Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Safe Cooperating Cyber-Physical Systems using Wireless Communication

Risultati finali

D5.10 Evaluation of the SafeCOP approach as shown by the demonstrators - Final evaluation

Evaluation of the SafeCOP approach as shown by the demonstrators- Final evaluation

D2.4 Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

D6.2 Dissemination, exploitation and certification report year 1

Dissemination, exploitation and certification report year 1

D6.3 Dissemination, exploitation and certification report year 2

Dissemination, exploitation and certification report year 2

D2.2 Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

D1.1 Requirements and Evaluation Metrics Baseline

Requirements and Evaluation Metrics Baseline

D3.1 State of the art. Report on Task 3.1 on communication protocols

State of the art. Report on Task 3.1 on communication protocols

D2.1 State of the art report (R, PU, M6)

State of the art report (R, PU, M6)

D3.4 Report on T3.4 on distributed cooperation techniques for use case defined in WP3

Report on T3.4 on distributed cooperation techniques for use case defined in WP3

D5.9 Evaluation of the SafeCOP approach as shown by the demonstrators - concept and methodology

Evaluation of the SafeCOP approach as shown by the demonstrators- concept and methodology

D3.3 Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

D3.2 Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

D2.3 Report on mitigation of security threats that may jeopardize safety

Report on mitigation of security threats that may jeopardize safety

D6.4 Final dissemination, exploitation and certification report

Final dissemination, exploitation and certification report

D4.1 Report on SafeCOP Platform architecture, methods and runtime mechanisms

Report on SafeCOP Platform architecture, methods and runtime mechanisms

D4.3 Prototype simulation tools

Prototype simulation tools

D4.2 Prototype runtime mechanisms

Prototype runtime mechanisms

D5.1 Cooperative hospital bed mover demonstrated in lab setting

Cooperative hospital bed mover demonstrated in lab setting

D4.4 Prototype validation and verification tools

Prototype validation and verification tools

Pubblicazioni

The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

Autori: Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Pubblicato in: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Pagina/e 532-538, ISBN 978-1-5090-2817-7
Editore: IEEE
DOI: 10.1109/DSD.2016.25

Communication middleware technologies for industrial distributed control systems: A literature review

Autori: Ali Balador, Nielas Ericsson, Zeinab Bakhshi
Pubblicato in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Pagina/e 1-6, ISBN 978-1-5090-6505-9
Editore: IEEE
DOI: 10.1109/ETFA.2017.8247730

A Reliable Token-Based MAC Protocol for Delay Sensitive Platooning Applications

Autori: Ali Balador, Annette Bohm, Elisabeth Uhlemann, Carlos T. Calafate, Juan-Carlos Cano
Pubblicato in: 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015, Pagina/e 1-5, ISBN 978-1-4799-8091-8
Editore: IEEE
DOI: 10.1109/vtcfall.2015.7390813

Proactive attack: A strategy for legitimate eavesdropping

Autori: Hung Tran, Hans-Jurgen Zepernick
Pubblicato in: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016, Pagina/e 457-461, ISBN 978-1-5090-1801-7
Editore: IEEE
DOI: 10.1109/CCE.2016.7562679

Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol

Autori: Pablo Gutierrez Peon, Elisabeth Uhlemann, Wilfried Steiner, Mats Bjorkman
Pubblicato in: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Pagina/e 1-7, ISBN 978-1-5090-5932-4
Editore: IEEE
DOI: 10.1109/VTCSpring.2017.8108663

Systematic Maintenance of Safety Cases to Reduce Risk

Autori: Omar Jaradat, Iain Bate
Pubblicato in: 4th International Workshop on Assurance Cases for Software-intensive Systems, Numero 4, 2016, Pagina/e 17-29, ISBN 978-3-319-45480-1
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-45480-1_2

Simulation-Based Safety Testing Brake-by-Wire

Autori: Nils Mullner, Saifullah Khan, Md Habibur Rahman, Wasif Afzal, Mehrdad Saadatmand
Pubblicato in: 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017, Pagina/e 61-64, ISBN 978-1-5090-6676-6
Editore: IEEE
DOI: 10.1109/ICSTW.2017.17

A Token-Based MAC Protocol for Achieving High Reliability in VANET

Autori: Ali Balador
Pubblicato in: BMW Summer School 2016, 2016
Editore: BMW

Delay attack versus clock synchronization — A time chase

Autori: Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Pubblicato in: 2017 IEEE International Conference on Industrial Technology (ICIT), 2017, Pagina/e 1136-1141, ISBN 978-1-5090-5320-9
Editore: IEEE
DOI: 10.1109/ICIT.2017.7915522

Secrecy performance of cognitive cooperative industrial radio networks

Autori: Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc
Pubblicato in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Pagina/e 1-8, ISBN 978-1-5090-6505-9
Editore: IEEE
DOI: 10.1109/ETFA.2017.8247604

Configuration-aware Contracts

Autori: Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson
Pubblicato in: 4th International Workshop on Assurance Cases for Software-intensive Systems, Numero 4, 2016, Pagina/e 43-54, ISBN 978-3-319-45480-1
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-45480-1_4

Cooperative safety critical CPS platooning in SafeCOP

Autori: Samer Medawar, Detlef Scholle, Irfan Sljivo
Pubblicato in: 2017 6th Mediterranean Conference on Embedded Computing (MECO), 2017, Pagina/e 1-5, ISBN 978-1-5090-6742-8
Editore: IEEE
DOI: 10.1109/MECO.2017.7977210

Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases

Autori: Omar Tawffeeq Saleem Jaradat, Iain Bate
Pubblicato in: 2017 13th European Dependable Computing Conference (EDCC), 2017, Pagina/e 95-102, ISBN 978-1-5386-0602-5
Editore: IEEE
DOI: 10.1109/EDCC.2017.20

Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis

Autori: Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Pubblicato in: 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), 2017, Pagina/e 134-139, ISBN 978-1-5386-2113-4
Editore: IEEE
DOI: 10.1109/IINTEC.2017.8325927

Cognitive radio for improved reliability in a real-time wireless MAC protocol based on TDMA

Autori: Pablo Gutierrez Peon, Pedro Manuel Rodriguez, Zaloa Fernandez, Francisco Pozo, Elisabeth Uhlemann, Inaki Val, Wilfried Steiner
Pubblicato in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Pagina/e 1-8, ISBN 978-1-5090-6505-9
Editore: IEEE
DOI: 10.1109/ETFA.2017.8247602

Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers

Autori: Hung Tran, Truong Xuan Quach, Ha-Vu Tran, Elisabeth Uhlemann
Pubblicato in: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, Pagina/e 1-8, ISBN 978-1-5386-3531-5
Editore: IEEE
DOI: 10.1109/PIMRC.2017.8292734

A risk and threat assessment approaches overview in autonomous systems of systems

Autori: Aida Causevic
Pubblicato in: 2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT), 2017, Pagina/e 1-6, ISBN 978-1-5386-3337-3
Editore: IEEE
DOI: 10.1109/ICAT.2017.8171624

Clock synchronization considerations in security informed safety assurance of autonomous systems of systems

Autori: Elena Lisova, Aida Causevic, Elisabeth Uhlemann, Mats Bjorkman
Pubblicato in: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Pagina/e 8385-8390, ISBN 978-1-5386-1127-2
Editore: IEEE
DOI: 10.1109/IECON.2017.8217473

Contract-based assurance for wireless cooperative functions of vehicular systems

Autori: Svetlana Girs, Irfan Sljivo, Omar Jaradat
Pubblicato in: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Pagina/e 8391-8396, ISBN 978-1-5386-1127-2
Editore: IEEE
DOI: 10.1109/IECON.2017.8217474

Low Complexity Algorithm for Efficient Relay Assignment in Unicast/Broadcast Wireless Networks

Autori: Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Pubblicato in: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Pagina/e 1-6, ISBN 978-1-5090-5932-4
Editore: IEEE
DOI: 10.1109/VTCSpring.2017.8108261

Relaying with Packet Aggregation for Half-Duplex All-to-All Broadcast in Time-Critical Wireless Networks

Autori: Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Pubblicato in: 2017 IEEE Globecom Workshops (GC Wkshps), 2017, Pagina/e 1-6, ISBN 978-1-5386-3920-7
Editore: IEEE
DOI: 10.1109/GLOCOMW.2017.8269134

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Autori: Zeinab Bakhshi, Ali Balador, Jawad Mustafa
Pubblicato in: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018, Pagina/e 173-178, ISBN 978-1-5386-1154-8
Editore: IEEE
DOI: 10.1109/wcncw.2018.8368997

V2I Cooperation for Traffic Management with SafeCop

Autori: Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante
Pubblicato in: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Pagina/e 621-627, ISBN 978-1-5090-2817-7
Editore: IEEE
DOI: 10.1109/DSD.2016.18

An adaptive strategy to mitigate instability in the ETSI DCC: Experimental validation

Autori: Elena Cinque, Francesco Valentini, Alessio Iovine, Marco Pratesi
Pubblicato in: 2017 15th International Conference on ITS Telecommunications (ITST), 2017, Pagina/e 1-6, ISBN 978-1-5090-5275-2
Editore: IEEE
DOI: 10.1109/ITST.2017.7972223

Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e

Autori: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Pubblicato in: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), 2017, Pagina/e 1-9, ISBN 978-1-5090-5788-7
Editore: IEEE
DOI: 10.1109/WFCS.2017.7991967

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications

Autori: Xiaoming Wang, Kai Li, Salil S. Kanhere, Demin Li, Xiaolu Zhang, Eduardo Tovar
Pubblicato in: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017, Pagina/e 402-408, ISBN 978-1-5090-4372-9
Editore: IEEE
DOI: 10.1109/IWCMC.2017.7986320

Towards industry strength mapping of AUTOSAR automotive functionality on multicore architectures - work-in-progress

Autori: Cosmin Avasalcai, Dhanesh Budhrani, Paul Pop
Pubblicato in: Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion - CASES '17, 2017, Pagina/e 1-2, ISBN 9781-450351843
Editore: ACM Press
DOI: 10.1145/3125501.3125623

TinyWIDS - a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Autori: Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti
Pubblicato in: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Pagina/e 13-16, ISBN 9781-450363747
Editore: ACM Press
DOI: 10.1145/3178291.3178293

LCD: Low Latency Command Dissemination for a Platoon of Vehicles

Autori: Kai Li, Wei Ni, Eduardo Tovar, Mohsen Guizani
Pubblicato in: 2018 IEEE International Conference on Communications (ICC), 2018, Pagina/e 1-6, ISBN 978-1-5386-3180-5
Editore: IEEE
DOI: 10.1109/icc.2018.8422933

Analyzing hazards in system-of-systems: Described in a quarry site automation context

Autori: Stephan Baumgart, Joakim Froberg, Sasikumar Punnekkat
Pubblicato in: 2017 Annual IEEE International Systems Conference (SysCon), 2017, Pagina/e 1-8, ISBN 978-1-5090-4623-2
Editore: IEEE
DOI: 10.1109/SYSCON.2017.7934783

Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project

Autori: Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli
Pubblicato in: 2016 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS), 2016, Pagina/e 320-327, ISBN 978-1-5090-3076-7
Editore: IEEE
DOI: 10.1109/SAMOS.2016.7818365

Side-channel security of superscalar CPUs - evaluating the impact of micro-architectural features

Autori: Alessandro Barenghi, Gerardo Pelosi
Pubblicato in: Proceedings of the 55th Annual Design Automation Conference on - DAC '18, 2018, Pagina/e 1-6, ISBN 9781-450357005
Editore: ACM Press
DOI: 10.1145/3195970.3196112

LabSMILING: A SaaS Framework, Composed of a Number of Remotely Accessible Testbeds and Related SW Tools, for Analysis, Design and Management of Low Data-Rate Wireless Personal Area Networks Based on IEEE 802.15.4

Autori: Carlo Centofanti, Luigi Pomante, Marco Santic
Pubblicato in: 2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019, Pagina/e 1-5, ISBN 978-1-7281-1740-9
Editore: IEEE
DOI: 10.1109/meco.2019.8760282

An industrial survey on the influence of process and product attributes on software product reliability

Autori: Joshi Sanjay L, Bharat M. Deshpande, Sasikumar Punnekkat
Pubblicato in: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, Pagina/e 44-51, ISBN 978-1-5090-6590-5
Editore: IEEE
DOI: 10.1109/netact.2017.8076739

Identification of safety regions in vehicle platooning via machine learning

Autori: Alessandro Fermi, Maurizio Mongelli, Marco Muselli, Enrico Ferrari
Pubblicato in: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 2018, Pagina/e 1-4, ISBN 978-1-5386-1066-4
Editore: IEEE
DOI: 10.1109/wfcs.2018.8402372

ITS-enabled advanced road weather services and infrastructures for vehicle winter testing, professional traffic fleets and future automated driving

Autori: Timo Sukuvaara, Kari Mäenpää, Daria Stepanova, Sakari Kantomaa and Virve Karsisto
Pubblicato in: 2018
Editore: 25th ITS World Congress

Towards Intelligent Real-Time Road Weather Services Utilizing Mobile Vehicular Data

Autori: Virve Karsisto, Pertti Nurmi, Timo Sukuvaara and Kari Mäenpää
Pubblicato in: 2017
Editore: 12th ITS European Congress

TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Autori: Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti,
Pubblicato in: 2018
Editore: Fifth Workshop on Cryptography and Security in Computing Systems (CS2)

Interfacing a Brake-by-Wire Simulink Model with SUMO

Autori: Erik Martin Campana, Nils Mullner, Saad Mubeen
Pubblicato in: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, Pagina/e 1-6, ISBN 978-1-5386-6477-3
Editore: IEEE
DOI: 10.1109/iconic.2018.8601239

Learning-based testing for autonomous systems using spatial and temporal requirements

Autori: Hojat Khosrowjerdi, Karl Meinke
Pubblicato in: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis - MASES 2018, 2018, Pagina/e 6-15, ISBN 9781-450359726
Editore: ACM Press
DOI: 10.1145/3243127.3243129

Probabilistic Communication in Car Platoons

Autori: Tam Ninh Thi Thanh, Tran Hung, Nils Müllner
Pubblicato in: 2018
Editore: International Conference on Advanced Technologies for Communications (ATC)

A Safety-Centric Change Management Framework by Tailoring Agile and V-Model Processes

Autori: Omar Jaradat, Abdallah Salameh
Pubblicato in: 2018
Editore: 36th International System Safety Conference (ISSC 2018)

Using Safety Contracts to Verify Design Assumptions During Runtime

Autori: Omar Jaradat, Sasikumar Punnekkat
Pubblicato in: 2018
Editore: 23rd International Conference on Reliable Software Technologies – Ada-Europe 2018 (Ada-Europe-2018)

A Business Model for selling components with safety certificates

Autori: Carl Bergenhem, Daniel Skarin, Fabian Ström
Pubblicato in: 2018
Editore: Safety-Critical Systems Club seminar on: COTS, Legacy and Reuse

A reliable token-based MAC protocol for V2V communication in urban VANET

Autori: Ali Balador, Annette Bohm, Carlos T. Calafate, Juan-Carlos Cano
Pubblicato in: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, Pagina/e 1-6, ISBN 978-1-5090-3254-9
Editore: IEEE
DOI: 10.1109/PIMRC.2016.7794823

Approaches for Facilities Layer Protocols for Platooning

Autori: Carl Bergenhem
Pubblicato in: 2015 IEEE 18th International Conference on Intelligent Transportation Systems, 2015, Pagina/e 1989-1994, ISBN 978-1-4673-6596-3
Editore: IEEE
DOI: 10.1109/itsc.2015.322

Safe cooperating cyber-physical systems using wireless communication: The SafeCOP approach

Autori: Paul Pop, Detlef Scholle, Irfan Šljivo, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Pubblicato in: Microprocessors and Microsystems, Numero 53, 2017, Pagina/e 42-50, ISSN 0141-9331
Editore: Elsevier BV
DOI: 10.1016/j.micpro.2017.07.003

Scheduling for Source Relaying With Packet Aggregation in Industrial Wireless Networks

Autori: Svetlana Girs, Andreas Willig, Elisabeth Uhlemann, Mats Bjorkman
Pubblicato in: IEEE Transactions on Industrial Informatics, Numero 12/5, 2016, Pagina/e 1855-1864, ISSN 1551-3203
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2016.2535393

Practical 3-D Beam Pattern Based Channel Modeling for Multi-Polarized Massive MIMO Systems

Autori: Saeid Aghaeinezhadfirouzja, Hui Liu, Ali Balador
Pubblicato in: Sensors, Numero 18/4, 2018, Pagina/e 1186, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18041186

Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

Autori: Ali Balador, Elisabeth Uhlemann, Carlos Calafate, Juan-Carlos Cano
Pubblicato in: Sensors, Numero 18/4, 2018, Pagina/e 955, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18040955

Three-Step Two-Way Decode and Forward Relay With Energy Harvesting

Autori: Nguyen Thi Phuoc Van, Syed Faraz Hasan, Xiang Gui, Subhas Mukhopadhyay, Hung Tran
Pubblicato in: IEEE Communications Letters, Numero 21/4, 2017, Pagina/e 857-860, ISSN 1089-7798
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/LCOMM.2016.2637891

RF energy harvesting: an analysis of wireless sensor networks for reliable communication

Autori: Hung Tran, Johan Åkerberg, Mats Björkman, Ha-Vu Tran
Pubblicato in: Wireless Networks, 2017, ISSN 1022-0038
Editore: Baltzer Science Publishers B.V.
DOI: 10.1007/s11276-017-1546-6

A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios

Autori: Saifullah Khan, Muhammad Alam, Martin Fränzle, Nils Müllner, Yuanfang Chen
Pubblicato in: Computers & Electrical Engineering, Numero 68, 2018, Pagina/e 447-462, ISSN 0045-7906
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2018.04.017

IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation

Autori: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Pubblicato in: IEEE Communications Surveys & Tutorials, 2018, Pagina/e 1-1, ISSN 1553-877X
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/COMST.2018.2800898

A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks

Autori: Amirhossein Moravejosharieh, Jaime Lloret
Pubblicato in: International Journal of Communication Systems, Numero 29/7, 2016, Pagina/e 1269-1292, ISSN 1074-5351
Editore: John Wiley & Sons Inc.
DOI: 10.1002/dac.3098

Vehicular networking and road weather related research in Sodankylä

Autori: T. Sukuvaara, K. Mäenpää, R. Ylitalo
Pubblicato in: Geoscientific Instrumentation, Methods and Data Systems Discussions, 2016, Pagina/e 1-23, ISSN 2193-0872
Editore: Copernicus Publications on behalf of the European Geosciences Union
DOI: 10.5194/gi-2015-23

Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

Autori: Ali Balador, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, Jing Xie, Luigi Pomante, Maurizio Mongelli, Pierluigi Pierini, Stig Petersen, Timo Sukuvaara
Pubblicato in: Sensors, Numero 18/11, 2018, Pagina/e 4075, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18114075

A density-based contention window control scheme for unicast communications in vehicular ad hoc networks

Autori: Ali Balador, Carlos Calafate, Juan Carlos Cano, Pietro Manzoni
Pubblicato in: International Journal of Ad Hoc and Ubiquitous Computing, Numero 24/1/2, 2017, Pagina/e 65, ISSN 1743-8225
Editore: Inderscience Enterprises
DOI: 10.1504/ijahuc.2017.080913

Vehicular-networking- and road-weather-related research in Sodankylä

Autori: Timo Sukuvaara, Kari Mäenpää, Riika Ylitalo
Pubblicato in: Geoscientific Instrumentation, Methods and Data Systems, Numero 5/2, 2016, Pagina/e 513-520, ISSN 2193-0864
Editore: Copernicus Publications
DOI: 10.5194/gi-5-513-2016

Cognitive radio network with secrecy and interference constraints

Autori: Hung Tran, Georges Kaddoum, François Gagnon, Louis Sibomana
Pubblicato in: Physical Communication, Numero 22, 2017, Pagina/e 32-41, ISSN 1874-4907
Editore: Elsevier BV
DOI: 10.1016/j.phycom.2016.12.001

Machine Learning for Dynamic Software Analysis: Potentials and Limits

Autori: Amel Bennaceur, Dimitra Giannakopoulou, Reiner Hähnle, Karl Meinke
Pubblicato in: Dagstuhl Reports, Numero 4, 2016, Pagina/e 161-173, ISSN 2192-5283
Editore: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/dagrep.6.4.161

DynaMO—Dynamic Multisuperframe Tuning for Adaptive IEEE 802.15.4e DSME Networks

Autori: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Pubblicato in: IEEE Access, Numero 7, 2019, Pagina/e 122522-122535, ISSN 2169-3536
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2019.2937952

CO-CPS: A sample XSTAMPP usage in V2I traffic management scenario based on STAMP model

Autori: Leonardo Napoletani
Pubblicato in: 5th Scandinavian Conference on SYSTEM & SOFTWARE SAFETY, 2017
Editore: ICES

Functional Safety and Evolvable Architectures for Autonomy

Autori: Rolf Johansson, Jonas Nilsson, Carl Bergenhem, Sagar Behere, Jörgen Tryggvesson, Stig Ursing, Andreas Söderberg, Martin Törngren, Fredrik Warg
Pubblicato in: Automated Driving - Automated Driving Safer and More Efficient Future Driving, Numero Book, 2017, Pagina/e 547-560
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-31895-0_25

Learning-Based Testing of Cyber-Physical Systems-of-Systems: A Platooning Study

Autori: Karl Meinke
Pubblicato in: 2017, Pagina/e 135-151
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-66583-2_9

Model-Based Safety and Assessment. Lecture Notes in Computer Science,

Autori: DeJiu Chen, Zhonghai Lu
Pubblicato in: 2017, Pagina/e 227-240
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-64119-5_15

Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation

Autori: Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson, Stefano Puri
Pubblicato in: Reliable Software Technologies – Ada-Europe 2018, Numero 10873, 2018, Pagina/e 19-33, ISBN 978-3-319-92431-1
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-92432-8_2

Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems

Autori: Falk Howar, Karl Meinke, Andreas Rausch
Pubblicato in: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, Numero 9953, 2016, Pagina/e 651-654, ISBN 978-3-319-47168-6
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-47169-3_50

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile