default search action
27th ISORC 2024: Tunis, Tunisia
- 27th IEEE International Symposium on Real-Time Distributed Computing, ISORC 2024, Tunis, Tunisia, May 22-25, 2024. IEEE 2024, ISBN 979-8-3503-7128-4
- Florient Champenois, Florian Brandner, Thierry Grandpierre, Etienne Borde, Abraham Suissa, Laurent Georges:
Multi-Criteria Optimization of Distributed Real-Time Network Topologies. 1-11 - Maher Jabberi, Bassem Sellami, Akram Hakiri, Adel M. Alimi:
Performance Evaluation of Real-Time Localization and Positioning Algorithms for WSNs. 1-6 - Martin Schoeberl:
Exploration of Network Interface Architectures for a Real-Time Network-on-Chip. 1-8 - Biagio Boi, Marco De Santis, Christian Esposito:
Decentralized Identity Management and Privacy-Enhanced Federated Learning for Automotive Systems: A Novel Framework. 1-6 - Sree Charitha Meka, Sanjana Achan, Robert G. Pettit IV:
Real-Time Embedded Monitoring Technologies in Modern Healthcare Systems: A Survey. 1-6 - Chaima Bejaoui, Fatma Achour, Nasreddine Hajlaoui, Anis Jedidi:
An IoT Semantic Web Service For Objects Identifying. 1-6 - Zain Alabedin Haj Hammadeh, Monowar Hasan, Mohammad Hamad:
Securing Real-Time Systems using Schedule Reconfiguration. 1-10 - Emna Boudabous, Mohamed Karaa, Lokman Sboui, Julio Montecinos, Omar Alam:
Analyzing Public Transit Schedule Deviations: A Case Study on Montreal Using Real-Time Data. 1-6 - Aymen Abid, Omar Cheikhrouhou, Ghada Zaïbi, Abdennaceur Kachouri:
Machine Learning based Outlier Detection in IoT Greenhouse. 1-9 - Ibtissem Brahmi, Souhir Elleuch, Monia Hamdi, Faouzi Zarai:
Variable Neighborhood Search-based Resource Allocation for Vehicle-to-Everything Communications. 1-6 - Mario Barbareschi, Franco Cirillo, Christian Esposito:
SRAM-PUF Authentication Schemes Empowered with Blockchain on Resource-Constrained Microcontrollers. 1-10 - Nao Yoshimura, Hiroshi Oyama, Takuya Azumi:
TECS/Rust: Memory-safe Component Framework for Embedded Systems. 1-11 - Tasnim Assali, Zayneb Trabelsi Ayoub, Sofiane Ouni:
Multivariate LSTM for Execution Time Prediction in HPC for Distributed Deep Learning Training. 1-5 - Emad Jacob Maroun, Martin Schoeberl, Peter P. Puschner:
Two-Step Register Allocation for Implementing Single-Path Code. 1-12 - Ahmed Bali, Pierre-Emmanuel Hladik, Horace Gandji, Abdelouahed Gherbi, Mohamed Cheriet:
Integrating Random Forest Prediction for Energy Optimization in Solar-Powered Environmental Monitoring. 1-10 - Mohammad Fakhruddin Babar, Monowar Hasan:
A New Covert Channel in Fixed-Priority Real-Time Multiframe Tasks. 1-6 - Moez Balti, Hichem Mrabet, Abderrazek Jemai:
Security Assessment Solutions for IoT Devices. 1-6 - Melanie Feist, Uwe Brinkschulte, Mathias Pacher:
The Adaptation Mechanism of Chameleon - A Comprehensive Adaptive Middleware for Mixed-Critical Cyber-Physical Networks. 1-10 - Marouene Boubakri, Belhassen Zouari:
Architectural Security and Trust Foundation for RISC-V. 1-8 - Ehsan Khodadad, Luca Pezzarossa, Martin Schoeberl:
Towards Lingua Franca on the Patmos Processor. 1-5 - Leonardo Passig Horstmann, Antônio Augusto Fröhlich, Marcus Völp:
On the Impacts of Shared-Resource Contention on Intrusion Detection Systems based on Performance Monitoring. 1-8 - Robert Schmid, Katja Assaf, Clemens Tiedt, Frederic Reiter, Dirk Friedenberger, Andreas Polze:
Managing Complexity in Safety-critical Railway Signaling Systems using Simplex Architectures. 1-6 - Andras Pinter, Leandro Soares Indrusiak, Ian Gray:
Evaluation of Early Packet Drop Scheduling Policies in Criticality-Aware Wireless Sensor Networks. 1-9 - Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, Bassem Ben Hamed:
Intrusion Detection Schemes Based on Synthetic Minority Oversampling Technique and Machine Learning Models. 1-8 - Amani Elaoud, Achraf Khazri, Walid Barhoumi:
An Explainable Method for Cost-Efficient Multi-View Fall Detection. 1-10 - Antonio Savino, Gautam Gala, Marcello Cinque, Gerhard Fohler:
Multicore DRAM Bank-& Row-Conflict Bomb for Timing Attacks in Mixed-Criticality Systems. 1-10 - Bruno Stévant, Jean-Louis Pazat, Alberto Blanc:
Towards a participatory cloud infrastructure for hosting services: QoS-aware dynamic orchestration of microservices. 1-6 - Stanislas Pedebearn, Slim Abdellatif, Pascal Berthou, Dariusz Nogalski, Dallal Belabed:
Controllable virtual network service over a multi-administrative multi-domain network. 1-10 - Tarak Dhaouadi, Hichem Mrabet, Abderrazek Jemai:
The HiTar-23 Dataset Construction and Validation For Securing Industrial Internet of Things Environment. 1-6 - Karim Houidi, Marwa Said, Akram Hakiri, Nédra Mellouli-Nauwynck, Hella Kaffel Ben Ayed:
Federated Learning Models for Real-Time IoT: A Survey. 1-6 - Hanen Issaoui, Asma ElAdel, Mourad Zaied:
Object Detection Using Convolutional Neural Networks: A Comprehensive Review. 1-6 - Marwa Said, Karim Houidi, Akram Hakiri, Nédra Mellouli-Nauwynck, Hella Kaffel Ben Ayed:
Performance Evaluation of LoRaWAN Propagation Models for Real-Time IoT Deployments. 1-6 - Dallal Belabed:
Multi-Access Edge Computing: Striking a balance between QoE and Energy Efficiency. 1-6 - Antonio Rosales Viesca, Mustafa Al-Lail, Omar Alam:
Streamlining CPS Validation: Using Interoperable UML Tools for Seamless Model Exchange. 1-4 - Rabeb Ben Othmen, Wassim Abbessi, Sofiane Ouni, Wafa Badreddine, Gilles Dequen:
Low latency PBFT parallel consensus for IoT blockchain platform. 1-6 - Philipp Homann, Jonas Diegelmann, Mathias Pacher, Uwe Brinkschulte:
Evaluation of Trust Metrics in an Artificial Hormone System. 1-12 - Yibo Wang, Tongsheng Geng, Ericson Silva, Jean-Luc Gaudiot:
Hierarchical Heterogeneous Cluster Systems for Scalable Distributed Deep Learning. 1-6 - Sridhar Mallareddy, Pavan Kumar Kondooru, Deepak Gangadharan:
Checkpointing-Aware End-to-End Data Age Analysis of Task Chains under Transient Faults. 1-10 - Takashi Ikegami, Ichiro Satoh, Tatsuo Nakajima:
Preventing Order Inversion within Function-as-a-Service for Sensor Networks. 1-6 - Salma Alharbi:
Time Granularity in Behavioural Structured Acyclic Nets. 1-12 - Fatima Raadia, Nathan Fisher, Thidapat Chantem, Sanjoy K. Baruah:
An Improved Security-Cognizant Scheduling Model. 1-8 - Mariem Belhor, Anne Savard, Anthony Fleury, Patrick Sondi, Valeria Loscrì:
Enhanced RF-based 3D UAV Outdoor Geolocation: from Trilateration to Machine Learning Approaches. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.