


Остановите войну!
for scientists:


default search action
Simin Nadjm-Tehrani
Person information

- affiliation: Linköping University, Sweden
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j31]Fellipe Guilherme Rey de Souza
, Celso Massaki Hirata
, Simin Nadjm-Tehrani
:
Synthesis of a Controller Algorithm for Safety-Critical Systems. IEEE Access 10: 76351-76375 (2022) - [i7]Alvaro A. Cárdenas-Mora, Simin Nadjm-Tehrani, Edgar R. Weippl, Matthias Eckhart:
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171). Dagstuhl Reports 12(4): 54-71 (2022) - 2021
- [j30]Rodrigo Saar de Moraes, Simin Nadjm-Tehrani
:
Abstraction models for verifying resource adequacy of IMA systems at concept level. Sci. Comput. Program. 208: 102654 (2021) - [j29]Carlos Garcia Cordero, Emmanouil Vasilomanolakis
, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection. ACM Trans. Priv. Secur. 24(2): 8:1-8:39 (2021) - [c89]Rodrigo Saar de Moraes, Simona Bernardi, Simin Nadjm-Tehrani:
A model-based approach for analysing network communication timeliness in IMA systems at concept level. RTNS 2021: 78-88 - [e2]Mikael Asplund
, Simin Nadjm-Tehrani
:
Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings. Lecture Notes in Computer Science 12556, Springer 2021, ISBN 978-3-030-70851-1 [contents] - [i6]John Törnblom, Simin Nadjm-Tehrani:
Scaling up Memory-Efficient Formal Verification Tools for Tree Ensembles. CoRR abs/2105.02595 (2021) - 2020
- [j28]Sara Bergman, Mikael Asplund
, Simin Nadjm-Tehrani
:
Permissioned blockchains and distributed databases: A performance study. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j27]Klervie Toczé
, Johan Lindqvist, Simin Nadjm-Tehrani:
Characterization and modeling of an edge computing mixed reality workload. J. Cloud Comput. 9: 46 (2020) - [j26]Tobias Sund, Claes Lööf, Simin Nadjm-Tehrani, Mikael Asplund:
Blockchain-based event processing in supply chains - A case study at IKEA. Robotics Comput. Integr. Manuf. 65: 101971 (2020) - [j25]John Törnblom
, Simin Nadjm-Tehrani:
Formal verification of input-output mappings of tree ensembles. Sci. Comput. Program. 194: 102450 (2020) - [j24]Antonio Augusto da Fontoura
, Francisco Assis Moreira do Nascimento
, Simin Nadjm-Tehrani
, Edison Pignaton de Freitas
:
Timing Assurance of Avionic Reconfiguration Schemes Using Formal Analysis. IEEE Trans. Aerosp. Electron. Syst. 56(1): 95-106 (2020) - [c88]Chih-Yuan Lin, Simin Nadjm-Tehrani:
A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. CPS4CIP 2020: 207-223 - [e1]Simin Nadjm-Tehrani
:
Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23-25, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11777, Springer 2020, ISBN 978-3-030-37669-7 [contents]
2010 – 2019
- 2019
- [j23]Daniel Patrick Pereira, Celso M. Hirata, Simin Nadjm-Tehrani:
A STAMP-based ontology approach to support safety and security analyses. J. Inf. Secur. Appl. 47: 302-319 (2019) - [c87]Rodrigo Saar de Moraes, Simin Nadjm-Tehrani:
Verifying Resource Adequacy of Networked IMA Systems at Concept Level. FTSCS 2019: 40-56 - [c86]Klervie Toczé
, Simin Nadjm-Tehrani:
ORCH: Distributed Orchestration Framework using Mobile Edge Devices. ICFEC 2019: 1-10 - [c85]Chih-Yuan Lin, Simin Nadjm-Tehrani:
Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. RAID 2019: 73-88 - [c84]Celso M. Hirata
, Simin Nadjm-Tehrani
:
Combining GSN and STPA for Safety Arguments. SAFECOMP Workshops 2019: 5-15 - [c83]John Törnblom
, Simin Nadjm-Tehrani:
An Abstraction-Refinement Approach to Formal Verification of Tree Ensembles. SAFECOMP Workshops 2019: 301-313 - [c82]Klervie Toczé
, Norbert Schmitt, Ivona Brandic, Atakan Aral
, Simin Nadjm-Tehrani:
Towards Edge Benchmarking: A Methodology for Characterizing Edge Workloads. FAS*W@SASO/ICAC 2019: 70-71 - [c81]Klervie Toczé
, Johan Lindqvist, Simin Nadjm-Tehrani:
Performance Study of Mixed Reality for Edge Computing. UCC 2019: 285-294 - [i5]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On generating network traffic datasets with synthetic attacks for intrusion detection. CoRR abs/1905.00304 (2019) - [i4]John Törnblom, Simin Nadjm-Tehrani:
Formal Verification of Input-Output Mappings of Tree Ensembles. CoRR abs/1905.04194 (2019) - 2018
- [j22]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Fault and timing analysis in critical multi-core systems: A survey with an avionics perspective. J. Syst. Archit. 87: 1-11 (2018) - [j21]Klervie Toczé
, Simin Nadjm-Tehrani
:
A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing. Wirel. Commun. Mob. Comput. 2018: 7476201:1-7476201:23 (2018) - [c80]Chih-Yuan Lin, Simin Nadjm-Tehrani:
Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks. CPSS@AsiaCCS 2018: 51-60 - [c79]Magnus Almgren
, Peter Andersson, Gunnar Björkman, Mathias Ekstedt, Jonas Hallberg, Simin Nadjm-Tehrani, Erik Westring:
RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper). CRITIS 2018: 219-225 - [c78]John Törnblom
, Simin Nadjm-Tehrani:
Formal Verification of Random Forests in Safety-Critical Applications. FTSCS 2018: 55-71 - [c77]Mikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani:
In-Store Payments Using Bitcoin. NTMS 2018: 1-6 - [i3]Klervie Toczé, Simin Nadjm-Tehrani:
A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing. CoRR abs/1801.05610 (2018) - 2017
- [c76]Klervie Toczé
, Simin Nadjm-Tehrani:
Where Resources Meet at the Edge. CIT 2017: 302-307 - [c75]Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund:
Timing-Based Anomaly Detection in SCADA Networks. CRITIS 2017: 48-59 - [c74]Daniel Patrick Pereira, Celso M. Hirata
, Rodrigo Pagliares, Simin Nadjm-Tehrani:
Towards Combined Safety and Security Constraints Analysis. SAFECOMP Workshops 2017: 70-80 - [c73]Jalil Boudjadar, Simin Nadjm-Tehrani:
Schedulability and Memory Interference Analysis of Multicore Preemptive Real-time Systems. ICPE 2017: 263-274 - 2016
- [j20]Mikael Asplund
, Simin Nadjm-Tehrani:
Attitudes and Perceptions of IoT Security in Critical Societal Services. IEEE Access 4: 2130-2138 (2016) - [j19]Oscar Somarriba Jarquín
, Urko Zurutuza
, Roberto Uribeetxeberria, Laurent Delosières, Simin Nadjm-Tehrani:
Detection and Visualization of Android Malware Behavior. J. Electr. Comput. Eng. 2016: 8034967:1-8034967:17 (2016) - [j18]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund:
Fairness and Incentive Considerations in Energy Apportionment Policies. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 2:1-2:29 (2016) - [c72]Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt:
Exploiting Bro for Intrusion Detection in a SCADA System. CPSS@AsiaCCS 2016: 44-51 - [c71]Jalil Boudjadar, Jin Hyun Kim, Simin Nadjm-Tehrani:
Performance-aware scheduling of multicore time-critical systems. MEMOCODE 2016: 105-114 - [c70]Klervie Toczé
, Maria Vasilevskaya, Patrik Sandahl, Simin Nadjm-Tehrani:
Maintainability of functional reactive programs in a telecom server software. SAC 2016: 2001-2003 - [c69]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Understanding Shared Memory Bank Access Interference in Multi-Core Avionics. WCET 2016: 12:1-12:11 - 2015
- [j17]Maria Vasilevskaya, Simin Nadjm-Tehrani:
Support for cross-domain composition of embedded systems using MARTE models. SIGBED Rev. 12(1): 37-45 (2015) - [c68]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform. ISSRE 2015: 153-160 - [c67]Mathias Almquist, Viktor Almquist, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Communication Energy Overhead of Mobiles Games. MobiGames@MobiSys 2015: 1-6 - [c66]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund:
Sharing the Cost of Lunch: Energy Apportionment Policies. Q2SWinet@MSWiM 2015: 91-97 - [c65]Maria Vasilevskaya, Simin Nadjm-Tehrani:
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design. SAFECOMP 2015: 347-361 - 2014
- [j16]Aruna Prem Bianzino, Mikael Asplund
, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Cooperative proxies: Optimally trading energy and quality of service in mobile devices. Comput. Networks 75: 297-312 (2014) - [j15]Maria Vasilevskaya, Linda Ariani Gunawan, Simin Nadjm-Tehrani, Peter Herrmann
:
Integrating security mechanisms into embedded systems by domain-specific modelling. Secur. Commun. Networks 7(12): 2815-2832 (2014) - [j14]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mihails Prihodko:
EnergyBox: Disclosing the wireless transmission energy cost for mobile devices. Sustain. Comput. Informatics Syst. 4(2): 118-135 (2014) - [c64]Maria Vasilevskaya, Simin Nadjm-Tehrani:
Model-Based Security Risk Analysis for Networked Embedded Systems. CRITIS 2014: 381-386 - [c63]Ekhiotz Jon Vergara, Simon Andersson, Simin Nadjm-Tehrani:
When mice consume like elephants: instant messaging applications. e-Energy 2014: 97-107 - [c62]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Challenges in Future Avionic Systems on Multi-Core Platforms. ISSRE Workshops 2014: 115-119 - [c61]Javier Marian Santos, Simin Nadjm-Tehrani, Aruna Prem Bianzino:
Monkey Gamer: Automatic profiling of Android games. MobiCASE 2014: 125-132 - [i2]Mikael Asplund, Simin Nadjm-Tehrani:
Modelling Correlated Mobility. CoRR abs/1409.6431 (2014) - 2013
- [j13]Gabriel Sandulescu, Péter Schaffer, Simin Nadjm-Tehrani:
Exploiting resource heterogeneity in delay-tolerant networks. Wirel. Commun. Mob. Comput. 13(3): 230-243 (2013) - [c60]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
EnergyBox: A Trace-Driven Tool for Data Transmission Energy Consumption Studies. EE-LSDS 2013: 19-34 - [c59]Ekhiotz Jon Vergara, Mihails Prihodko, Simin Nadjm-Tehrani:
Mobile location sharing: an energy consumption study. e-Energy 2013: 289-290 - [c58]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Watts2Share: Energy-Aware Traffic Consolidation. GreenCom/iThings/CPScom 2013: 14-22 - [c57]Ekhiotz Jon Vergara, Joseba Sanjuan, Simin Nadjm-Tehrani:
Kernel level energy-efficient 3G background traffic shaper for android smartphones. IWCMC 2013: 443-449 - 2012
- [j12]Erik Kuiper, Simin Nadjm-Tehrani, Di Yuan:
A framework for performance analysis of geographic delaytolerant routing. EURASIP J. Wirel. Commun. Netw. 2012: 184 (2012) - [j11]Mikael Asplund
, Simin Nadjm-Tehrani:
Worst-case latency of broadcast in intermittently connected networks. Int. J. Ad Hoc Ubiquitous Comput. 11(2/3): 125-138 (2012) - [j10]Jordi Cucurull, Mikael Asplund
, Simin Nadjm-Tehrani, Tiziano Santoro:
Surviving Attacks in Challenged Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 917-929 (2012) - [c56]Mikael Asplund
, Simin Nadjm-Tehrani:
Analysing Delay-Tolerant Networks with Correlated Mobility. ADHOC-NOW 2012: 83-97 - [c55]Massimiliano Raciti, Simin Nadjm-Tehrani:
Embedded Cyber-Physical Anomaly Detection in Smart Meters. CRITIS 2012: 34-45 - [c54]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Energy-aware cross-layer burst buffering for wireless communication. e-Energy 2012: 24 - [c53]Maria Vasilevskaya, Simin Nadjm-Tehrani, Linda Ariani Gunawan, Peter Herrmann
:
Security asset elicitation for collaborative models. MDsec@MoDELS 2012: 7 - [c52]Laurent Delosières, Simin Nadjm-Tehrani:
BATMAN store-and-forward: The best of the two worlds. PerCom Workshops 2012: 721-727 - [p3]Massimiliano Raciti, Jordi Cucurull, Simin Nadjm-Tehrani:
Anomaly Detection in Water Management Systems. Critical Infrastructure Protection 2012: 98-119 - 2011
- [j9]Erik Kuiper, Simin Nadjm-Tehrani:
Geographical Routing With Location Service in Intermittently Connected MANETs. IEEE Trans. Veh. Technol. 60(2): 592-604 (2011) - [c51]Iker Burguera, Urko Zurutuza
, Simin Nadjm-Tehrani:
Crowdroid: behavior-based malware detection system for Android. SPSM@CCS 2011: 15-26 - [c50]Simin Nadjm-Tehrani, Maria Vasilevskaya:
Towards a Security Domain Model for Embedded Systems. HASE 2011: 180-181 - [c49]Erik Kuiper, Simin Nadjm-Tehrani:
Predicting the performance of geographic delay-tolerant routing. MILCOM 2011: 1003-1008 - [c48]Mikael Asplund
, Anton Thomasson, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Software-related energy footprint of a wireless broadband module. MOBIWAC 2011: 75-82 - [c47]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund
, Urko Zurutuza
:
Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms. NGMAST 2011: 154-160 - [c46]Jordi Cucurull, Simin Nadjm-Tehrani, Massimiliano Raciti:
Modular Anomaly Detection for Smartphone Ad Hoc Communication. NordSec 2011: 65-81 - [c45]Massimiliano Raciti, Jordi Cucurull, Simin Nadjm-Tehrani:
Energy-based adaptation in simulations of survivability of ad hoc communication. Wireless Days 2011: 1-7 - 2010
- [j8]Gabriel Sandulescu, Simin Nadjm-Tehrani:
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing. J. Commun. 5(2): 117-129 (2010) - [c44]Mikael Asplund, Trishan R. de Lanerolle, Christopher Fei, Prasanna Gautam, Ralph A. Morelli, Simin Nadjm-Tehrani, Gustav Nykvist:
Wireless ad hoc dissemination for search and rescue. ISCRAM 2010 - [c43]Jordi Cucurull, Mikael Asplund
, Simin Nadjm-Tehrani:
Anomaly Detection and Mitigation for Disaster Area Networks. RAID 2010: 339-359 - [c42]Gabriel Sandulescu, Péter Schaffer, Simin Nadjm-Tehrani:
Vicinity resource cartography for delay-tolerant networks: A holistic perspective. Wireless Days 2010: 1-7
2000 – 2009
- 2009
- [j7]Mikael Asplund
, Simin Nadjm-Tehrani, Klemen Zagar:
Middleware extensions that trade consistency for availability. Concurr. Comput. Pract. Exp. 21(9): 1181-1203 (2009) - [c41]Mikael Asplund
, Simin Nadjm-Tehrani:
A Partition-Tolerant Manycast Algorithm for Disaster Area Networks. SRDS 2009: 156-165 - [i1]Moisés Goldszmidt, Miroslaw Malek, Simin Nadjm-Tehrani, Priya Narasimhan, Felix Salfner, Paul A. S. Ward, John Wilkes:
Wheels within Wheels: Making Fault Management Cost-Effective. Self-Healing and Self-Adaptive Systems 2009 - 2008
- [j6]Calin Curescu, Simin Nadjm-Tehrani:
A Bidding Algorithm for Optimized Utility-Based Resource Allocation in Ad Hoc Networks. IEEE Trans. Mob. Comput. 7(12): 1397-1414 (2008) - [c40]Erik Kuiper, Simin Nadjm-Tehrani:
Geographical Routing in Intermittently Connected Ad Hoc Networks. AINA Workshops 2008: 1690-1695 - [c39]Gabriel Sandulescu, Simin Nadjm-Tehrani:
Opportunistic DTN routing with window-aware adaptive replication. AINTEC 2008: 103-112 - [c38]Mikael Asplund
, Simin Nadjm-Tehrani, Johan Sigholm:
Emerging Information Infrastructures: Cooperation in Disasters. CRITIS 2008: 258-270 - [c37]Jonas Elmqvist, Simin Nadjm-Tehrani:
Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems. DATE 2008: 921-927 - [c36]Jonas Elmqvist, Simin Nadjm-Tehrani:
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems. HASE 2008: 154-164 - 2007
- [j5]Kalle Burbeck, Simin Nadjm-Tehrani:
Adaptive real-time anomaly detection with incremental clustering. Inf. Secur. Tech. Rep. 12(1): 56-67 (2007) - [c35]Mikael Asplund
, Simin Nadjm-Tehrani, Stefan Beyer, Pablo Galdámez:
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints. DSN 2007: 656-665 - 2006
- [c34]Erik Kuiper, Simin Nadjm-Tehrani:
Mobility Models for UAV Group Reconnaissance Applications. ICWMC 2006: 33 - [c33]Marcel Lüthi
, Simin Nadjm-Tehrani, Calin Curescu:
Comparative study of price-based resource allocation algorithms for ad hoc networks. IPDPS 2006 - [c32]Mikael Asplund, Simin Nadjm-Tehrani:
Formalising Reconciliation in Partitionable Networks with Distributed Services. RODIN Book 2006: 37-58 - [c31]Mikael Asplund, Simin Nadjm-Tehrani:
Post-partition reconciliation protocols for maintaining consistency. SAC 2006: 710-717 - [c30]Jonas Elmqvist, Simin Nadjm-Tehrani:
Safety-Oriented Design of Component Assemblies using Safety Interfaces. FACS 2006: 57-72 - 2005
- [j4]Jerker Hammarberg, Simin Nadjm-Tehrani:
Formal verification of fault tolerance in safety-critical reconfigurable modules. Int. J. Softw. Tools Technol. Transf. 7(3): 268-279 (2005) - [j3]Calin Curescu, Simin Nadjm-Tehrani:
Time-Aware Utility-Based Resource Allocation in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 16(7): 624-636 (2005) - [c29]Diana Szentiványi, Simin Nadjm-Tehrani:
Configuring Fault-Tolerant Servers for Best Performance. DEXA Workshops 2005: 310-314 - [c28]Kristina Forsberg, Simin Nadjm-Tehrani, Jan Torin:
Fault Analysis of a Distributed Flight Control System. HICSS 2005 - [c27]Kalle Burbeck, Simin Nadjm-Tehrani:
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget. ICDCS Workshops 2005: 195-202 - [c26]Diana Szentiványi, Simin Nadjm-Tehrani, John M. Noble:
Optimal Choice of Checkpointing Interval for High Availability. PRDC 2005: 159-166 - [c25]Calin Curescu, Simin Nadjm-Tehrani, Bing Cao, Teresa A. Dahlberg:
Utility-based Adaptive Resource Allocation in Hybrid Wireless Networks. QSHINE 2005: 44 - [c24]Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea:
Safety Interfaces for Component-Based Systems. SAFECOMP 2005: 246-260 - [c23]Calin Curescu, Simin Nadjm-Tehrani:
Price/utility-based optimized resource allocation in wireless ad hoc networks. SECON 2005: 85-95 - [p2]Jonas Elmqvist, Simin Nadjm-Tehrani:
Intents and Upgrades in Component-Based High-Assurance Systems. Model-Driven Software Development 2005: 289-303 - [p1]Aleksandra Tesanovic, Simin Nadjm-Tehrani, Jörgen Hansson:
Modular Verification of Reconfigurable Components. Component-Based Software Development for Embedded Systems 2005: 59-81 - 2004
- [c22]Kalle Burbeck, Simin Nadjm-Tehrani:
ADWICE - Anomaly Detection with Real-Time Incremental Clustering. ICISC 2004: 407-424 - [c21]Kalle Burbeck, Daniel Garpe, Simin Nadjm-Tehrani:
Scale-up and performance studies of three agent platforms. IPCCC 2004: 857-863 - [c20]Diana Szentiványi, Simin Nadjm-Tehrani:
Aspects for Improvement of Performance in Fault-Tolerant Software. PRDC 2004: 283-291 - [c19]Mehdi Amirijoo, Aleksandra Tesanovic, Simin Nadjm-Tehrani:
Raising motivation in real-time laboratories: the soccer scenario. SIGCSE 2004: 265-269 - [c18]Tobias Chyssler, Simin Nadjm-Tehrani, Stefan Burschka, Kalle Burbeck:
Alarm Reduction and Correlation in Defence of IP Networks. WETICE 2004: 229-234 - 2003
- [c17]Calin Curescu, Simin Nadjm-Tehrani:
Time-Aware Utility-Based QoS Optimisation. ECRTS 2003: 83- - [c16]Jerker Hammarberg, Simin Nadjm-Tehrani:
Development of Safety-Critical Reconfigurable Hardware with Esterel. FMICS 2003: 219-234 - 2002
- [c15]Christoph W. Keßler, Simin Nadjm-Tehrani:
Mid-term course evaluations with muddy cards. ITiCSE 2002: 233 - [c14]Simin Nadjm-Tehrani, Kayvan Najarian, Calin Curescu, Tomas Lingvall, Teresa A. Dahlberg:
Adaptive load control algorithms for 3rd generation mobile networks. MSWiM 2002: 104-111 - 2001
- [c13]Erik Herzog, Peter Loborg, Simin Nadjm-Tehrani:
Real-time lab excercises: a teacher's dilemma. SIGCSE 2001: 273-277 - 2000
- [c12]