Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...