An integrated metric for video QoS
MULTIMEDIA '97 Proceedings of the fifth ACM international conference on Multimedia
Techniques for mapping tasks to machines in heterogeneous computing systems
Journal of Systems Architecture: the EUROMICRO Journal - Heterogeneous distributed and parallel architectures: hardware, software and design tools
Deadline Scheduling for Real-Time Systems: Edf and Related Algorithms
Deadline Scheduling for Real-Time Systems: Edf and Related Algorithms
Toward a Taxonomy and Costing Method for Security Services
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
An Overview of MSHN: The Management System for Heterogeneous Networks
HCW '99 Proceedings of the Eighth Heterogeneous Computing Workshop
Toward Quality of Security Service in a Resource Management System Benefit Function
HCW '00 Proceedings of the 9th Heterogeneous Computing Workshop
Taxomomy of QoS Specifications
WORDS '97 Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems - (WORDS '97)
A QoS performance measure framework for distributed heterogeneous networks
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Extending RSVP for Quality of Security Service
IEEE Internet Computing
StReD: A quality of security framework for storage resources in Data Grids
Future Generation Computer Systems
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
MYSEA: the monterey security architecture
Proceedings of the 2009 ACM workshop on Scalable trusted computing
An energy efficient security protocol for IEEE 802.11 WLANs
Pervasive and Mobile Computing
QoS-T: QoS throttling to elicit user cooperation in computer systems
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A general method for assessment of security in complex services
ServiceWave'11 Proceedings of the 4th European conference on Towards a service-based internet
ILP security optimization method for embedded systems with timing constraints
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Benchmarking cloud security level agreements using quantitative policy trees
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
Hi-index | 0.01 |