Current practice in the design of application software for high-performance embedded computing systems is characterized by long development times, lack of interoperability with ot...
Recent experiments have taken steps towards realizing the vision of extremely large wireless sensor networks, the largest of these being ExScal, in which we
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...