Login / Signup
Safe execution of untrusted applications on embedded network processors.
Herbert Bos
Bart Samwel
Mihai-Lucian Cristea
Kostas Anagnostakis
Published in:
Int. J. Embed. Syst. (2008)
Keyphrases
</>
computer networks
communication networks
wireless sensor networks
complex networks
third party
embedded processors
data flow
parallel execution
real time
parallel algorithm
network architecture
network resources
network topologies