Secure cooperative ad hoc applications within UAV fleets
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Information-acquisition-as-a-service for cyber-physical cloud computing
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Authority sharing in mixed initiative control of multiple uninhabited aerial vehicles
EPCE'11 Proceedings of the 9th international conference on Engineering psychology and cognitive ergonomics
Hi-index | 0.00 |
Consider the problem of designing an algorithm with a high utilization bound for scheduling sporadic tasks with implicit deadlines on identical processors. A task is characterized by its minimum interarrival time and its execution time. Task preemption ...