Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
As technology progresses, we are seeing increasing numbers of small devices that have the capability to store, process and forward information in our everyday physical environment...
Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin...
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express intera...
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...