Methodologies, techniques and tools that currently support the embedded systems (ESs) development process prove inadequate for today’s complex ESs. Adopted traditional architect...
Kleanthis C. Thamboulidis, George S. Doukas, Giann...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
Abstract--Research on congestion-control algorithms has traditionally focused more on performance than on robustness of the closed-loop system to changes in network conditions. As ...
This paper presents a Java service platform and hardware design for a handheld healthcare system that enables remote health monitoring using CDMA public wireless networks. Special...
Kil-Ho Ahn, Jae-Wan Park, Dong Ryeol Shin, Ji-Tae ...
the interconnection among the IP cores with all description levels This paper presents an automatic interconnection rectification (AIR)technique to correct the misplaced interconne...