Wireless sensor networks are often used by experts in many different fields to gather data pertinent to their work. Although their expertise may not include software engineering, ...
Alan Dearle, Dharini Balasubramaniam, Jonathan Lew...
In the state-of-the-art hardware/software (HW/SW) codesign of embedded systems, there is a lack of sufficient support for architectural specifications across HW/SW boundaries. S...
Juncao Li, Nicholas T. Pilkington, Fei Xie, Qiang ...
We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations a...
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Software product lines have already proven to be a successful methodology for building and maintaining a collection of similar software products, based on a common architecture. H...
Israel Herraiz, Gregorio Robles, Rafael Capilla, J...