High assurance in embedded system software is difficult to attain. Verification relies on testing. The unreliable and costly testing process is made much worse because the softwar...
Systems such as software transactional memory and some exception handling techniques use transactions. However, a typical limitation of such systems is that they do not allow syst...
Pen-based interfaces offer exciting opportunities in ubiquitous computing by enabling new hardware form factors and socially acceptable computing tasks. However, prevailing ink re...
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...
— Many applications of wireless sensor networks (WSNs) have emerged over the last few years. In such networks resource-constrained sensor nodes are deployed to probe their surrou...