Vincenzo Pii

Learn More
In recent years there has been a huge increase of personal and enterprise services relying on the interconnection of embedded devices, often called Machine-to-Machine (M2M) applications. Nowadays, components are interconnected through a custom and proprietary networking tier prohibiting their re-use across different applications. The closed design and use(More)
  • 1