Research

Research Areas

Cloud Computing; Distributed Systems; Security and Privacy; Applied Cryptography; Networks.

Current PhD Students

Hongyi Bian, Md Anwar Hossen, Ming Liu, Trent Muhr, and Fatema Siddika.

Publications

  • Pinglan Liu and Wensheng Zhang, "Integrating Homomorphic Encryption and Trusted Execution Technology for Automonous and Confidential Model Refining in Cloud", IEEE International Conference on Cloud Computing (CLOUD), 2023. (Acceptance rate: 20.6%) 
  • Hongyi Bian, Wensheng Zhang, and Carl K. Chang, "Situ-Oracle: A Learning-based Situation Analysis Servicing Framework for BIoT Systems", IEEE International Conference on Software Services Engineering (SSE), 2023. (Best paper award)
  • Hongyi Bian, Rong N. Chang, Kumar Bhaskaran, Carl K. Chang, and Wensheng Zhang, "Distributed and Intelligent API Mediation Service for Enterprise-grade Hybrid-multicloud Computing", IEEE International Conference on Software Services Engineering (SSE), 2023.
  • Pinglan Liu and Wensheng Zhang, "Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference", IEEE International Conference on Cloud Computing (CLOUD), 2022. 
  • Trent Muhr and Wensheng Zhang, "Privacy-Preserving Detection of Poisoning Attacks in Federated Learning", Annual International Conference on Privacy, Security & Trust (PST), 2022. 
  • Chen-Yeou Yu, Wensheng Zhang and Carl K. Chang, "Edge-based Situ-aware Reinforcement Learning for Traffic Congestion Mitigation", IEEE International Smart Cities Conference, 2022. 
  • Pinglan Liu, Xiaojuan Ma and Wensheng Zhang, "Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing", International Conference on Cloud Computing, 2021.
  • Wensheng Zhang and Trent Muhr, "TEE-based Selective Testing of Local Workers in Federated Learning Systems", Annual International Conference on Privacy, Security & Trust (PST), 2021.
  • Wensheng Zhang, "A Practical Oblivious Cloud Storage System Based on TEE and Client Gateway", Annual International Conference on Privacy, Security & Trust (PST), 2021.
  • Pinglan Liu and Wensheng Zhang, "Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts," IEEE Conference on Communications and Network Security (CNS), Virtual, June 29 - July 1, 2020.
  • Qiumao Ma and Wensheng Zhang, "Efficient and Accountable Oblivious Cloud Storage with Three Servers," IEEE Conference on Communications and Network Security (CNS), Washington, D.C., June 10-12, 2019.
  • Qiumao Mao and Wensheng Zhang, "Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency", EAI Transactions on Security and Safety, 2019.
  • Wensheng Zhang and Chuang Wang, "LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices," International Conference on Network and System Security (NSS), Hongkong, September 27-29, 2018.
  • Qiumao Ma and Wensheng Zhang, "Towards Practical Protection of Data Access Pattern to Cloud Storage," IEEE Conference on Military Communications (MILCOM) Cyber Security Track, Los Angeles, CA, October 29-31, 2018.
  • Pinglan Liu and Wensheng Zhang, "A New Game Theoretic Scheme for Verifiable Cloud Computing," The 37th IEEE International Performance Computing and Communications Conference, Orlando, FL, November 17-19, 2018.
  • Hua Qin, Yang Peng, and Wensheng Zhang, "Vehicles on RFID: Error-Cognitive Vehicle Localization in GPS-less Environments," IEEE Transactions on Vehicular Technology, 2017.
  • Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, and Daji Qiao, "TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption," Future Internet special issue on Information Systems Security, 2017.
  • Keji Hu and Wensheng Zhang, "mPSI: Many-to-one Private Set Intersection," IEEE Cyber Security and Cloud Computing, New York, June 26-28, 2017.
  • Zi Li, Wensheng Zhang, Daji Qiao, and Yang Peng "Lifetime Balanced Data Aggregation for the Internet of Things," Elsevier Journal of Computers and Electrical Engineering, Volume 58, February, pages 244-264, 2017.
  • Yang Peng, Zi Li, Wensheng Zhang, and Daji Qiao, "A Lifetime-Balancing MAC Protocol under the End-to-End Delay Requirement," Journal of Communications and Networks, Volume 19, Issue 1, February, pages 51-64, 2017.
  • Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, and Daji Qiao, "TSKT-ORAM: A Two-Server K-ary Tree ORAM for Access Pattern Protection in Cloud Storage," IEEE Conference on Military Communications (MILCOM) Cyber Security Track, Baltimore, MD, November 1-3, 2016.
  • Qiumao Ma, Wensheng Zhang, and Jinsheng Zhang, "DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern," International Conference on Network and System Security (NSS), Taipei, September 28-30, 2016.
  • Qiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, and Daji Qiao, "SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage," IEEE Cyber Security and Cloud Computing, Beijing, June 25-27, 2016.
  • Yang Peng, Wensheng Zhang, and Daji Qiao "Charging and Routing Activity Scheduling to Prolong Sensor Network Lifetime" Invited Book Chapter, Wireless Power Transfer Algorithms and Applications in Ad hoc Communication Networks, 2016.
  • Yang Peng, Zi Li, Wensheng Zhang, and Daji Qiao, "Dynamic Sensing Scheduling to Prolong Network Lifetime under Practical Requirements," IEEE ICC 2016, Kuala Lumpur, Malaysia, May 23-27, 2016.
  • Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, and Daji Qiao, "MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption," IACR Cryptology ePrint Archive 2016: 882 (2016).
  • Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, and Daji Qiao, "SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage," IACR Cryptology ePrint Archive 2016: 256 (2016).
  • Jinsheng Zhang, Wensheng Zhang, and Daji Qiao, "MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services," IACR Cryptology ePrint Archive 2016: 73 (2016).
  • Jinsheng Zhang, Wensheng Zhang, and Daji Qiao, "GP-ORAM: A Generalized Partition ORAM," International Conference on Network and System Security (NSS), New York, November 3-5, 2015.
  • Jinsheng Zhang, Wensheng Zhang, and Daji Qiao, "S-ORAM: A Segmentation-based Oblivious RAM," ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4-6, 2014.
  • Zi Li, Yang Peng, Daji Qiao, and Wensheng Zhang, "Joint Charging and Rate Allocation for Utility Maximization in Sustainable Sensor Networks," IEEE International Conference on Sensing, Communications and Networking (SECON), Singapore, June 30-July 3, 2014.
  • Keji Hu and Wensheng Zhang, "Efficient Verification of Data Encryption on Cloud Servers," Annual International Conference on Privacy, Security and Trust (PST), Toronto, Canada, July 23-24, 2014.
  • Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, and Daji Qiao, "KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes," IACR Cryptology ePrint Archive 2014: 624(2014).
  • Zi Li, Yang Peng, Daji Qiao, and Wensheng Zhang, "Joint Aggregation and MAC Design to Prolong Sensor Network Lifetime", IEEE ICNP, Gottingen, Germany, October 7-11, 2013.
  • Yang Peng, Zi Li, Daji Qiao, and Wensheng Zhang, "I2C: A Holistic Approach to Prolong the Sensor Network Lifetime", IEEE INFOCOM, Turin, Italy, April 14-19, 2013.
  • Hua Qin and Wensheng Zhang, "ZigBee-assisted Power Saving Management for Mobile Devices", IEEE Transactions on Mobile Computing, 2013.
  • Hua Qin and Wensheng Zhang, "ZigBee-assisted Power Saving for More Efficient and Sustainable Ad Hoc Networks", IEEE Transactions on Wireless Communications, 2013.
  • Hua Qin and Wensheng Zhang, "ZigBee-Assisted Power Saving Management for Mobile Devices", IEEE MASS, Las Vegas, Nevada, October 8-11, 2012.
  • Yang Peng, Zi Li, Wensheng Zhang, and Daji Qiao, "LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks", International Conference on Wireless Algorithms Systems and Applications (WASA), Yellow Mountains, China, August 8 - 10, 2012.
  • Wensheng Zhang and Chuang Wang, "An Ad Hoc Group Signature Scheme for Accountable and Anonymous Accessed to Outsourced Data", International Conference on Applied Cryptography and Network Security (ACNS), Industry Track, Singapore, June 26-29, 2012.
  • Zi Li, Yang Peng, Daji Qiao, and Wensheng Zhang, "LBA: Lifetime Balanced Data Aggregation in Low Duty Cycle Sensor Networks", IEEE INFOCOM, Orlando, Florida, March 25-30, 2012.
  • Hua Qin, Yanfei Wang, and Wensheng Zhang, "ZigBee-Assisted WiFi Transmission for Multi-Interface Mobile Devices", Mobiquitous, Copenhagen, Denmark, December 6-8, 2011.
  • Zi Li, Yang Peng, Wensheng Zhang, and Daji Qiao, "J-RoC: a Joint Routing and Charging Scheme to Prolong Sensor Network Lifetime", IEEE ICNP, Vancouver, Canada, October 17-20, 2011. [Video Clip: A Mobile Wireless Charging Prototype]
  • Hua Qin, Xuejia Lu, Yanfei Wang, Guiling Wang, Wensheng Zhang, and Yaying Zhang, "Heterogeneity-aware Design for Automatic Detection of Problematic Road Conditions", IEEE MASS, Valencia, Spain, October 17-22, 2011.
  • Hua Qin and Wensheng Zhang, "Charging Scheduling with Minimal Waiting in a Network of Electric Vehicles and Charging Stations", ACM VANET, Las Vegas, September 23, 2011.
  • Ka Yang, Jinsheng Zhang, Wensheng Zhang, and Daji Qiao, "A Light-weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds", ESORICS, Leuven, Belgium, September 12-14, 2011.
  • Yang Peng, Zi Li, Daji Qiao, and Wensheng Zhang, "Delay-Bounded MAC with Minimal Idle Listening for Sensor Networks", IEEE INFOCOM, Shanghai, China, April 10-15, 2011.
  • Chuang Wang, Guiling Wang, Wensheng Zhang, and Taiming Feng, "Reconciling Privacy Preservation and Intrusion Detection in Sensory Data Aggregation", IEEE INFOCOM mini-conference, Shanghai, China, April 10-15, 2011.
  • Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang, and Wensheng Zhang, "Catching Packet Droppers and Modifiers in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, 2011.
  • Bin Tong, Guiling Wang, Wensheng Zhang, and Chuang Wang, "Node Reclamation and Replacement for Long-lived Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, 22(9):1550-1563, September, 2011.
  • Guiling Wang, Mary Jane Irwin, Haoying Fu, Piotr Berman, Wensheng Zhang, and Tom La Porta, "Optimizing Sensor Movement Planning for Energy Efficiency", ACM Transactions on Sensor Networks, 7(4):33, 2011.
  • Jie Tian, Guiling Wang, Yan Tan, and Wensheng Zhang, "A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks", Journal of Ad Hoc & Sensor Wireless Networks, 11(3-4): 245-264, 2011.
  • Yang Peng, Zi Li, Wensheng Zhang, and Daji Qiao, "Prolonging Sensor Network Lifetime Through Wireless Charging", IEEE Real-Time Systems Symposium (RTSS), San Diego, CA, November 30 - December 3, 2010.
  • Zi Li, Yang Peng, Wensheng Zhang, and Daji Qiao, "Study of Joint Routing and Wireless Charging Strategies in Sensor Networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA), Beijing, China, August 15 - 17, 2010.
  • Bin Tong, Zi Li, Guiling Wang, and Wensheng Zhang, "How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing", IEEE ICDCS, Genoa, Italy, June 21 - 25, 2010.
  • Hua Qin, Zi Li, Yanfei Wang, Xuejia Lu, Guiling Wang, and Wensheng Zhang, "An Integrated Network of Roadside Sensors and Vehicles for Driving Safety: Concept, Design and Experiments", IEEE PerCom, Mannheim, Germany, March 29 - April 2, 2010.
  • Bin Tong, Zi Li, Guiling Wang, and Wensheng Zhang, "Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks", IEEE INFOCOM, San Diego, CA, March 15-19, 2010.
  • Renita Machado, Wensheng Zhang, Guiling Wang, and Sirin Tekinay, "Coverage Properties of Clustered Wireless Sensor Networks", ACM Transactions on Sensor Networks, 7(2), 2010.
  • Renita Machado, Sirin Tekinay, Wensheng Zhang, and Guiling Wang, "Diffusion-based Approach to Deploying Wireless Sensor Networks", International Journal of Sensor Networks, Inderscience, 8(3/4), 2010.
  • Taiming Feng, Lu Ruan, and Wensheng Zhang, "Intelligent p-Cycle Protection for Dynamic Multicast Sessions in WDM Networks", Journal of Optical Communications and Networking (co-published by IEEE/OSA), 2(7): 389-399, July 2010.
  • Bin Tong, Santosh Panchapakasan, and Wensheng Zhang, "A Three-Tier Framework for Intruder Information Sharing in Sensor Networks", Ad Hoc Networks, Elsevier, 8(3): 345-360, May 2010.
  • Bin Tong, Zi Li, Guiling Wang, and Wensheng Zhang, "On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-lived Sensor Networks", The Sixth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), November 23-26, 2009, Las Palmas de Gran Canaria, Spain.
  • Ka Yang, Nalin Subramanian, Daji Qiao, and Wensheng Zhang, "EagleVision: A Pervasive Mobile Device Protection System", The Sixth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Service (Mobiquitous), July 13-16, 2009, Toronto, Canada.
  • Bin Tong, Guiling Wang, Wensheng Zhang, and Chuang Wang, "Node Reclamation and Replacement for Long-lived Sensor Networks", IEEE SECON, June 22-25, 2009, Rome, Italy.
  • Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang, and Wensheng Zhang, "Catching Packet Droppers and Modifiers in Wireless Sensor Networks", IEEE SECON, June 22-25, 2009, Rome, Italy.
  • Nalin Subramanian, Ka Yang, Wensheng Zhang, and Daji Qiao, "ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query", IEEE INFOCOM, April 19-25, 2009, Rio de Janeiro, Brazil.
  • Wensheng Zhang, Sencun Zhu, Guohong Cao, "Predistribution and local collaboration-based group rekeying for wireless sensor networks", Ad Hoc Networks, Elsevier 7(6): 1229-1242, 2009.
  • Min Shao, Sencun Zhu, Wensheng Zhang, and Guohong Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks", IEEE Transactions on Mobile Computing, 8(8): 1023-1038, 2009.
  • Bin Tong, Santosh Panchapakesan, and Wensheng Zhang, "A Three-Tier Framework for Intruder Information Sharing in Sensor Networks ", IEEE SECON, June 16-20, 2008, San Francisco, CA.
  • Taiming Feng, Chuang Wang, Wensheng Zhang, and Lu Ruan, "Confidentiality Protection Schemes for Data Aggregation in Sensor Networks" , IEEE INFOCOM, April 15-17, 2008, Phoenix, AZ.
  • Guanqun Yang, Bin Tong, Daji Qiao, and Wensheng Zhang, "Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks" , IEEE INFOCOM mini-conference, April 14, 2008, Phoenix, AZ.
  • Youssef Hanna, Hridesh Rajan, and Wensheng Zhang, "Slede: A Domain-Specific Verification Framework for Sensor Network Security Protocol Implementations" , ACM WiSec, March 31 - April 2, Alexandria, VA.
  • Wensheng Zhang, Chuang Wang, and Taiming Feng, "GP2S:  Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data", concise contribution, IEEE PerCom, March 17-21, 2008, Hong Kong, P.R.C.
  • Hui Song, Sencun Zhu, Wensheng Zhang, and Guohong Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks", ACM Transactions on Sensor Networks, 4(4), 2008
  • Wensheng Zhang and Guohong Cao, "Defending Against Cache Consistency Attacks in Wireless Ad Hoc Networks", Ad Hoc Networks, Elsevier, 6(3): 363-379, 2008.
  • Wensheng Zhang, Minh Tran, Sencun Zhu, and Guohong Cao. A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks. ACM Mobihoc, September, 2007. (Attacks to the design have been found by Albrecht et al. [ in detail ].)
  • Jianming Zhou, Wensheng Zhang, and Daji Qiao, "Protecting Storage Location Privacy in Sensor Networks" , International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine) 2007, August 14-17, Vancouver, British Columbia, Canada.
  • Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang and Johnny Wong, "Specification Synthesis for Monitoring and Analysis of MANET Protocols" , International Symposium on Frontiers in Networking with Applications (FINA) 2007, May 21-23, Niagara Falls, ON, Canada.
  • Min Shao, Sencun Zhu, Wensheng Zhang, and Guohong Cao,   "pDCS: Security and Privacy Support for Data-Centric Sensor Networks", IEEE INFOCOM 2007, May 6-12, Anchorage, Alaska.
  • Nalin Subramanian, Chanjun Yang, and Wensheng Zhang, "Securing Distributed Data Storage and Retrieval in Sensor Networks" , IEEE International Conference on Pervasive Computing and Communications (PerCom) 2007, March 19-23, White Plains, NY.
  • Wensheng Zhang, Guohong Cao, and Tom La Porta, "Data Dissemination with Ring-Based Index for Wireless Sensor Networks", IEEE Transactions on Mobile Computing, 6 (7):832-847, July 2007.
  • Wensheng Zhang, Guohong Cao, and Tom La Porta, "Dynamic Proxy Tree-Based Data dissemination Scheme for Wireless Sensor Networks", ACM/Springer Wireless Networks Journal, 13:5, October 2007.
  • Nalin Subramanian, Chanjun Yang, and Wensheng Zhang, "Securing Distributed Data Storage and Retrieval in Sensor Networks", Pervasive and Mobile Computing Journal, Elsevier, November 2007.
  • Chanjun Yang, Jianming Zhou, Wensheng Zhang, and Johnny Wong,  “Pairwise Key Establishment for Large-Scale Sensor Networks: from Identifier-based to Location-Based,” First International Conference on Scalable Information Systems (INFOSCALE), Hong Kong, Invited, June 2006.
  • Chihao Huang, Hao Zhu, and Wensheng Zhang, "SAP: Seamless Authentication Protocol for Vertical Handoff in Heterogeneous Wireless Networks" , The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine), Ontario, Canada, August 2006.
  • Sencun Zhu and Wensheng Zhang, "Group Key Management", in Security in Sensor Networks (Editor: Yang Xiao), CRC Press, 2006.
  • Wensheng Zhang, Hui Song, Sencun Zhu, and Guohong Cao, " Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks ," ACM MOBIHOC, May 2005.
  • W. Zhang and G. Cao, "Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks," Mobiquitous, July 2005.
  • W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach,"  IEEE INFOCOM, March 2005.
  • G. Wang, G. Cao, T. La Porta, and W. Zhang, "Sensor Relocation in Mobile Sensor Networks,"  IEEE INFOCOM, March 2005.
  • W. Zhang and G. Cao, "Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks", IEEE INFOCOM, March 2004.
  • W. Zhang, L. Yin, and G. Cao, "Secure Cooperative Cache Based Data Access in Ad Hoc Networks,"  NSF Int'l Workshop on Theoretical and Algorithmic Aspects of Wireless Ad Hoc, Sensor, and Peer-to-Peer Networks, 2004
  • W. Zhang, G. Cao, and T. La Porta, "Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks,'' IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2004. 
  • W. Zhang and G. Cao, "DCTC: Dynamic Convoy Tree-Based Collaboration for Target Tracking in Sensor Networks", IEEE Transactions on Wireless Communications, September 2004.
  • G. Cao, W. Zhang, and H. Zhu, “Piconet and Scatternet management in Bluetooth”, in Wireless LANs and Bluetooth, Nova Science Publishers, 2004.
  • G. Cao, G. Wang, T. La Porta, S. Phoha, and W. Zhang, “Distributed Algorithms for Deploying Mobile Sensors”,  in Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, CRC Press, 2004.
  • W. Zhang, G. Cao, and T. La Porta, "Data Dissemination with Ring-Based Index for Wireless Sensor Networks," IEEE International Conference on Network Protocols (ICNP), November 2003. 
  • W. Zhang, R. Rao, G. Cao, and G. Kesidis, "Secure Routing in Ad Hoc Networks and a Related Intrusion Detection Problem," IEEE Military Communications Conference (MILCOM), October 2003.
  • G. Wang, W. Zhang, G. Cao, and T. La Porta, "On Supporting Distributed Collaboration in Sensor networks," IEEE Military Communications Conference (MILCOM), October 2003. 
  • W. Zhang and G. Cao, "A Flexible Scatternet-wide Scheduling Algorithm for Bluetooth Networks", 21st IEEE International Performance, Computing, and Communications Conference (IPCCC), April 2002.
  • W. Zhang, H. Zhu, and G. Cao, "Improving Bluetooth Network Performance Through A Time-slot Leasing Approach", IEEE Wireless Communications and Networking Conference (WCNC), March 2002 .
  • J. Hu, M. Kandemir, N. Vijaykrishnan, M. Irwin, H. Saputra, and W. Zhang, "Compiler-Directed Cache Polymorphism," ACM SIGPLAN Joint Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'02) and Software and Compilers for Embedded Systems (SCOPES'02), June 2002.