Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
The evolution of wireless access technologies has led to a new era of Mobile Internet. Network mobility, which considers the mobility of an entire network, is particularly suitabl...
With the number of attacks on systems increasing, it is highly probable that sooner or later an intrusion will be successful. Not having to execute a complete shutdown in this sit...
Software product lines have already proven to be a successful methodology for building and maintaining a collection of similar software products, based on a common architecture. H...
Israel Herraiz, Gregorio Robles, Rafael Capilla, J...
As the effective limits of frequency and instruction level parallelism have been reached, the strategy of microprocessor vendors has changed to increase the number of processing ...
Geoffrey Blake, Ronald G. Dreslinski, Trevor N. Mu...