![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Systems Architecture, Volume 116
Volume 116, June 2021
- Khaled Alwasel
, Devki Nandan Jha, Fawzy Habeeb, Umit Demirbaga
, Omer F. Rana
, Thar Baker
, Scharam Dustdar
, Massimo Villari, Philip James, Ellis Solaiman
, Rajiv Ranjan:
IoTSim-Osmosis: A framework for modeling and simulating IoT applications over an edge-cloud continuum. 101956 - Liyang Bai
, Kai Fan, Yuhan Bai
, Xiaochun Cheng
, Hui Li, Yintang Yang:
Cross-domain access control based on trusted third-party and attribute mapping center. 101957
- Arvind Easwaran, Qi Zhu, Naijun Zhan:
Special issue on design of embedded software and systems (SI: ICESS19). 101973
- Wenzhong Li
, Lingfan Yu, Chaojing Xue, Han Zhang, Jixiang Lu, Rongrong Cao, Sanglu Lu:
Adaptive subflow allocation for multipath data transmission in mobile edge networks. 102012
- P. Veda Bhanu
, Soumya J.
:
Fault-Tolerant Application Mapping on Mesh-of-Tree based Network-on-Chip. 102026
- Sanjoy K. Baruah
:
Implementing synchronous reactive components upon multiprocessor platforms. 102027
- Mengdi Ouyang, Ziqing Wang
, Fagen Li:
Digital signature with cryptographic reverse firewalls. 102029 - Santanu Pattanayak, Subhrajit Nag, Sparsh Mittal
:
CURATING: A multi-objective based pruning technique for CNNs. 102031 - Ridhima Rani
, Neeraj Kumar
, Meenu Khurana
, Ashok Kumar
, Ahmed Barnawi
:
Storage as a service in Fog computing : A systematic review. 102033 - Simei Yang
, Sébastien Le Nours, Maria Mendez Real, Sébastien Pillement
:
0-1 ILP-based run-time hierarchical energy optimization for heterogeneous cluster-based multi/many-core systems. 102035
- Mohammad Ashjaei, Mikael Sjödin, Saad Mubeen
:
A novel frame preemption model in TSN networks. 102037
- Alejandro R. Mosteo
, María-Teresa Lorente:
Exploring the boundaries of Ada syntax with functional-style iterators. 102039
- Abdelrhman Hassan
, Fei Liu, Fan-Chuan Wang, Yong Wang:
Secure content based image retrieval for mobile users with deep neural networks in the cloud. 102043
- Imanol Allende
, Nicholas Mc Guire, Jon Pérez
, Lisandro Gabriel Monsalve, Roman Obermaisser:
Towards Linux based safety systems - A statistical approach for software execution path coverage. 102047
- Hao Feng, Yuhui Deng
, Jie Li:
A global-energy-aware virtual machine placement strategy for cloud data centers. 102048
- Qingxia Zhang, Chao Tang, Tian Bai, Zihao Meng, Yuhao Zhan, Junyu Niu, M. Jamal Deen
:
A two-layer optimal scheduling framework for energy savings in a data center for Cyber-Physical-Social Systems. 102050
- Tandoh Lawrence
, Fagen Li, Ikram Ali
, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher:
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. 102051 - Akber Ali Khan
, Vinod Kumar
, Musheer Ahmad, Saurabh Rana:
LAKAF: Lightweight authentication and key agreement framework for smart grid network. 102053 - Dongjie Tang, Linsheng Li, Jiacheng Ma
, Xue Liu
, Zhengwei Qi, Haibing Guan:
gRemote: Cloud rendering on GPU resource pool based on API-forwarding. 102055
- Ting Liu
, Yuzhuo Fu, Xiaotong Xu, Wei Yan:
A cross-layer fault propagation analysis method for edge intelligence systems deployed with DNNs. 102057
- Yong Jin, Jia Xu, Sixu Wu, Lijie Xu, Dejun Yang
, Kaijian Xia:
Bus network assisted drone scheduling for sustainable charging of wireless rechargeable sensor network. 102059 - Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty
, Nalin Ranasinghe, Kasun De Zoysa
:
Rahasak - Scalable blockchain architecture for enterprise applications. 102061
- José L. Núñez-Yáñez, Neil J. Howard:
Energy-efficient neural networks with near-threshold processors and hardware accelerators. 102062
- Vinícius Meyer
, Dionatra F. Kirchoff, Matheus L. da Silva, César A. F. De Rose:
ML-driven classification scheme for dynamic interference-aware resource scheduling in cloud infrastructures. 102064
- Mubarak Adetunji Ojewale
, Patrick Meumeu Yomsi, Borislav Nikolic:
Worst-case traversal time analysis of TSN with multi-level preemption. 102079
- Dongdong Huo, Chen Cao, Peng Liu
, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! 102114
- Akash Sachan
, Bibhas Ghoshal
:
Learning based compilation of embedded applications targeting minimal energy consumption. 102116 - Wenjie Wang
, Minghua Zhu
, Xiaotong Chi, Huadong Xu:
S-CNN-ESystem: An end-to-end embedded CNN inference system with low hardware cost and hardware-software time-balancing. 102122 - Vladimir Herdt
, Daniel Große, Sören Tempel, Rolf Drechsler
:
Adaptive simulation with Virtual Prototypes in an open-source RISC-V evaluation platform. 102135 - Keni Ren
, Gun Bernes
, Mårten Hetta, Johannes Karlsson:
Tracking and analysing social interactions in dairy cattle with real-time locating system and machine learning. 102139 - Yuhan Lin
, Xi Jin, Tianyu Zhang
, Meiling Han, Nan Guan
, Qingxu Deng
:
Queue assignment for fixed-priority real-time flows in time-sensitive networks: Hardness and algorithm. 102141
- Benjamin Vignau
, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj
:
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. 102143
- Ye Yang
, Haiyang Jiang, Yulei Wu
, Chunjing Han, Yilong Lv, Xing Li, Bowen Yang, Serge Fdida, Gaogang Xie:
C2QoS: Network QoS guarantee in vSwitch through CPU-cycle management. 102148
- Shiming Li
, Shuo Tian, Ziyang Kang
, Lianhua Qu, Shiying Wang, Lei Wang, Weixia Xu:
A multi-objective LSM/NoC architecture co-design framework. 102154
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.