In this paper we present an approach to the design optimization of faulttolerant embedded systems for safety-critical applications. Processes are statically scheduled and communic...
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Pe...
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
We consider a wireless multi-hop network with sources that are Poisson distributed and relays which are placed on the source-destination line. Given a combined TDMA/ALOHA MAC proto...
This paper is concerned with remote browsing of JPEG2000 compressed imagery. A potentially interactive client identifies a region and maximum resolution of interest. The server re...
— We consider an end-to-end approach of inferring network faults that manifest in multiple protocol layers, with an optimization goal of minimizing the expected cost of correctin...