Works matching IS 16112776 AND DT 2016 AND VI 58 AND IP 6
Results: 7
Providing security on demand using invasive computing.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. 281, doi. 10.1515/itit-2016-0032
- By:
- Publication type:
- Article
Invasive computing.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. 263, doi. 10.1515/itit-2016-0043
- By:
- Publication type:
- Article
Providing fault tolerance through invasive computing.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. 309, doi. 10.1515/itit-2016-0022
- By:
- Publication type:
- Article
Dark silicon management: an integrated and coordinated cross-layer approach.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. 297, doi. 10.1515/itit-2016-0028
- By:
- Publication type:
- Article
Frontmatter.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. i, doi. 10.1515/itit-2016-frontmatter6
- Publication type:
- Article
Continuous elasticity: Design and operation of elastic systems.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. 329, doi. 10.1515/itit-2016-0020
- By:
- Publication type:
- Article
Invasive computing for timing-predictable stream processing on MPSoCs.
- Published in:
- IT: Information Technology, 2016, v. 58, n. 6, p. 267, doi. 10.1515/itit-2016-0021
- By:
- Publication type:
- Article