Author of the publication

A Formal Approach to Design and Verification of Two-Level Hierarchical Scheduling Systems.

, , , and . Ada-Europe, volume 6652 of Lecture Notes in Computer Science, page 118-131. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Computation of the Worst-Case Execution Time of a Program., , and . CoRR, (2017)A Bandwidth Reservation Algorithm for Multi-Application Systems., , and . RTCSA, page 77-82. IEEE Computer Society, (1998)From Functional Blocks to the Synthesis of the Architectural Model in Embedded Real-time Applications., , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 458-467. IEEE Computer Society, (2005)The Demand Bound Function Interface of Distributed Sporadic Pipelines of Tasks Scheduled by EDF., , and . ECRTS, page 187-196. IEEE Computer Society, (2010)A Framework for Modeling Operating System Mechanisms in the Simulation of Network Protocols for Real-Time Distributed Systems., , and . IPDPS, page 1-8. IEEE, (2007)A Multiprocessor Implementation of the Total Bandwidth Server., and . IPDPS, IEEE Computer Society, (2004)Minimizing CPU energy in real-time systems with discrete speed management., , and . ACM Trans. Embed. Comput. Syst., 8 (4): 31:1-31:23 (2009)Allocation of Real-Time Tasks onto Identical Core Platforms under Deferred fixed Preemption-Point Model., , , , and . RTNS, page 34-43. ACM, (2020)Schedulability analysis of periodic and aperiodic tasks with resource constraints., and . J. Syst. Archit., 46 (4): 327-338 (2000)Reducing the fault vulnerability of hard real-time systems., , and . J. Syst. Archit., (2022)