


default search action
27th ISORC 2024: Tunis, Tunisia
- 27th IEEE International Symposium on Real-Time Distributed Computing, ISORC 2024, Tunis, Tunisia, May 22-25, 2024. IEEE 2024, ISBN 979-8-3503-7128-4

- Florient Champenois, Florian Brandner, Thierry Grandpierre, Etienne Borde, Abraham Suissa, Laurent Georges:

Multi-Criteria Optimization of Distributed Real-Time Network Topologies. 1-11 - Maher Jabberi, Bassem Sellami, Akram Hakiri

, Adel M. Alimi
:
Performance Evaluation of Real-Time Localization and Positioning Algorithms for WSNs. 1-6 - Martin Schoeberl

:
Exploration of Network Interface Architectures for a Real-Time Network-on-Chip. 1-8 - Biagio Boi

, Marco De Santis
, Christian Esposito:
Decentralized Identity Management and Privacy-Enhanced Federated Learning for Automotive Systems: A Novel Framework. 1-6 - Sree Charitha Meka, Sanjana Achan, Robert G. Pettit IV:

Real-Time Embedded Monitoring Technologies in Modern Healthcare Systems: A Survey. 1-6 - Chaima Bejaoui

, Fatma Achour, Nasreddine Hajlaoui, Anis Jedidi
:
An IoT Semantic Web Service For Objects Identifying. 1-6 - Zain Alabedin Haj Hammadeh

, Monowar Hasan
, Mohammad Hamad:
Securing Real-Time Systems using Schedule Reconfiguration. 1-10 - Emna Boudabous, Mohamed Karaa, Lokman Sboui, Julio Montecinos, Omar Alam:

Analyzing Public Transit Schedule Deviations: A Case Study on Montreal Using Real-Time Data. 1-6 - Aymen Abid

, Omar Cheikhrouhou, Ghada Zaïbi, Abdennaceur Kachouri:
Machine Learning based Outlier Detection in IoT Greenhouse. 1-9 - Ibtissem Brahmi, Souhir Elleuch, Monia Hamdi, Faouzi Zarai:

Variable Neighborhood Search-based Resource Allocation for Vehicle-to-Everything Communications. 1-6 - Mario Barbareschi, Franco Cirillo

, Christian Esposito:
SRAM-PUF Authentication Schemes Empowered with Blockchain on Resource-Constrained Microcontrollers. 1-10 - Nao Yoshimura, Hiroshi Oyama, Takuya Azumi:

TECS/Rust: Memory-safe Component Framework for Embedded Systems. 1-11 - Tasnim Assali

, Zayneb Trabelsi Ayoub
, Sofiane Ouni:
Multivariate LSTM for Execution Time Prediction in HPC for Distributed Deep Learning Training. 1-5 - Emad Jacob Maroun, Martin Schoeberl

, Peter P. Puschner:
Two-Step Register Allocation for Implementing Single-Path Code. 1-12 - Ahmed Bali, Pierre-Emmanuel Hladik, Horace Gandji, Abdelouahed Gherbi, Mohamed Cheriet:

Integrating Random Forest Prediction for Energy Optimization in Solar-Powered Environmental Monitoring. 1-10 - Mohammad Fakhruddin Babar, Monowar Hasan

:
A New Covert Channel in Fixed-Priority Real-Time Multiframe Tasks. 1-6 - Moez Balti, Hichem Mrabet, Abderrazek Jemai:

Security Assessment Solutions for IoT Devices. 1-6 - Melanie Feist, Uwe Brinkschulte, Mathias Pacher:

The Adaptation Mechanism of Chameleon - A Comprehensive Adaptive Middleware for Mixed-Critical Cyber-Physical Networks. 1-10 - Marouene Boubakri

, Belhassen Zouari:
Architectural Security and Trust Foundation for RISC-V. 1-8 - Ehsan Khodadad

, Luca Pezzarossa, Martin Schoeberl
:
Towards Lingua Franca on the Patmos Processor. 1-5 - Leonardo Passig Horstmann

, Antônio Augusto Fröhlich, Marcus Völp
:
On the Impacts of Shared-Resource Contention on Intrusion Detection Systems based on Performance Monitoring. 1-8 - Robert Schmid, Katja Assaf, Clemens Tiedt

, Frederic Reiter, Dirk Friedenberger, Andreas Polze:
Managing Complexity in Safety-critical Railway Signaling Systems using Simplex Architectures. 1-6 - Andras Pinter, Leandro Soares Indrusiak

, Ian Gray:
Evaluation of Early Packet Drop Scheduling Policies in Criticality-Aware Wireless Sensor Networks. 1-9 - Ali Hussein Ali

, Maha Charfeddine, Boudour Ammar, Bassem Ben Hamed:
Intrusion Detection Schemes Based on Synthetic Minority Oversampling Technique and Machine Learning Models. 1-8 - Amani Elaoud, Achraf Khazri, Walid Barhoumi

:
An Explainable Method for Cost-Efficient Multi-View Fall Detection. 1-10 - Antonio Savino, Gautam Gala, Marcello Cinque, Gerhard Fohler:

Multicore DRAM Bank-& Row-Conflict Bomb for Timing Attacks in Mixed-Criticality Systems. 1-10 - Bruno Stévant, Jean-Louis Pazat, Alberto Blanc:

Towards a participatory cloud infrastructure for hosting services: QoS-aware dynamic orchestration of microservices. 1-6 - Stanislas Pedebearn, Slim Abdellatif, Pascal Berthou

, Dariusz Nogalski, Dallal Belabed:
Controllable virtual network service over a multi-administrative multi-domain network. 1-10 - Tarak Dhaouadi, Hichem Mrabet, Abderrazek Jemai:

The HiTar-23 Dataset Construction and Validation For Securing Industrial Internet of Things Environment. 1-6 - Karim Houidi, Marwa Said, Akram Hakiri

, Nédra Mellouli-Nauwynck, Hella Kaffel Ben Ayed:
Federated Learning Models for Real-Time IoT: A Survey. 1-6 - Hanen Issaoui, Asma ElAdel, Mourad Zaied:

Object Detection Using Convolutional Neural Networks: A Comprehensive Review. 1-6 - Marwa Said, Karim Houidi, Akram Hakiri

, Nédra Mellouli-Nauwynck, Hella Kaffel Ben Ayed:
Performance Evaluation of LoRaWAN Propagation Models for Real-Time IoT Deployments. 1-6 - Dallal Belabed:

Multi-Access Edge Computing: Striking a balance between QoE and Energy Efficiency. 1-6 - Antonio Rosales Viesca, Mustafa Al-Lail, Omar Alam:

Streamlining CPS Validation: Using Interoperable UML Tools for Seamless Model Exchange. 1-4 - Rabeb Ben Othmen

, Wassim Abbessi
, Sofiane Ouni, Wafa Badreddine, Gilles Dequen:
Low latency PBFT parallel consensus for IoT blockchain platform. 1-6 - Philipp Homann, Jonas Diegelmann, Mathias Pacher, Uwe Brinkschulte:

Evaluation of Trust Metrics in an Artificial Hormone System. 1-12 - Yibo Wang, Tongsheng Geng, Ericson Silva, Jean-Luc Gaudiot:

Hierarchical Heterogeneous Cluster Systems for Scalable Distributed Deep Learning. 1-6 - Sridhar Mallareddy, Pavan Kumar Kondooru, Deepak Gangadharan:

Checkpointing-Aware End-to-End Data Age Analysis of Task Chains under Transient Faults. 1-10 - Takashi Ikegami

, Ichiro Satoh, Tatsuo Nakajima:
Preventing Order Inversion within Function-as-a-Service for Sensor Networks. 1-6 - Salma Alharbi:

Time Granularity in Behavioural Structured Acyclic Nets. 1-12 - Fatima Raadia

, Nathan Fisher, Thidapat Chantem
, Sanjoy K. Baruah:
An Improved Security-Cognizant Scheduling Model. 1-8 - Mariem Belhor

, Anne Savard, Anthony Fleury, Patrick Sondi
, Valeria Loscrì:
Enhanced RF-based 3D UAV Outdoor Geolocation: from Trilateration to Machine Learning Approaches. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














