Abstract— This paper presents a framework for verifying compilation tools for parametrised hardware libraries with placement information. Such libraries are captured in Pebble, a...
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
- It is well known that TCP has performance problems when wireless links are involved in the end-to-end connection. This is due to the high bit error rate characterizing wireless l...
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Large-scale distributed environments, such as the Internet, achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In s...