default search action
James Harbin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b1]James Harbin:
Security strategies in wireless sensor networks. University of York, UK, 2011
Journal Articles
- 2023
- [j6]James Harbin, Simos Gerasimou, Nicholas Drivalos Matragkas, Thanos Zolotas, Radu Calinescu, Misael Alpizar Santana:
Model-driven design space exploration for multi-robot systems in simulation. Softw. Syst. Model. 22(5): 1665-1688 (2023) - 2020
- [j5]James Harbin, Alan Burns, Robert I. Davis, Leandro Soares Indrusiak, Iain Bate, David Griffin:
The AirTight Protocol for Mixed Criticality Wireless CPS. ACM Trans. Cyber Phys. Syst. 4(2): 19:1-19:28 (2020) - 2019
- [j4]Leandro Soares Indrusiak, James Harbin, Cezar Reinbrecht, Johanna Sepúlveda:
Side-channel protected MPSoC through secure real-time networks-on-chip. Microprocess. Microsystems 68: 34-46 (2019) - 2016
- [j3]James Harbin, Leandro Soares Indrusiak:
Comparative performance evaluation of latency and link dynamic power consumption modelling algorithms in wormhole switching networks on chip. J. Syst. Archit. 63: 33-47 (2016) - 2015
- [j2]Leandro Soares Indrusiak, James Harbin, Osmar Marchi dos Santos:
Fast Simulation of Networks-on-Chip with Priority-Preemptive Arbitration. ACM Trans. Design Autom. Electr. Syst. 20(4): 56:1-56:22 (2015) - 2013
- [j1]Ipek Caliskanelli, James Harbin, Leandro Soares Indrusiak, Paul D. Mitchell, Fiona Polack, David Chesmore:
Bioinspired Load Balancing in Large-Scale WSNs Using Pheromone Signalling. Int. J. Distributed Sens. Networks 9 (2013)
Conference and Workshop Papers
- 2024
- [c15]Ionut Predoaia, James Harbin, Simos Gerasimou, Christina Vasiliou, Dimitris S. Kolovos, Antonio García-Domínguez:
Tree-Based versus Hybrid Graphical-Textual Model Editors: An Empirical Study of Testing Specifications. MODELS 2024: 80-91 - 2021
- [c14]James Harbin, Simos Gerasimou, Nicholas Matragkas, Athanasios Zolotas, Radu Calinescu:
Model-Driven Simulation-Based Analysis for Multi-Robot Systems. MoDELS 2021: 331-341 - 2019
- [c13]David Griffin, James Harbin, Alan Burns, Iain Bate, Robert I. Davis, Leandro Soares Indrusiak:
Validating high level simulation results against experimental data and low level simulation: a case study. RTNS 2019: 30-40 - 2018
- [c12]Alan Burns, James Harbin, Leandro Soares Indrusiak, Iain Bate, Robert I. Davis, David Griffin:
AirTight: A Resilient Wireless Communication Protocol for Mixed-Criticality Systems. RTCSA 2018: 65-75 - 2017
- [c11]Leandro Soares Indrusiak, James Harbin, Martha Johanna Sepúlveda:
Side-channel attack resilience through route randomisation in secure real-time Networks-on-Chip. ReCoSoC 2017: 1-8 - 2015
- [c10]Leandro Soares Indrusiak, James Harbin, Alan Burns:
Average and Worst-Case Latency Improvements in Mixed-Criticality Wormhole Networks-on-Chip. ECRTS 2015: 47-56 - [c9]Bharath Sudev, Leandro Soares Indrusiak, James Harbin:
Network-on-Chip packet prioritisation based on instantaneous slack awareness. INDIN 2015: 227-232 - 2014
- [c8]James Harbin, Leandro Soares Indrusiak:
Fine-Grained Link Locking Within Power and Latency Transaction Level Modelling in Wormhole Switching Non-Preemptive Networks On Chip. PARMA-DITAM@HiPEAC 2014: 33-38 - [c7]Alan Burns, James Harbin, Leandro Soares Indrusiak:
A Wormhole NoC Protocol for Mixed Criticality Systems. RTSS 2014: 184-195 - 2013
- [c6]James Harbin, Leandro Soares Indrusiak:
Dynamic task remapping for power and latency performance improvement in priority-based non-preemptive Networks On Chip. ReCoSoC 2013: 1-7 - [c5]James Harbin, Leandro Soares Indrusiak:
Fast transaction-level dynamic power consumption modelling in priority preemptive wormhole switching networks on chip. ICSAMOS 2013: 172-179 - 2012
- [c4]Ipek Caliskanelli, James Harbin, Leandro Soares Indrusiak, Paul D. Mitchell, David Chesmore, Fiona Polack:
Runtime optimisation in WSNs for load balancing using pheromone signalling. NESEA 2012: 1-8 - 2011
- [c3]James Harbin, Paul D. Mitchell:
Reputation routing to avoid sybil attacks in wireless sensor networks using distributed beamforming. ISWCS 2011: 276-280 - 2010
- [c2]James Harbin, Paul D. Mitchell, Dave A. J. Pearce:
Wireless sensor network wormhole avoidance using reputation-based routing. ISWCS 2010: 521-525 - 2009
- [c1]James Harbin, Paul D. Mitchell, David A. J. Pearce:
Wireless sensor network wormhole avoidance using disturbance-based routing schemes. ISWCS 2009: 76-80
Informal and Other Publications
- 2024
- [i2]Ionut Predoaia, James Harbin, Simos Gerasimou, Christina Vasiliou, Dimitris S. Kolovos, Antonio García-Domínguez:
Tree-Based versus Hybrid Graphical-Textual Model Editors: An Empirical Study of Testing Specifications. CoRR abs/2404.05846 (2024) - 2016
- [i1]Leandro Soares Indrusiak, James Harbin, Martha Johanna Sepúlveda:
Side-Channel Attack Resilience through Route Randomisation in Secure Real-Time Networks-on-Chip. CoRR abs/1607.03450 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint