Since a number of years agent technology is considered one of the most innovative technologies for the development of distributed software systems. While not yet a mainstream appr...
Fabio Bellifemine, Giovanni Caire, Agostino Poggi,...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Current electronic system design requires to be concerned with power consumption consideration. However, in a lot of design tools, the application power consumption budget is esti...
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
Commercial-off-the-shelf (COTS) area array packaging technologies in high reliability versions are now being considered for applications, including use in a number of NASA electro...