The diversity of applications and typically scarce node resources set very tight constraints to Wireless Sensor Networks (WSN). It is not possible to fulfill all requirements with...
In order to effectively validate the performance of software systems throughout their development cycle it is necessary to continuously build performance models from software mod...
In this work, we develop a partial evaluation technique for residuating functional logic programs, which generalize the concurrent computation models for logic programs with delays...
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...