To meet the high demand for powerful embedded processors, VLIW architectures are increasingly complex (e.g., multiple clusters), and moreover, they now run increasingly sophistica...
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Working as a usability professional in the open source arena is a challenging task. The decentralized and engineering-driven approach of open source projects can be at odds with c...
Currently there is a lack of explicit theories and few detailed guidelines to support the development of Mixed Reality (MR) technology and its varied applications. This research f...
This paper presents Deployment Factory, a modeldriven unified environment for deploying componentbased applications. While there are projects aiming to develop a unified deploymen...