Component-based development has become a recognized technique for building large scale distributed applications. Although the maturity of this technique, there appears to be quite...
A system based on a hierarchical scheduler is a system in which the processor is shared between several collaborative schedulers. Such schedulers exist since 1960 and they are bec...
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
The principal objectives of next generation wireless communication are the delivery of higher data rate services including video, audio, data and voice signals with worldwide comp...
Modern embedded systems for image processing involve increasingly complex levels of functionality under real-time and resourcerelated constraints. As this complexity increases, th...