Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
This paper describes a series of experiments that were performed on the Rocky III robot.1 Rocky III is a small autonomous rover capable of navigating through rough outdoor terrain...
David P. Miller, Rajiv S. Desai, Erann Gat, Robert...
In IP-based wireless/mobile networks, minimizing handover latency is one of the most important issues. Fast handover mobile IPv6 (FMIPv6) reduces the handover latency by handover p...
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...