Ubiquitous computing technologies offer the promise of extending the benefits of computing to workers who do not spend their time at a desktop environment. In this paper, we review...
John Sherry, Scott D. Mainwaring, Jenna Burrell, R...
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Embedded systems design requires the development of complex HW modules to cope with the most stringent timing constraints of the specifications. This implies the need to update an...
Polymorphous computer-based systems are systems in which the CPU architecture “morphs” or changes shape to meet the requirements of the application. Optimized and efficient de...
Brandon Eames, Ted Bapty, Ben Abbott, Sandeep Neem...
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...