Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Abstract. Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resourc...
Dynamic loading of code is needed when rarely used code should be loaded on demand or when the code to be loaded is not known in advance. In distributed systems it can also be used...
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...