Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Safe Cooperating Cyber-Physical Systems using Wireless Communication

Livrables

D5.10 Evaluation of the SafeCOP approach as shown by the demonstrators - Final evaluation

Evaluation of the SafeCOP approach as shown by the demonstrators- Final evaluation

D2.4 Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

D6.2 Dissemination, exploitation and certification report year 1

Dissemination, exploitation and certification report year 1

D6.3 Dissemination, exploitation and certification report year 2

Dissemination, exploitation and certification report year 2

D2.2 Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

D1.1 Requirements and Evaluation Metrics Baseline

Requirements and Evaluation Metrics Baseline

D3.1 State of the art. Report on Task 3.1 on communication protocols

State of the art. Report on Task 3.1 on communication protocols

D2.1 State of the art report (R, PU, M6)

State of the art report (R, PU, M6)

D3.4 Report on T3.4 on distributed cooperation techniques for use case defined in WP3

Report on T3.4 on distributed cooperation techniques for use case defined in WP3

D5.9 Evaluation of the SafeCOP approach as shown by the demonstrators - concept and methodology

Evaluation of the SafeCOP approach as shown by the demonstrators- concept and methodology

D3.3 Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

D3.2 Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

D2.3 Report on mitigation of security threats that may jeopardize safety

Report on mitigation of security threats that may jeopardize safety

D6.4 Final dissemination, exploitation and certification report

Final dissemination, exploitation and certification report

D4.1 Report on SafeCOP Platform architecture, methods and runtime mechanisms

Report on SafeCOP Platform architecture, methods and runtime mechanisms

D4.3 Prototype simulation tools

Prototype simulation tools

D4.2 Prototype runtime mechanisms

Prototype runtime mechanisms

D5.1 Cooperative hospital bed mover demonstrated in lab setting

Cooperative hospital bed mover demonstrated in lab setting

D4.4 Prototype validation and verification tools

Prototype validation and verification tools

Publications

The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

Auteurs: Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Publié dans: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 532-538, ISBN 978-1-5090-2817-7
Éditeur: IEEE
DOI: 10.1109/DSD.2016.25

Communication middleware technologies for industrial distributed control systems: A literature review

Auteurs: Ali Balador, Nielas Ericsson, Zeinab Bakhshi
Publié dans: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-6, ISBN 978-1-5090-6505-9
Éditeur: IEEE
DOI: 10.1109/ETFA.2017.8247730

A Reliable Token-Based MAC Protocol for Delay Sensitive Platooning Applications

Auteurs: Ali Balador, Annette Bohm, Elisabeth Uhlemann, Carlos T. Calafate, Juan-Carlos Cano
Publié dans: 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015, Page(s) 1-5, ISBN 978-1-4799-8091-8
Éditeur: IEEE
DOI: 10.1109/vtcfall.2015.7390813

Proactive attack: A strategy for legitimate eavesdropping

Auteurs: Hung Tran, Hans-Jurgen Zepernick
Publié dans: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016, Page(s) 457-461, ISBN 978-1-5090-1801-7
Éditeur: IEEE
DOI: 10.1109/CCE.2016.7562679

Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol

Auteurs: Pablo Gutierrez Peon, Elisabeth Uhlemann, Wilfried Steiner, Mats Bjorkman
Publié dans: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-7, ISBN 978-1-5090-5932-4
Éditeur: IEEE
DOI: 10.1109/VTCSpring.2017.8108663

Systematic Maintenance of Safety Cases to Reduce Risk

Auteurs: Omar Jaradat, Iain Bate
Publié dans: 4th International Workshop on Assurance Cases for Software-intensive Systems, Numéro 4, 2016, Page(s) 17-29, ISBN 978-3-319-45480-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-45480-1_2

Simulation-Based Safety Testing Brake-by-Wire

Auteurs: Nils Mullner, Saifullah Khan, Md Habibur Rahman, Wasif Afzal, Mehrdad Saadatmand
Publié dans: 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017, Page(s) 61-64, ISBN 978-1-5090-6676-6
Éditeur: IEEE
DOI: 10.1109/ICSTW.2017.17

A Token-Based MAC Protocol for Achieving High Reliability in VANET

Auteurs: Ali Balador
Publié dans: BMW Summer School 2016, 2016
Éditeur: BMW

Delay attack versus clock synchronization — A time chase

Auteurs: Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Publié dans: 2017 IEEE International Conference on Industrial Technology (ICIT), 2017, Page(s) 1136-1141, ISBN 978-1-5090-5320-9
Éditeur: IEEE
DOI: 10.1109/ICIT.2017.7915522

Secrecy performance of cognitive cooperative industrial radio networks

Auteurs: Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc
Publié dans: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8, ISBN 978-1-5090-6505-9
Éditeur: IEEE
DOI: 10.1109/ETFA.2017.8247604

Configuration-aware Contracts

Auteurs: Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson
Publié dans: 4th International Workshop on Assurance Cases for Software-intensive Systems, Numéro 4, 2016, Page(s) 43-54, ISBN 978-3-319-45480-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-45480-1_4

Cooperative safety critical CPS platooning in SafeCOP

Auteurs: Samer Medawar, Detlef Scholle, Irfan Sljivo
Publié dans: 2017 6th Mediterranean Conference on Embedded Computing (MECO), 2017, Page(s) 1-5, ISBN 978-1-5090-6742-8
Éditeur: IEEE
DOI: 10.1109/MECO.2017.7977210

Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases

Auteurs: Omar Tawffeeq Saleem Jaradat, Iain Bate
Publié dans: 2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 95-102, ISBN 978-1-5386-0602-5
Éditeur: IEEE
DOI: 10.1109/EDCC.2017.20

Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis

Auteurs: Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Publié dans: 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), 2017, Page(s) 134-139, ISBN 978-1-5386-2113-4
Éditeur: IEEE
DOI: 10.1109/IINTEC.2017.8325927

Cognitive radio for improved reliability in a real-time wireless MAC protocol based on TDMA

Auteurs: Pablo Gutierrez Peon, Pedro Manuel Rodriguez, Zaloa Fernandez, Francisco Pozo, Elisabeth Uhlemann, Inaki Val, Wilfried Steiner
Publié dans: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8, ISBN 978-1-5090-6505-9
Éditeur: IEEE
DOI: 10.1109/ETFA.2017.8247602

Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers

Auteurs: Hung Tran, Truong Xuan Quach, Ha-Vu Tran, Elisabeth Uhlemann
Publié dans: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, Page(s) 1-8, ISBN 978-1-5386-3531-5
Éditeur: IEEE
DOI: 10.1109/PIMRC.2017.8292734

A risk and threat assessment approaches overview in autonomous systems of systems

Auteurs: Aida Causevic
Publié dans: 2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT), 2017, Page(s) 1-6, ISBN 978-1-5386-3337-3
Éditeur: IEEE
DOI: 10.1109/ICAT.2017.8171624

Clock synchronization considerations in security informed safety assurance of autonomous systems of systems

Auteurs: Elena Lisova, Aida Causevic, Elisabeth Uhlemann, Mats Bjorkman
Publié dans: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8385-8390, ISBN 978-1-5386-1127-2
Éditeur: IEEE
DOI: 10.1109/IECON.2017.8217473

Contract-based assurance for wireless cooperative functions of vehicular systems

Auteurs: Svetlana Girs, Irfan Sljivo, Omar Jaradat
Publié dans: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8391-8396, ISBN 978-1-5386-1127-2
Éditeur: IEEE
DOI: 10.1109/IECON.2017.8217474

Low Complexity Algorithm for Efficient Relay Assignment in Unicast/Broadcast Wireless Networks

Auteurs: Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Publié dans: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-6, ISBN 978-1-5090-5932-4
Éditeur: IEEE
DOI: 10.1109/VTCSpring.2017.8108261

Relaying with Packet Aggregation for Half-Duplex All-to-All Broadcast in Time-Critical Wireless Networks

Auteurs: Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Publié dans: 2017 IEEE Globecom Workshops (GC Wkshps), 2017, Page(s) 1-6, ISBN 978-1-5386-3920-7
Éditeur: IEEE
DOI: 10.1109/GLOCOMW.2017.8269134

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Auteurs: Zeinab Bakhshi, Ali Balador, Jawad Mustafa
Publié dans: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018, Page(s) 173-178, ISBN 978-1-5386-1154-8
Éditeur: IEEE
DOI: 10.1109/wcncw.2018.8368997

V2I Cooperation for Traffic Management with SafeCop

Auteurs: Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante
Publié dans: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 621-627, ISBN 978-1-5090-2817-7
Éditeur: IEEE
DOI: 10.1109/DSD.2016.18

An adaptive strategy to mitigate instability in the ETSI DCC: Experimental validation

Auteurs: Elena Cinque, Francesco Valentini, Alessio Iovine, Marco Pratesi
Publié dans: 2017 15th International Conference on ITS Telecommunications (ITST), 2017, Page(s) 1-6, ISBN 978-1-5090-5275-2
Éditeur: IEEE
DOI: 10.1109/ITST.2017.7972223

Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e

Auteurs: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Publié dans: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), 2017, Page(s) 1-9, ISBN 978-1-5090-5788-7
Éditeur: IEEE
DOI: 10.1109/WFCS.2017.7991967

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications

Auteurs: Xiaoming Wang, Kai Li, Salil S. Kanhere, Demin Li, Xiaolu Zhang, Eduardo Tovar
Publié dans: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017, Page(s) 402-408, ISBN 978-1-5090-4372-9
Éditeur: IEEE
DOI: 10.1109/IWCMC.2017.7986320

Towards industry strength mapping of AUTOSAR automotive functionality on multicore architectures - work-in-progress

Auteurs: Cosmin Avasalcai, Dhanesh Budhrani, Paul Pop
Publié dans: Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion - CASES '17, 2017, Page(s) 1-2, ISBN 9781-450351843
Éditeur: ACM Press
DOI: 10.1145/3125501.3125623

TinyWIDS - a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Auteurs: Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti
Publié dans: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Page(s) 13-16, ISBN 9781-450363747
Éditeur: ACM Press
DOI: 10.1145/3178291.3178293

LCD: Low Latency Command Dissemination for a Platoon of Vehicles

Auteurs: Kai Li, Wei Ni, Eduardo Tovar, Mohsen Guizani
Publié dans: 2018 IEEE International Conference on Communications (ICC), 2018, Page(s) 1-6, ISBN 978-1-5386-3180-5
Éditeur: IEEE
DOI: 10.1109/icc.2018.8422933

Analyzing hazards in system-of-systems: Described in a quarry site automation context

Auteurs: Stephan Baumgart, Joakim Froberg, Sasikumar Punnekkat
Publié dans: 2017 Annual IEEE International Systems Conference (SysCon), 2017, Page(s) 1-8, ISBN 978-1-5090-4623-2
Éditeur: IEEE
DOI: 10.1109/SYSCON.2017.7934783

Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project

Auteurs: Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli
Publié dans: 2016 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS), 2016, Page(s) 320-327, ISBN 978-1-5090-3076-7
Éditeur: IEEE
DOI: 10.1109/SAMOS.2016.7818365

Side-channel security of superscalar CPUs - evaluating the impact of micro-architectural features

Auteurs: Alessandro Barenghi, Gerardo Pelosi
Publié dans: Proceedings of the 55th Annual Design Automation Conference on - DAC '18, 2018, Page(s) 1-6, ISBN 9781-450357005
Éditeur: ACM Press
DOI: 10.1145/3195970.3196112

LabSMILING: A SaaS Framework, Composed of a Number of Remotely Accessible Testbeds and Related SW Tools, for Analysis, Design and Management of Low Data-Rate Wireless Personal Area Networks Based on IEEE 802.15.4

Auteurs: Carlo Centofanti, Luigi Pomante, Marco Santic
Publié dans: 2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019, Page(s) 1-5, ISBN 978-1-7281-1740-9
Éditeur: IEEE
DOI: 10.1109/meco.2019.8760282

An industrial survey on the influence of process and product attributes on software product reliability

Auteurs: Joshi Sanjay L, Bharat M. Deshpande, Sasikumar Punnekkat
Publié dans: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, Page(s) 44-51, ISBN 978-1-5090-6590-5
Éditeur: IEEE
DOI: 10.1109/netact.2017.8076739

Identification of safety regions in vehicle platooning via machine learning

Auteurs: Alessandro Fermi, Maurizio Mongelli, Marco Muselli, Enrico Ferrari
Publié dans: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 2018, Page(s) 1-4, ISBN 978-1-5386-1066-4
Éditeur: IEEE
DOI: 10.1109/wfcs.2018.8402372

ITS-enabled advanced road weather services and infrastructures for vehicle winter testing, professional traffic fleets and future automated driving

Auteurs: Timo Sukuvaara, Kari Mäenpää, Daria Stepanova, Sakari Kantomaa and Virve Karsisto
Publié dans: 2018
Éditeur: 25th ITS World Congress

Towards Intelligent Real-Time Road Weather Services Utilizing Mobile Vehicular Data

Auteurs: Virve Karsisto, Pertti Nurmi, Timo Sukuvaara and Kari Mäenpää
Publié dans: 2017
Éditeur: 12th ITS European Congress

TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Auteurs: Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti,
Publié dans: 2018
Éditeur: Fifth Workshop on Cryptography and Security in Computing Systems (CS2)

Interfacing a Brake-by-Wire Simulink Model with SUMO

Auteurs: Erik Martin Campana, Nils Mullner, Saad Mubeen
Publié dans: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, Page(s) 1-6, ISBN 978-1-5386-6477-3
Éditeur: IEEE
DOI: 10.1109/iconic.2018.8601239

Learning-based testing for autonomous systems using spatial and temporal requirements

Auteurs: Hojat Khosrowjerdi, Karl Meinke
Publié dans: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis - MASES 2018, 2018, Page(s) 6-15, ISBN 9781-450359726
Éditeur: ACM Press
DOI: 10.1145/3243127.3243129

Probabilistic Communication in Car Platoons

Auteurs: Tam Ninh Thi Thanh, Tran Hung, Nils Müllner
Publié dans: 2018
Éditeur: International Conference on Advanced Technologies for Communications (ATC)

A Safety-Centric Change Management Framework by Tailoring Agile and V-Model Processes

Auteurs: Omar Jaradat, Abdallah Salameh
Publié dans: 2018
Éditeur: 36th International System Safety Conference (ISSC 2018)

Using Safety Contracts to Verify Design Assumptions During Runtime

Auteurs: Omar Jaradat, Sasikumar Punnekkat
Publié dans: 2018
Éditeur: 23rd International Conference on Reliable Software Technologies – Ada-Europe 2018 (Ada-Europe-2018)

A Business Model for selling components with safety certificates

Auteurs: Carl Bergenhem, Daniel Skarin, Fabian Ström
Publié dans: 2018
Éditeur: Safety-Critical Systems Club seminar on: COTS, Legacy and Reuse

A reliable token-based MAC protocol for V2V communication in urban VANET

Auteurs: Ali Balador, Annette Bohm, Carlos T. Calafate, Juan-Carlos Cano
Publié dans: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, Page(s) 1-6, ISBN 978-1-5090-3254-9
Éditeur: IEEE
DOI: 10.1109/PIMRC.2016.7794823

Approaches for Facilities Layer Protocols for Platooning

Auteurs: Carl Bergenhem
Publié dans: 2015 IEEE 18th International Conference on Intelligent Transportation Systems, 2015, Page(s) 1989-1994, ISBN 978-1-4673-6596-3
Éditeur: IEEE
DOI: 10.1109/itsc.2015.322

Safe cooperating cyber-physical systems using wireless communication: The SafeCOP approach

Auteurs: Paul Pop, Detlef Scholle, Irfan Šljivo, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Publié dans: Microprocessors and Microsystems, Numéro 53, 2017, Page(s) 42-50, ISSN 0141-9331
Éditeur: Elsevier BV
DOI: 10.1016/j.micpro.2017.07.003

Scheduling for Source Relaying With Packet Aggregation in Industrial Wireless Networks

Auteurs: Svetlana Girs, Andreas Willig, Elisabeth Uhlemann, Mats Bjorkman
Publié dans: IEEE Transactions on Industrial Informatics, Numéro 12/5, 2016, Page(s) 1855-1864, ISSN 1551-3203
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2016.2535393

Practical 3-D Beam Pattern Based Channel Modeling for Multi-Polarized Massive MIMO Systems

Auteurs: Saeid Aghaeinezhadfirouzja, Hui Liu, Ali Balador
Publié dans: Sensors, Numéro 18/4, 2018, Page(s) 1186, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18041186

Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

Auteurs: Ali Balador, Elisabeth Uhlemann, Carlos Calafate, Juan-Carlos Cano
Publié dans: Sensors, Numéro 18/4, 2018, Page(s) 955, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18040955

Three-Step Two-Way Decode and Forward Relay With Energy Harvesting

Auteurs: Nguyen Thi Phuoc Van, Syed Faraz Hasan, Xiang Gui, Subhas Mukhopadhyay, Hung Tran
Publié dans: IEEE Communications Letters, Numéro 21/4, 2017, Page(s) 857-860, ISSN 1089-7798
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/LCOMM.2016.2637891

RF energy harvesting: an analysis of wireless sensor networks for reliable communication

Auteurs: Hung Tran, Johan Åkerberg, Mats Björkman, Ha-Vu Tran
Publié dans: Wireless Networks, 2017, ISSN 1022-0038
Éditeur: Baltzer Science Publishers B.V.
DOI: 10.1007/s11276-017-1546-6

A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios

Auteurs: Saifullah Khan, Muhammad Alam, Martin Fränzle, Nils Müllner, Yuanfang Chen
Publié dans: Computers & Electrical Engineering, Numéro 68, 2018, Page(s) 447-462, ISSN 0045-7906
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2018.04.017

IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation

Auteurs: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Publié dans: IEEE Communications Surveys & Tutorials, 2018, Page(s) 1-1, ISSN 1553-877X
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/COMST.2018.2800898

A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks

Auteurs: Amirhossein Moravejosharieh, Jaime Lloret
Publié dans: International Journal of Communication Systems, Numéro 29/7, 2016, Page(s) 1269-1292, ISSN 1074-5351
Éditeur: John Wiley & Sons Inc.
DOI: 10.1002/dac.3098

Vehicular networking and road weather related research in Sodankylä

Auteurs: T. Sukuvaara, K. Mäenpää, R. Ylitalo
Publié dans: Geoscientific Instrumentation, Methods and Data Systems Discussions, 2016, Page(s) 1-23, ISSN 2193-0872
Éditeur: Copernicus Publications on behalf of the European Geosciences Union
DOI: 10.5194/gi-2015-23

Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

Auteurs: Ali Balador, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, Jing Xie, Luigi Pomante, Maurizio Mongelli, Pierluigi Pierini, Stig Petersen, Timo Sukuvaara
Publié dans: Sensors, Numéro 18/11, 2018, Page(s) 4075, ISSN 1424-8220
Éditeur: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18114075

A density-based contention window control scheme for unicast communications in vehicular ad hoc networks

Auteurs: Ali Balador, Carlos Calafate, Juan Carlos Cano, Pietro Manzoni
Publié dans: International Journal of Ad Hoc and Ubiquitous Computing, Numéro 24/1/2, 2017, Page(s) 65, ISSN 1743-8225
Éditeur: Inderscience Enterprises
DOI: 10.1504/ijahuc.2017.080913

Vehicular-networking- and road-weather-related research in Sodankylä

Auteurs: Timo Sukuvaara, Kari Mäenpää, Riika Ylitalo
Publié dans: Geoscientific Instrumentation, Methods and Data Systems, Numéro 5/2, 2016, Page(s) 513-520, ISSN 2193-0864
Éditeur: Copernicus Publications
DOI: 10.5194/gi-5-513-2016

Cognitive radio network with secrecy and interference constraints

Auteurs: Hung Tran, Georges Kaddoum, François Gagnon, Louis Sibomana
Publié dans: Physical Communication, Numéro 22, 2017, Page(s) 32-41, ISSN 1874-4907
Éditeur: Elsevier BV
DOI: 10.1016/j.phycom.2016.12.001

Machine Learning for Dynamic Software Analysis: Potentials and Limits

Auteurs: Amel Bennaceur, Dimitra Giannakopoulou, Reiner Hähnle, Karl Meinke
Publié dans: Dagstuhl Reports, Numéro 4, 2016, Page(s) 161-173, ISSN 2192-5283
Éditeur: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/dagrep.6.4.161

DynaMO—Dynamic Multisuperframe Tuning for Adaptive IEEE 802.15.4e DSME Networks

Auteurs: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Publié dans: IEEE Access, Numéro 7, 2019, Page(s) 122522-122535, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2019.2937952

CO-CPS: A sample XSTAMPP usage in V2I traffic management scenario based on STAMP model

Auteurs: Leonardo Napoletani
Publié dans: 5th Scandinavian Conference on SYSTEM & SOFTWARE SAFETY, 2017
Éditeur: ICES

Functional Safety and Evolvable Architectures for Autonomy

Auteurs: Rolf Johansson, Jonas Nilsson, Carl Bergenhem, Sagar Behere, Jörgen Tryggvesson, Stig Ursing, Andreas Söderberg, Martin Törngren, Fredrik Warg
Publié dans: Automated Driving - Automated Driving Safer and More Efficient Future Driving, Numéro Book, 2017, Page(s) 547-560
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-31895-0_25

Learning-Based Testing of Cyber-Physical Systems-of-Systems: A Platooning Study

Auteurs: Karl Meinke
Publié dans: 2017, Page(s) 135-151
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-66583-2_9

Model-Based Safety and Assessment. Lecture Notes in Computer Science,

Auteurs: DeJiu Chen, Zhonghai Lu
Publié dans: 2017, Page(s) 227-240
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-64119-5_15

Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation

Auteurs: Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson, Stefano Puri
Publié dans: Reliable Software Technologies – Ada-Europe 2018, Numéro 10873, 2018, Page(s) 19-33, ISBN 978-3-319-92431-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-92432-8_2

Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems

Auteurs: Falk Howar, Karl Meinke, Andreas Rausch
Publié dans: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, Numéro 9953, 2016, Page(s) 651-654, ISBN 978-3-319-47168-6
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-47169-3_50

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible