Rezultaty Documents, reports (15) D5.10 Evaluation of the SafeCOP approach as shown by the demonstrators - Final evaluation Evaluation of the SafeCOP approach as shown by the demonstrators- Final evaluation D2.4 Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees D6.2 Dissemination, exploitation and certification report year 1 Dissemination, exploitation and certification report year 1 D6.3 Dissemination, exploitation and certification report year 2 Dissemination, exploitation and certification report year 2 D2.2 Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees D1.1 Requirements and Evaluation Metrics Baseline Requirements and Evaluation Metrics Baseline D3.1 State of the art. Report on Task 3.1 on communication protocols State of the art. Report on Task 3.1 on communication protocols D2.1 State of the art report (R, PU, M6) State of the art report (R, PU, M6) D3.4 Report on T3.4 on distributed cooperation techniques for use case defined in WP3 Report on T3.4 on distributed cooperation techniques for use case defined in WP3 D5.9 Evaluation of the SafeCOP approach as shown by the demonstrators - concept and methodology Evaluation of the SafeCOP approach as shown by the demonstrators- concept and methodology D3.3 Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases D3.2 Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators D2.3 Report on mitigation of security threats that may jeopardize safety Report on mitigation of security threats that may jeopardize safety D6.4 Final dissemination, exploitation and certification report Final dissemination, exploitation and certification report D4.1 Report on SafeCOP Platform architecture, methods and runtime mechanisms Report on SafeCOP Platform architecture, methods and runtime mechanisms Demonstrators, pilots, prototypes (4) D4.3 Prototype simulation tools Prototype simulation tools D4.2 Prototype runtime mechanisms Prototype runtime mechanisms D5.1 Cooperative hospital bed mover demonstrated in lab setting Cooperative hospital bed mover demonstrated in lab setting D4.4 Prototype validation and verification tools Prototype validation and verification tools Websites, patent fillings, videos etc. (2) D6.5 Project flyer (regular update every year) Project flyer (regular update every year) D6.1 Project website Project website Publikacje Conference proceedings (46) The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication Autorzy: Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, Malin Rosqvist Opublikowane w: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 532-538, ISBN 978-1-5090-2817-7 Wydawca: IEEE DOI: 10.1109/DSD.2016.25 Communication middleware technologies for industrial distributed control systems: A literature review Autorzy: Ali Balador, Nielas Ericsson, Zeinab Bakhshi Opublikowane w: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-6, ISBN 978-1-5090-6505-9 Wydawca: IEEE DOI: 10.1109/ETFA.2017.8247730 A Reliable Token-Based MAC Protocol for Delay Sensitive Platooning Applications Autorzy: Ali Balador, Annette Bohm, Elisabeth Uhlemann, Carlos T. Calafate, Juan-Carlos Cano Opublikowane w: 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015, Page(s) 1-5, ISBN 978-1-4799-8091-8 Wydawca: IEEE DOI: 10.1109/vtcfall.2015.7390813 Proactive attack: A strategy for legitimate eavesdropping Autorzy: Hung Tran, Hans-Jurgen Zepernick Opublikowane w: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016, Page(s) 457-461, ISBN 978-1-5090-1801-7 Wydawca: IEEE DOI: 10.1109/CCE.2016.7562679 Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol Autorzy: Pablo Gutierrez Peon, Elisabeth Uhlemann, Wilfried Steiner, Mats Bjorkman Opublikowane w: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-7, ISBN 978-1-5090-5932-4 Wydawca: IEEE DOI: 10.1109/VTCSpring.2017.8108663 Systematic Maintenance of Safety Cases to Reduce Risk Autorzy: Omar Jaradat, Iain Bate Opublikowane w: 4th International Workshop on Assurance Cases for Software-intensive Systems, Issue 4, 2016, Page(s) 17-29, ISBN 978-3-319-45480-1 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-45480-1_2 Simulation-Based Safety Testing Brake-by-Wire Autorzy: Nils Mullner, Saifullah Khan, Md Habibur Rahman, Wasif Afzal, Mehrdad Saadatmand Opublikowane w: 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017, Page(s) 61-64, ISBN 978-1-5090-6676-6 Wydawca: IEEE DOI: 10.1109/ICSTW.2017.17 A Token-Based MAC Protocol for Achieving High Reliability in VANET Autorzy: Ali Balador Opublikowane w: BMW Summer School 2016, 2016 Wydawca: BMW Delay attack versus clock synchronization — A time chase Autorzy: Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman Opublikowane w: 2017 IEEE International Conference on Industrial Technology (ICIT), 2017, Page(s) 1136-1141, ISBN 978-1-5090-5320-9 Wydawca: IEEE DOI: 10.1109/ICIT.2017.7915522 Secrecy performance of cognitive cooperative industrial radio networks Autorzy: Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc Opublikowane w: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8, ISBN 978-1-5090-6505-9 Wydawca: IEEE DOI: 10.1109/ETFA.2017.8247604 Configuration-aware Contracts Autorzy: Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson Opublikowane w: 4th International Workshop on Assurance Cases for Software-intensive Systems, Issue 4, 2016, Page(s) 43-54, ISBN 978-3-319-45480-1 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-45480-1_4 Cooperative safety critical CPS platooning in SafeCOP Autorzy: Samer Medawar, Detlef Scholle, Irfan Sljivo Opublikowane w: 2017 6th Mediterranean Conference on Embedded Computing (MECO), 2017, Page(s) 1-5, ISBN 978-1-5090-6742-8 Wydawca: IEEE DOI: 10.1109/MECO.2017.7977210 Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases Autorzy: Omar Tawffeeq Saleem Jaradat, Iain Bate Opublikowane w: 2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 95-102, ISBN 978-1-5386-0602-5 Wydawca: IEEE DOI: 10.1109/EDCC.2017.20 Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis Autorzy: Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman Opublikowane w: 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), 2017, Page(s) 134-139, ISBN 978-1-5386-2113-4 Wydawca: IEEE DOI: 10.1109/IINTEC.2017.8325927 Cognitive radio for improved reliability in a real-time wireless MAC protocol based on TDMA Autorzy: Pablo Gutierrez Peon, Pedro Manuel Rodriguez, Zaloa Fernandez, Francisco Pozo, Elisabeth Uhlemann, Inaki Val, Wilfried Steiner Opublikowane w: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8, ISBN 978-1-5090-6505-9 Wydawca: IEEE DOI: 10.1109/ETFA.2017.8247602 Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers Autorzy: Hung Tran, Truong Xuan Quach, Ha-Vu Tran, Elisabeth Uhlemann Opublikowane w: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, Page(s) 1-8, ISBN 978-1-5386-3531-5 Wydawca: IEEE DOI: 10.1109/PIMRC.2017.8292734 A risk and threat assessment approaches overview in autonomous systems of systems Autorzy: Aida Causevic Opublikowane w: 2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT), 2017, Page(s) 1-6, ISBN 978-1-5386-3337-3 Wydawca: IEEE DOI: 10.1109/ICAT.2017.8171624 Clock synchronization considerations in security informed safety assurance of autonomous systems of systems Autorzy: Elena Lisova, Aida Causevic, Elisabeth Uhlemann, Mats Bjorkman Opublikowane w: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8385-8390, ISBN 978-1-5386-1127-2 Wydawca: IEEE DOI: 10.1109/IECON.2017.8217473 Contract-based assurance for wireless cooperative functions of vehicular systems Autorzy: Svetlana Girs, Irfan Sljivo, Omar Jaradat Opublikowane w: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8391-8396, ISBN 978-1-5386-1127-2 Wydawca: IEEE DOI: 10.1109/IECON.2017.8217474 Low Complexity Algorithm for Efficient Relay Assignment in Unicast/Broadcast Wireless Networks Autorzy: Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson Opublikowane w: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-6, ISBN 978-1-5090-5932-4 Wydawca: IEEE DOI: 10.1109/VTCSpring.2017.8108261 Relaying with Packet Aggregation for Half-Duplex All-to-All Broadcast in Time-Critical Wireless Networks Autorzy: Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson Opublikowane w: 2017 IEEE Globecom Workshops (GC Wkshps), 2017, Page(s) 1-6, ISBN 978-1-5386-3920-7 Wydawca: IEEE DOI: 10.1109/GLOCOMW.2017.8269134 Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models Autorzy: Zeinab Bakhshi, Ali Balador, Jawad Mustafa Opublikowane w: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018, Page(s) 173-178, ISBN 978-1-5386-1154-8 Wydawca: IEEE DOI: 10.1109/wcncw.2018.8368997 V2I Cooperation for Traffic Management with SafeCop Autorzy: Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante Opublikowane w: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 621-627, ISBN 978-1-5090-2817-7 Wydawca: IEEE DOI: 10.1109/DSD.2016.18 An adaptive strategy to mitigate instability in the ETSI DCC: Experimental validation Autorzy: Elena Cinque, Francesco Valentini, Alessio Iovine, Marco Pratesi Opublikowane w: 2017 15th International Conference on ITS Telecommunications (ITST), 2017, Page(s) 1-6, ISBN 978-1-5090-5275-2 Wydawca: IEEE DOI: 10.1109/ITST.2017.7972223 Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e Autorzy: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar Opublikowane w: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), 2017, Page(s) 1-9, ISBN 978-1-5090-5788-7 Wydawca: IEEE DOI: 10.1109/WFCS.2017.7991967 PELE: Power efficient legitimate eavesdropping via jamming in UAV communications Autorzy: Xiaoming Wang, Kai Li, Salil S. Kanhere, Demin Li, Xiaolu Zhang, Eduardo Tovar Opublikowane w: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017, Page(s) 402-408, ISBN 978-1-5090-4372-9 Wydawca: IEEE DOI: 10.1109/IWCMC.2017.7986320 Towards industry strength mapping of AUTOSAR automotive functionality on multicore architectures - work-in-progress Autorzy: Cosmin Avasalcai, Dhanesh Budhrani, Paul Pop Opublikowane w: Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion - CASES '17, 2017, Page(s) 1-2, ISBN 9781-450351843 Wydawca: ACM Press DOI: 10.1145/3125501.3125623 TinyWIDS - a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks Autorzy: Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti Opublikowane w: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Page(s) 13-16, ISBN 9781-450363747 Wydawca: ACM Press DOI: 10.1145/3178291.3178293 LCD: Low Latency Command Dissemination for a Platoon of Vehicles Autorzy: Kai Li, Wei Ni, Eduardo Tovar, Mohsen Guizani Opublikowane w: 2018 IEEE International Conference on Communications (ICC), 2018, Page(s) 1-6, ISBN 978-1-5386-3180-5 Wydawca: IEEE DOI: 10.1109/icc.2018.8422933 Analyzing hazards in system-of-systems: Described in a quarry site automation context Autorzy: Stephan Baumgart, Joakim Froberg, Sasikumar Punnekkat Opublikowane w: 2017 Annual IEEE International Systems Conference (SysCon), 2017, Page(s) 1-8, ISBN 978-1-5090-4623-2 Wydawca: IEEE DOI: 10.1109/SYSCON.2017.7934783 Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project Autorzy: Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli Opublikowane w: 2016 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS), 2016, Page(s) 320-327, ISBN 978-1-5090-3076-7 Wydawca: IEEE DOI: 10.1109/SAMOS.2016.7818365 Side-channel security of superscalar CPUs - evaluating the impact of micro-architectural features Autorzy: Alessandro Barenghi, Gerardo Pelosi Opublikowane w: Proceedings of the 55th Annual Design Automation Conference on - DAC '18, 2018, Page(s) 1-6, ISBN 9781-450357005 Wydawca: ACM Press DOI: 10.1145/3195970.3196112 LabSMILING: A SaaS Framework, Composed of a Number of Remotely Accessible Testbeds and Related SW Tools, for Analysis, Design and Management of Low Data-Rate Wireless Personal Area Networks Based on IEEE 802.15.4 Autorzy: Carlo Centofanti, Luigi Pomante, Marco Santic Opublikowane w: 2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019, Page(s) 1-5, ISBN 978-1-7281-1740-9 Wydawca: IEEE DOI: 10.1109/meco.2019.8760282 An industrial survey on the influence of process and product attributes on software product reliability Autorzy: Joshi Sanjay L, Bharat M. Deshpande, Sasikumar Punnekkat Opublikowane w: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, Page(s) 44-51, ISBN 978-1-5090-6590-5 Wydawca: IEEE DOI: 10.1109/netact.2017.8076739 Identification of safety regions in vehicle platooning via machine learning Autorzy: Alessandro Fermi, Maurizio Mongelli, Marco Muselli, Enrico Ferrari Opublikowane w: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 2018, Page(s) 1-4, ISBN 978-1-5386-1066-4 Wydawca: IEEE DOI: 10.1109/wfcs.2018.8402372 ITS-enabled advanced road weather services and infrastructures for vehicle winter testing, professional traffic fleets and future automated driving Autorzy: Timo Sukuvaara, Kari Mäenpää, Daria Stepanova, Sakari Kantomaa and Virve Karsisto Opublikowane w: 2018 Wydawca: 25th ITS World Congress Towards Intelligent Real-Time Road Weather Services Utilizing Mobile Vehicular Data Autorzy: Virve Karsisto, Pertti Nurmi, Timo Sukuvaara and Kari Mäenpää Opublikowane w: 2017 Wydawca: 12th ITS European Congress TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks Autorzy: Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti, Opublikowane w: 2018 Wydawca: Fifth Workshop on Cryptography and Security in Computing Systems (CS2) Interfacing a Brake-by-Wire Simulink Model with SUMO Autorzy: Erik Martin Campana, Nils Mullner, Saad Mubeen Opublikowane w: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, Page(s) 1-6, ISBN 978-1-5386-6477-3 Wydawca: IEEE DOI: 10.1109/iconic.2018.8601239 Learning-based testing for autonomous systems using spatial and temporal requirements Autorzy: Hojat Khosrowjerdi, Karl Meinke Opublikowane w: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis - MASES 2018, 2018, Page(s) 6-15, ISBN 9781-450359726 Wydawca: ACM Press DOI: 10.1145/3243127.3243129 Probabilistic Communication in Car Platoons Autorzy: Tam Ninh Thi Thanh, Tran Hung, Nils Müllner Opublikowane w: 2018 Wydawca: International Conference on Advanced Technologies for Communications (ATC) A Safety-Centric Change Management Framework by Tailoring Agile and V-Model Processes Autorzy: Omar Jaradat, Abdallah Salameh Opublikowane w: 2018 Wydawca: 36th International System Safety Conference (ISSC 2018) Using Safety Contracts to Verify Design Assumptions During Runtime Autorzy: Omar Jaradat, Sasikumar Punnekkat Opublikowane w: 2018 Wydawca: 23rd International Conference on Reliable Software Technologies – Ada-Europe 2018 (Ada-Europe-2018) A Business Model for selling components with safety certificates Autorzy: Carl Bergenhem, Daniel Skarin, Fabian Ström Opublikowane w: 2018 Wydawca: Safety-Critical Systems Club seminar on: COTS, Legacy and Reuse A reliable token-based MAC protocol for V2V communication in urban VANET Autorzy: Ali Balador, Annette Bohm, Carlos T. Calafate, Juan-Carlos Cano Opublikowane w: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, Page(s) 1-6, ISBN 978-1-5090-3254-9 Wydawca: IEEE DOI: 10.1109/PIMRC.2016.7794823 Approaches for Facilities Layer Protocols for Platooning Autorzy: Carl Bergenhem Opublikowane w: 2015 IEEE 18th International Conference on Intelligent Transportation Systems, 2015, Page(s) 1989-1994, ISBN 978-1-4673-6596-3 Wydawca: IEEE DOI: 10.1109/itsc.2015.322 Peer reviewed articles (16) Safe cooperating cyber-physical systems using wireless communication: The SafeCOP approach Autorzy: Paul Pop, Detlef Scholle, Irfan Šljivo, Hans Hansson, Gunnar Widforss, Malin Rosqvist Opublikowane w: Microprocessors and Microsystems, Issue 53, 2017, Page(s) 42-50, ISSN 0141-9331 Wydawca: Elsevier BV DOI: 10.1016/j.micpro.2017.07.003 Scheduling for Source Relaying With Packet Aggregation in Industrial Wireless Networks Autorzy: Svetlana Girs, Andreas Willig, Elisabeth Uhlemann, Mats Bjorkman Opublikowane w: IEEE Transactions on Industrial Informatics, Issue 12/5, 2016, Page(s) 1855-1864, ISSN 1551-3203 Wydawca: Institute of Electrical and Electronics Engineers DOI: 10.1109/tii.2016.2535393 Practical 3-D Beam Pattern Based Channel Modeling for Multi-Polarized Massive MIMO Systems Autorzy: Saeid Aghaeinezhadfirouzja, Hui Liu, Ali Balador Opublikowane w: Sensors, Issue 18/4, 2018, Page(s) 1186, ISSN 1424-8220 Wydawca: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s18041186 Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies Autorzy: Ali Balador, Elisabeth Uhlemann, Carlos Calafate, Juan-Carlos Cano Opublikowane w: Sensors, Issue 18/4, 2018, Page(s) 955, ISSN 1424-8220 Wydawca: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s18040955 Three-Step Two-Way Decode and Forward Relay With Energy Harvesting Autorzy: Nguyen Thi Phuoc Van, Syed Faraz Hasan, Xiang Gui, Subhas Mukhopadhyay, Hung Tran Opublikowane w: IEEE Communications Letters, Issue 21/4, 2017, Page(s) 857-860, ISSN 1089-7798 Wydawca: Institute of Electrical and Electronics Engineers DOI: 10.1109/LCOMM.2016.2637891 RF energy harvesting: an analysis of wireless sensor networks for reliable communication Autorzy: Hung Tran, Johan Åkerberg, Mats Björkman, Ha-Vu Tran Opublikowane w: Wireless Networks, 2017, ISSN 1022-0038 Wydawca: Baltzer Science Publishers B.V. DOI: 10.1007/s11276-017-1546-6 A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios Autorzy: Saifullah Khan, Muhammad Alam, Martin Fränzle, Nils Müllner, Yuanfang Chen Opublikowane w: Computers & Electrical Engineering, Issue 68, 2018, Page(s) 447-462, ISSN 0045-7906 Wydawca: Pergamon Press Ltd. DOI: 10.1016/j.compeleceng.2018.04.017 IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation Autorzy: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar Opublikowane w: IEEE Communications Surveys & Tutorials, 2018, Page(s) 1-1, ISSN 1553-877X Wydawca: Institute of Electrical and Electronics Engineers DOI: 10.1109/COMST.2018.2800898 A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks Autorzy: Amirhossein Moravejosharieh, Jaime Lloret Opublikowane w: International Journal of Communication Systems, Issue 29/7, 2016, Page(s) 1269-1292, ISSN 1074-5351 Wydawca: John Wiley & Sons Inc. DOI: 10.1002/dac.3098 Vehicular networking and road weather related research in Sodankylä Autorzy: T. Sukuvaara, K. Mäenpää, R. Ylitalo Opublikowane w: Geoscientific Instrumentation, Methods and Data Systems Discussions, 2016, Page(s) 1-23, ISSN 2193-0872 Wydawca: Copernicus Publications on behalf of the European Geosciences Union DOI: 10.5194/gi-2015-23 Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems Autorzy: Ali Balador, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, Jing Xie, Luigi Pomante, Maurizio Mongelli, Pierluigi Pierini, Stig Petersen, Timo Sukuvaara Opublikowane w: Sensors, Issue 18/11, 2018, Page(s) 4075, ISSN 1424-8220 Wydawca: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s18114075 A density-based contention window control scheme for unicast communications in vehicular ad hoc networks Autorzy: Ali Balador, Carlos Calafate, Juan Carlos Cano, Pietro Manzoni Opublikowane w: International Journal of Ad Hoc and Ubiquitous Computing, Issue 24/1/2, 2017, Page(s) 65, ISSN 1743-8225 Wydawca: Inderscience Enterprises DOI: 10.1504/ijahuc.2017.080913 Vehicular-networking- and road-weather-related research in Sodankylä Autorzy: Timo Sukuvaara, Kari Mäenpää, Riika Ylitalo Opublikowane w: Geoscientific Instrumentation, Methods and Data Systems, Issue 5/2, 2016, Page(s) 513-520, ISSN 2193-0864 Wydawca: Copernicus Publications DOI: 10.5194/gi-5-513-2016 Cognitive radio network with secrecy and interference constraints Autorzy: Hung Tran, Georges Kaddoum, François Gagnon, Louis Sibomana Opublikowane w: Physical Communication, Issue 22, 2017, Page(s) 32-41, ISSN 1874-4907 Wydawca: Elsevier BV DOI: 10.1016/j.phycom.2016.12.001 Machine Learning for Dynamic Software Analysis: Potentials and Limits Autorzy: Amel Bennaceur, Dimitra Giannakopoulou, Reiner Hähnle, Karl Meinke Opublikowane w: Dagstuhl Reports, Issue 4, 2016, Page(s) 161-173, ISSN 2192-5283 Wydawca: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik DOI: 10.4230/dagrep.6.4.161 DynaMO—Dynamic Multisuperframe Tuning for Adaptive IEEE 802.15.4e DSME Networks Autorzy: Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar Opublikowane w: IEEE Access, Issue 7, 2019, Page(s) 122522-122535, ISSN 2169-3536 Wydawca: Institute of Electrical and Electronics Engineers Inc. DOI: 10.1109/ACCESS.2019.2937952 Other (2) CO-CPS: A sample XSTAMPP usage in V2I traffic management scenario based on STAMP model Autorzy: Leonardo Napoletani Opublikowane w: 5th Scandinavian Conference on SYSTEM & SOFTWARE SAFETY, 2017 Wydawca: ICES Functional Safety and Evolvable Architectures for Autonomy Autorzy: Rolf Johansson, Jonas Nilsson, Carl Bergenhem, Sagar Behere, Jörgen Tryggvesson, Stig Ursing, Andreas Söderberg, Martin Törngren, Fredrik Warg Opublikowane w: Automated Driving - Automated Driving Safer and More Efficient Future Driving, Issue Book, 2017, Page(s) 547-560 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-31895-0_25 Book chapters (4) Learning-Based Testing of Cyber-Physical Systems-of-Systems: A Platooning Study Autorzy: Karl Meinke Opublikowane w: 2017, Page(s) 135-151 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-66583-2_9 Model-Based Safety and Assessment. Lecture Notes in Computer Science, Autorzy: DeJiu Chen, Zhonghai Lu Opublikowane w: 2017, Page(s) 227-240 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-64119-5_15 Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation Autorzy: Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson, Stefano Puri Opublikowane w: Reliable Software Technologies – Ada-Europe 2018, Issue 10873, 2018, Page(s) 19-33, ISBN 978-3-319-92431-1 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-92432-8_2 Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems Autorzy: Falk Howar, Karl Meinke, Andreas Rausch Opublikowane w: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, Issue 9953, 2016, Page(s) 651-654, ISBN 978-3-319-47168-6 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-47169-3_50 Wyszukiwanie danych OpenAIRE... Podczas wyszukiwania danych OpenAIRE wystąpił błąd Brak wyników