Author of the publication

Romization: Early Deployment and Customization of Java Systems for Constrained Devices.

, , and . CASSIS, volume 3956 of Lecture Notes in Computer Science, page 57-76. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Energy Profiling of Connected Embedded Systems., , , and . NTMS, page 1-4. IEEE, (2016)Serving embedded content via web applications: model, design and experimentation., , and . EMSOFT, page 117-126. ACM, (2009)IoT Forensic: identification and classification of evidence in criminal investigations., , and . ARES, page 60:1-60:9. ACM, (2018)An object memory management solution for small devices with heterogeneous memories., and . WISES, page 227-237. IEEE, (2007)EE-CFI: Externalized Control Flow Integrity for Embedded Devices., , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 321-329. Springer, (2017)Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP Infrastructure., , , , and . CloudNet, page 27-35. IEEE, (2023)ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection Systems., , and . WiMob, page 84-91. IEEE, (2023)The Web of Things: Interconnecting Devices with High Usability and Performance., , and . ICESS, page 323-330. IEEE Computer Society, (2009)Nested compartmentalisation for constrained devices., , and . FiCloud, page 334-341. IEEE, (2021)Forensic analysis of IoT ecosystem., , and . FiCloud, page 115-122. IEEE, (2021)