For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Incorporating Security Constraints into Mixed-Criticality Real-Time Scheduling
Hyeongboo BAEK Jinkyu LEE
IEICE TRANSACTIONS on Information and Systems
Full Text: PDF(1.4MB)