Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Early performance analysis based on Queueing Network Models (QNM) has been often proposed to support software designers during the software development process. These approaches a...
In this paper we present the design of an environment that offers personalized, ubiquitous information services in the emerging integrated world of the digital-TV and the Internet....
Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Papp...