Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Key challenges in the performance estimation of distributed real-time embedded (DRE) systems include the systematic measurement of coverage by simulations, and the automated gener...
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
Application specific systems have potential for customization of design with a view to achieve a better costperformance-power trade-off. Such customization requires extensive de...