Scalable QoS Guaranteed Communication Services for Real-Time Applications.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
IEEE Trans. Parallel Distrib. Syst., 1999

Using Traffic Regulation to Meet End-to-End Deadlines in ATM Networks.
IEEE Trans. Computers, 1999

A new method for integrated end-to-end delay analysis in ATM networks.
Journal of Communications and Networks, 1999

Efficient Connection Admission Control Algorithms for Adaptive QoS Real-Time Connections over ATM Networks.
European Transactions on Telecommunications, 1999

Efficient Connection Admission Control Algorithms for Adaptive QoS Real-Time Connections over ATM Networks.
European Transactions on Telecommunications, 1999

Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks .
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999

Real-time Intrusion Detection and Suppression in ATM Networks.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

New Delay Analysis in High Speed Networks.
Proceedings of the International Conference on Parallel Processing 1999, 1999

An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
Proceedings of the International Conference on Parallel Processing 1999, 1999

1998
Routing Algorithms for Anycast Messages.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

1997
Fault-Tolerant, Real-Time Communication in FDDI-Based Networks.
IEEE Computer, 1997

Integrated delay analysis of regulated ATM switch.
Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), 1997

Static priority scheduling for ATM networks.
Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), 1997

Stability in ATM Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

Connection-Oriented Communications for Real-Time Applications in FDDI-ATM-FDDI Heterogeneous Networks.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

1996
An Efficient Optimal Reconfiguration Algorithm for FDDI-Based Networks.
IEEE Trans. Parallel Distrib. Syst., 1996

Real-Time Communication in FDDI Networks.
Real-Time Systems, 1996

Modeling and Regulation of Host Traffic in ATM Networks.
Proceedings of the Proceedings 21st Conference on Local Computer Networks, 1996

Admission Control for Hard Real-Time Connections in ATM LANs.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

Meeting Delay Requirements in Computer Networks with Wormhole Routing.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Hard Real-Time Communication in Multiple-Access Networks.
Real-Time Systems, 1995

Fault-tolerant Real-Time Communication in FDDI-Based Networks.
Proceedings of the 16th IEEE Real-Time Systems Symposium, 1995

Guaranteeing application-to-application deadlines in distributed real-time systems.
Proceedings of the Proceedings 20th Conference on Local Computer Networks (LCN'95), 1995

Using traffic regulation to meet end-to-end deadlines in ATM LANs.
Proceedings of the 1995 International Conference on Network Protocols, 1995

Hard real-time communications with weighted round robin service in ATM local area networks.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Guaranteeing End-to-End Deadlines in ATM Networks.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

1994
Guaranteeing Synchronous Message Deadlines with the Timed Token Medium Access Control Protocol.
IEEE Trans. Computers, 1994

The Timed-Token Protocol for Real-Time Communications.
IEEE Computer, 1994

Performance Evaluation of Admission Policies in ATM Based Embedded Real-Time Systems.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994

On Available Bandwidth in FDDI-Based Reconfigurable Networks.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1993
Performance Evaluation of a Bandwidth Allocation Scheme for Guaranteeing Synchronous Messages with Arbitrary Deadlines in an FDDI Network.
Proceedings of the Real-Time Systems Symposium. Raleigh-Durham, NC, December 1993, 1993

Guaranteeing synchronous messages with arbitrary deadline constraints in an FDDI network.
Proceedings of the 18th Conference on Local Computer Networks, 1993

Local Synchronous Capacity Allocation Schemes for Guaranteeing Message Deadlines with the Timed Token Protocol.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993

Real-Time Schedulability of Two Token Ring Protocols.
Proceedings of the 13th International Conference on Distributed Computing Systems, 1993

Predictability and Scalability of Real-Time Scheduling.
Proceedings of the Fifth Euromicro Workshop on Real-Time Systems, 1993

1992
Issues in Building Dynamic Real-Time Systems.
IEEE Software, 1992

User-controlled optimization of task scheduling for imprecise computer systems.
Information & Software Technology, 1992

Optimal synchronous capacity allocation for hard real-time communications with the timed token protocol.
Proceedings of the Real-Time Systems Symposium, 1992

Advances in hard real-time communication with local area networks.
Proceedings of the 17th Conference on Local Computer Networks, 1992

Guaranteeing Synchronous Message Deadlines with the Timed Token Protocol.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
Performance evaluation of scheduling algorithms for imprecise computer systems.
Journal of Systems and Software, 1991

Algorithms for Scheduling Imprecise Computations.
IEEE Computer, 1991

Version selection schemes for hard real-time communications.
Proceedings of the Real-Time Systems Symposium, 1991

Performance of an Extended IEEE 802.5 Protocol in Hard Real-Time Systems.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

A comparative study of three token ring protocols for real-time communications.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
A Window Protocol for Transmission of Time-Constrained Messages.
IEEE Trans. Computers, 1990

Guarantee Protocols for Communication in Distributed Hard Real-Time Systems.
Proceedings of the Proceedings IEEE INFOCOM '90, 1990

GARTL: A Real-time Programming Language Based on Multi-version Computation.
Proceedings of the 1990 Internation Conference on Computer Languages, 1990

1989
Distributed Scheduling of Tasks with Deadlines and Resource Requirements.
IEEE Trans. Computers, 1989

Guest Editor's Introduction - Special Issue on Real-Time Computing Systems.
Operating Systems Review, 1989

Performance Analysis of FCFS and Improved FCFS Scheduling Algorithms for Dynamic Real-Time Computer Systems.
Proceedings of the Real-Time Systems Symposium, 1989

1988
On Real-Time Transactions.
SIGMOD Record, 1988

A Multi-Access Window Protocol for Transmission of Time Constrained Messages.
Proceedings of the 8th International Conference on Distributed Computing Systems, 1988

1987
Scheduling Tasks with Resource Requirements in Hard Real-Time Systems.
IEEE Trans. Software Eng., 1987

Virtual Time CSMA Protocols for Hard Real-Time Communication.
IEEE Trans. Software Eng., 1987

Preemptive Scheduling Under Time and Resource Constraints.
IEEE Trans. Computers, 1987

Simple and integrated heuristic algorithms for scheduling tasks with time and resource constraints.
Journal of Systems and Software, 1987

Meta-Level Control in Distributed Real-Time Systems.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987

1986
A Virtual Time CSMA Protocol for Hard Real Time Communication.
Proceedings of the 7th IEEE Real-Time Systems Symposium (RTSS '86), 1986

1985
Distributed Scheduling Using Bidding and Focused Addressing.
Proceedings of the 6th IEEE Real-Time Systems Symposium (RTSS '85), 1985


  Loading...