Author of the publication

Energy Consumption Optimization of Real-Time Embedded Systems.

, , , , , , and . ICESS, page 281-287. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving responsiveness of soft aperiodic tasks using proportional slack time., , , , , , and . Computers & Electrical Engineering, 36 (5): 913-926 (2010)Efficient Identification of Bad Signatures in RSA-Type Batch Signature., , , and . IEICE Transactions, 89-A (1): 74-80 (2006)Energy Consumption Optimization of Real-Time Embedded Systems., , , , , , and . ICESS, page 281-287. IEEE Computer Society, (2009)Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture., , and . SEUS, volume 5287 of Lecture Notes in Computer Science, page 406-416. Springer, (2008)Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems., , , , , and . ISORC, page 359-364. IEEE Computer Society, (2006)Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing., , , , and . NPC, volume 7513 of Lecture Notes in Computer Science, page 138-144. Springer, (2012)An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices., , and . SAC, page 1171-1175. ACM, (2007)A Study on Monitoring and Protecting Computer System against Interception Threat., , , and . Human.Society@Internet 2003, volume 2713 of Lecture Notes in Computer Science, page 96-105. Springer, (2003)Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering., , , , , , and . ISORC, page 80-86. IEEE Computer Society, (2010)Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 174-182. Springer, (2004)