Home > Research > Browse

Results for Scheduling

Publications & Outputs

  1. A hyper-heuristic approach based upon a hidden Markov model for the multi-stage nurse rostering problem

    Kheiri, A., Gretsista, A., Keedwell, E., Lulli, G., Epitropakis, M. & Burke, E., 1/06/2021, In: Computers and Operations Research. 130, 14 p., 105221.

    Research output: Contribution to journalJournal articlepeer-review

  2. A Low-Latency Interference Coordinated Routing for Wireless Multi-hop Networks

    Cheng, J., Yang, P., Navaie, K., Ni, Q. & Yang, H., 15/03/2021, In: IEEE Sensors Journal. 21, 6, p. 8679 - 8690 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  3. Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment

    Liu, B., Xu, X., Qi, L., Ni, Q. & Dou, W., 1/03/2021, In: Journal of Systems Architecture. 114, 11 p., 101970.

    Research output: Contribution to journalJournal articlepeer-review

  4. Cross-Network Fusion and Scheduling for Heterogeneous Networks in Smart Factory

    Wan, J., Yang, J., Wang, S., Li, D., Li, P. & Xia, M., 1/09/2020, In: IEEE Transactions on Industrial Informatics. 16, 9, p. 6059-6068 10 p.

    Research output: Contribution to journalJournal articlepeer-review

  5. Energy Efficient Uplink Transmissions in LoRa Networks

    Su, B., Qin, Z. & Ni, Q., 1/08/2020, In: IEEE Transactions on Communications. 68, 8, p. 4960-4972 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  6. A cache-based approach toward improved scheduling in fog computing

    Khan, O. A., Malik, S. U. R., Baig, F. M., Islam, S. U., Pervaiz, H., Malik, H. & Ahmed, S. H., 12/04/2020, In: Software: Practice and Experience. 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  7. InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Hyper-heuristics

    Epitropakis, M. G. & Burke, E. K., 2018, Handbook of Heuristics. Springer International Publishing, Vol. 1-2. p. 489-545 57 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Scheduling an amateur cricket league over a 9-year period

    Wright, M. B., 2018, In: Journal of the Operational Research Society. 69, 11, p. 1854-1862 9 p.

    Research output: Contribution to journalJournal articlepeer-review

  11. Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

More results »