Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Safe Cooperating Cyber-Physical Systems using Wireless Communication

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

D5.10 Evaluation of the SafeCOP approach as shown by the demonstrators - Final evaluation (opens in new window)

Evaluation of the SafeCOP approach as shown by the demonstrators- Final evaluation

D2.4 Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees (opens in new window)

Report on T2.3 and T2.4 and its relations to demonstrators, and recommendations for safety committees

D6.2 Dissemination, exploitation and certification report year 1 (opens in new window)

Dissemination, exploitation and certification report year 1

D6.3 Dissemination, exploitation and certification report year 2 (opens in new window)

Dissemination, exploitation and certification report year 2

D2.2 Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees (opens in new window)

Report on T2.2 on safety assurance conceptual model and its relations to the demonstrators and recommendations for safety committees

D1.1 Requirements and Evaluation Metrics Baseline (opens in new window)

Requirements and Evaluation Metrics Baseline

D3.1 State of the art. Report on Task 3.1 on communication protocols (opens in new window)

State of the art. Report on Task 3.1 on communication protocols

D2.1 State of the art report (R, PU, M6) (opens in new window)

State of the art report (R, PU, M6)

D3.4 Report on T3.4 on distributed cooperation techniques for use case defined in WP3 (opens in new window)

Report on T3.4 on distributed cooperation techniques for use case defined in WP3

D5.9 Evaluation of the SafeCOP approach as shown by the demonstrators - concept and methodology (opens in new window)

Evaluation of the SafeCOP approach as shown by the demonstrators- concept and methodology

D3.3 Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases (opens in new window)

Report on Task 3.3 on architecture of safety layer on top of communication protocols for the different use cases

D3.2 Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators (opens in new window)

Report on T3.2 on safe and secure communication protocols for the different use cases and demonstrators

D2.3 Report on mitigation of security threats that may jeopardize safety (opens in new window)

Report on mitigation of security threats that may jeopardize safety

D6.4 Final dissemination, exploitation and certification report (opens in new window)

Final dissemination, exploitation and certification report

D4.1 Report on SafeCOP Platform architecture, methods and runtime mechanisms (opens in new window)

Report on SafeCOP Platform architecture, methods and runtime mechanisms

Publications

The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication (opens in new window)

Author(s): Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Published in: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 532-538, ISBN 978-1-5090-2817-7
Publisher: IEEE
DOI: 10.1109/DSD.2016.25

Communication middleware technologies for industrial distributed control systems: A literature review (opens in new window)

Author(s): Ali Balador, Nielas Ericsson, Zeinab Bakhshi
Published in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-6, ISBN 978-1-5090-6505-9
Publisher: IEEE
DOI: 10.1109/ETFA.2017.8247730

A Reliable Token-Based MAC Protocol for Delay Sensitive Platooning Applications (opens in new window)

Author(s): Ali Balador, Annette Bohm, Elisabeth Uhlemann, Carlos T. Calafate, Juan-Carlos Cano
Published in: 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015, Page(s) 1-5, ISBN 978-1-4799-8091-8
Publisher: IEEE
DOI: 10.1109/vtcfall.2015.7390813

Proactive attack: A strategy for legitimate eavesdropping (opens in new window)

Author(s): Hung Tran, Hans-Jurgen Zepernick
Published in: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016, Page(s) 457-461, ISBN 978-1-5090-1801-7
Publisher: IEEE
DOI: 10.1109/CCE.2016.7562679

Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol (opens in new window)

Author(s): Pablo Gutierrez Peon, Elisabeth Uhlemann, Wilfried Steiner, Mats Bjorkman
Published in: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-7, ISBN 978-1-5090-5932-4
Publisher: IEEE
DOI: 10.1109/VTCSpring.2017.8108663

Systematic Maintenance of Safety Cases to Reduce Risk (opens in new window)

Author(s): Omar Jaradat, Iain Bate
Published in: 4th International Workshop on Assurance Cases for Software-intensive Systems, Issue 4, 2016, Page(s) 17-29, ISBN 978-3-319-45480-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-45480-1_2

Simulation-Based Safety Testing Brake-by-Wire (opens in new window)

Author(s): Nils Mullner, Saifullah Khan, Md Habibur Rahman, Wasif Afzal, Mehrdad Saadatmand
Published in: 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017, Page(s) 61-64, ISBN 978-1-5090-6676-6
Publisher: IEEE
DOI: 10.1109/ICSTW.2017.17

A Token-Based MAC Protocol for Achieving High Reliability in VANET

Author(s): Ali Balador
Published in: BMW Summer School 2016, 2016
Publisher: BMW

Delay attack versus clock synchronization — A time chase (opens in new window)

Author(s): Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Published in: 2017 IEEE International Conference on Industrial Technology (ICIT), 2017, Page(s) 1136-1141, ISBN 978-1-5090-5320-9
Publisher: IEEE
DOI: 10.1109/ICIT.2017.7915522

Secrecy performance of cognitive cooperative industrial radio networks (opens in new window)

Author(s): Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc
Published in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8, ISBN 978-1-5090-6505-9
Publisher: IEEE
DOI: 10.1109/ETFA.2017.8247604

Configuration-aware Contracts (opens in new window)

Author(s): Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson
Published in: 4th International Workshop on Assurance Cases for Software-intensive Systems, Issue 4, 2016, Page(s) 43-54, ISBN 978-3-319-45480-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-45480-1_4

Cooperative safety critical CPS platooning in SafeCOP (opens in new window)

Author(s): Samer Medawar, Detlef Scholle, Irfan Sljivo
Published in: 2017 6th Mediterranean Conference on Embedded Computing (MECO), 2017, Page(s) 1-5, ISBN 978-1-5090-6742-8
Publisher: IEEE
DOI: 10.1109/MECO.2017.7977210

Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases (opens in new window)

Author(s): Omar Tawffeeq Saleem Jaradat, Iain Bate
Published in: 2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 95-102, ISBN 978-1-5386-0602-5
Publisher: IEEE
DOI: 10.1109/EDCC.2017.20

Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis (opens in new window)

Author(s): Elena Lisova, Elisabeth Uhlemann, Johan Akerberg, Mats Bjorkman
Published in: 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), 2017, Page(s) 134-139, ISBN 978-1-5386-2113-4
Publisher: IEEE
DOI: 10.1109/IINTEC.2017.8325927

Cognitive radio for improved reliability in a real-time wireless MAC protocol based on TDMA (opens in new window)

Author(s): Pablo Gutierrez Peon, Pedro Manuel Rodriguez, Zaloa Fernandez, Francisco Pozo, Elisabeth Uhlemann, Inaki Val, Wilfried Steiner
Published in: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017, Page(s) 1-8, ISBN 978-1-5090-6505-9
Publisher: IEEE
DOI: 10.1109/ETFA.2017.8247602

Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers (opens in new window)

Author(s): Hung Tran, Truong Xuan Quach, Ha-Vu Tran, Elisabeth Uhlemann
Published in: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, Page(s) 1-8, ISBN 978-1-5386-3531-5
Publisher: IEEE
DOI: 10.1109/PIMRC.2017.8292734

A risk and threat assessment approaches overview in autonomous systems of systems (opens in new window)

Author(s): Aida Causevic
Published in: 2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT), 2017, Page(s) 1-6, ISBN 978-1-5386-3337-3
Publisher: IEEE
DOI: 10.1109/ICAT.2017.8171624

Clock synchronization considerations in security informed safety assurance of autonomous systems of systems (opens in new window)

Author(s): Elena Lisova, Aida Causevic, Elisabeth Uhlemann, Mats Bjorkman
Published in: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8385-8390, ISBN 978-1-5386-1127-2
Publisher: IEEE
DOI: 10.1109/IECON.2017.8217473

Contract-based assurance for wireless cooperative functions of vehicular systems (opens in new window)

Author(s): Svetlana Girs, Irfan Sljivo, Omar Jaradat
Published in: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, 2017, Page(s) 8391-8396, ISBN 978-1-5386-1127-2
Publisher: IEEE
DOI: 10.1109/IECON.2017.8217474

Low Complexity Algorithm for Efficient Relay Assignment in Unicast/Broadcast Wireless Networks (opens in new window)

Author(s): Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Published in: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, Page(s) 1-6, ISBN 978-1-5090-5932-4
Publisher: IEEE
DOI: 10.1109/VTCSpring.2017.8108261

Relaying with Packet Aggregation for Half-Duplex All-to-All Broadcast in Time-Critical Wireless Networks (opens in new window)

Author(s): Le-Nam Hoang, Elisabeth Uhlemann, Magnus Jonsson
Published in: 2017 IEEE Globecom Workshops (GC Wkshps), 2017, Page(s) 1-6, ISBN 978-1-5386-3920-7
Publisher: IEEE
DOI: 10.1109/GLOCOMW.2017.8269134

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models (opens in new window)

Author(s): Zeinab Bakhshi, Ali Balador, Jawad Mustafa
Published in: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018, Page(s) 173-178, ISBN 978-1-5386-1154-8
Publisher: IEEE
DOI: 10.1109/wcncw.2018.8368997

V2I Cooperation for Traffic Management with SafeCop (opens in new window)

Author(s): Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Stefano Delucchi, Massimo Massa, Maurizio Mongelli, Enrico Ferrari, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Dajana Cassioli, Luigi Pomante
Published in: 2016 Euromicro Conference on Digital System Design (DSD), 2016, Page(s) 621-627, ISBN 978-1-5090-2817-7
Publisher: IEEE
DOI: 10.1109/DSD.2016.18

An adaptive strategy to mitigate instability in the ETSI DCC: Experimental validation (opens in new window)

Author(s): Elena Cinque, Francesco Valentini, Alessio Iovine, Marco Pratesi
Published in: 2017 15th International Conference on ITS Telecommunications (ITST), 2017, Page(s) 1-6, ISBN 978-1-5090-5275-2
Publisher: IEEE
DOI: 10.1109/ITST.2017.7972223

Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e (opens in new window)

Author(s): Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Published in: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), 2017, Page(s) 1-9, ISBN 978-1-5090-5788-7
Publisher: IEEE
DOI: 10.1109/WFCS.2017.7991967

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications (opens in new window)

Author(s): Xiaoming Wang, Kai Li, Salil S. Kanhere, Demin Li, Xiaolu Zhang, Eduardo Tovar
Published in: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017, Page(s) 402-408, ISBN 978-1-5090-4372-9
Publisher: IEEE
DOI: 10.1109/IWCMC.2017.7986320

Towards industry strength mapping of AUTOSAR automotive functionality on multicore architectures - work-in-progress (opens in new window)

Author(s): Cosmin Avasalcai, Dhanesh Budhrani, Paul Pop
Published in: Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion - CASES '17, 2017, Page(s) 1-2, ISBN 9781-450351843
Publisher: ACM Press
DOI: 10.1145/3125501.3125623

TinyWIDS - a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks (opens in new window)

Author(s): Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti
Published in: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems - CS2 '18, 2018, Page(s) 13-16, ISBN 9781-450363747
Publisher: ACM Press
DOI: 10.1145/3178291.3178293

LCD: Low Latency Command Dissemination for a Platoon of Vehicles (opens in new window)

Author(s): Kai Li, Wei Ni, Eduardo Tovar, Mohsen Guizani
Published in: 2018 IEEE International Conference on Communications (ICC), 2018, Page(s) 1-6, ISBN 978-1-5386-3180-5
Publisher: IEEE
DOI: 10.1109/icc.2018.8422933

Analyzing hazards in system-of-systems: Described in a quarry site automation context (opens in new window)

Author(s): Stephan Baumgart, Joakim Froberg, Sasikumar Punnekkat
Published in: 2017 Annual IEEE International Systems Conference (SysCon), 2017, Page(s) 1-8, ISBN 978-1-5090-4623-2
Publisher: IEEE
DOI: 10.1109/SYSCON.2017.7934783

Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project (opens in new window)

Author(s): Alessio Agneessens, Francesco Buemi, Stefano Delucchi, Massimo Massa, Giovanni Agosta, Alessandro Barenghi, Carlo Brandolese, William Fornaciari, Gerardo Pelosi, Enrico Ferrari, Dajana Cassioli, Luigi Pomante, Leonardo Napoletani, Luciano Bozzi, Carlo Tieri, Maurizio Mongelli
Published in: 2016 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS), 2016, Page(s) 320-327, ISBN 978-1-5090-3076-7
Publisher: IEEE
DOI: 10.1109/SAMOS.2016.7818365

Side-channel security of superscalar CPUs - evaluating the impact of micro-architectural features (opens in new window)

Author(s): Alessandro Barenghi, Gerardo Pelosi
Published in: Proceedings of the 55th Annual Design Automation Conference on - DAC '18, 2018, Page(s) 1-6, ISBN 9781-450357005
Publisher: ACM Press
DOI: 10.1145/3195970.3196112

LabSMILING: A SaaS Framework, Composed of a Number of Remotely Accessible Testbeds and Related SW Tools, for Analysis, Design and Management of Low Data-Rate Wireless Personal Area Networks Based on IEEE 802.15.4 (opens in new window)

Author(s): Carlo Centofanti, Luigi Pomante, Marco Santic
Published in: 2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019, Page(s) 1-5, ISBN 978-1-7281-1740-9
Publisher: IEEE
DOI: 10.1109/meco.2019.8760282

An industrial survey on the influence of process and product attributes on software product reliability (opens in new window)

Author(s): Joshi Sanjay L, Bharat M. Deshpande, Sasikumar Punnekkat
Published in: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017, Page(s) 44-51, ISBN 978-1-5090-6590-5
Publisher: IEEE
DOI: 10.1109/netact.2017.8076739

Identification of safety regions in vehicle platooning via machine learning (opens in new window)

Author(s): Alessandro Fermi, Maurizio Mongelli, Marco Muselli, Enrico Ferrari
Published in: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 2018, Page(s) 1-4, ISBN 978-1-5386-1066-4
Publisher: IEEE
DOI: 10.1109/wfcs.2018.8402372

ITS-enabled advanced road weather services and infrastructures for vehicle winter testing, professional traffic fleets and future automated driving

Author(s): Timo Sukuvaara, Kari Mäenpää, Daria Stepanova, Sakari Kantomaa and Virve Karsisto
Published in: 2018
Publisher: 25th ITS World Congress

Towards Intelligent Real-Time Road Weather Services Utilizing Mobile Vehicular Data

Author(s): Virve Karsisto, Pertti Nurmi, Timo Sukuvaara and Kari Mäenpää
Published in: 2017
Publisher: 12th ITS European Congress

TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks

Author(s): Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti,
Published in: 2018
Publisher: Fifth Workshop on Cryptography and Security in Computing Systems (CS2)

Interfacing a Brake-by-Wire Simulink Model with SUMO (opens in new window)

Author(s): Erik Martin Campana, Nils Mullner, Saad Mubeen
Published in: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, Page(s) 1-6, ISBN 978-1-5386-6477-3
Publisher: IEEE
DOI: 10.1109/iconic.2018.8601239

Learning-based testing for autonomous systems using spatial and temporal requirements (opens in new window)

Author(s): Hojat Khosrowjerdi, Karl Meinke
Published in: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis - MASES 2018, 2018, Page(s) 6-15, ISBN 9781-450359726
Publisher: ACM Press
DOI: 10.1145/3243127.3243129

Probabilistic Communication in Car Platoons

Author(s): Tam Ninh Thi Thanh, Tran Hung, Nils Müllner
Published in: 2018
Publisher: International Conference on Advanced Technologies for Communications (ATC)

A Safety-Centric Change Management Framework by Tailoring Agile and V-Model Processes

Author(s): Omar Jaradat, Abdallah Salameh
Published in: 2018
Publisher: 36th International System Safety Conference (ISSC 2018)

Using Safety Contracts to Verify Design Assumptions During Runtime

Author(s): Omar Jaradat, Sasikumar Punnekkat
Published in: 2018
Publisher: 23rd International Conference on Reliable Software Technologies – Ada-Europe 2018 (Ada-Europe-2018)

A Business Model for selling components with safety certificates

Author(s): Carl Bergenhem, Daniel Skarin, Fabian Ström
Published in: 2018
Publisher: Safety-Critical Systems Club seminar on: COTS, Legacy and Reuse

A reliable token-based MAC protocol for V2V communication in urban VANET (opens in new window)

Author(s): Ali Balador, Annette Bohm, Carlos T. Calafate, Juan-Carlos Cano
Published in: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, Page(s) 1-6, ISBN 978-1-5090-3254-9
Publisher: IEEE
DOI: 10.1109/PIMRC.2016.7794823

Approaches for Facilities Layer Protocols for Platooning (opens in new window)

Author(s): Carl Bergenhem
Published in: 2015 IEEE 18th International Conference on Intelligent Transportation Systems, 2015, Page(s) 1989-1994, ISBN 978-1-4673-6596-3
Publisher: IEEE
DOI: 10.1109/itsc.2015.322

Safe cooperating cyber-physical systems using wireless communication: The SafeCOP approach (opens in new window)

Author(s): Paul Pop, Detlef Scholle, Irfan Šljivo, Hans Hansson, Gunnar Widforss, Malin Rosqvist
Published in: Microprocessors and Microsystems, Issue 53, 2017, Page(s) 42-50, ISSN 0141-9331
Publisher: Elsevier BV
DOI: 10.1016/j.micpro.2017.07.003

Scheduling for Source Relaying With Packet Aggregation in Industrial Wireless Networks (opens in new window)

Author(s): Svetlana Girs, Andreas Willig, Elisabeth Uhlemann, Mats Bjorkman
Published in: IEEE Transactions on Industrial Informatics, Issue 12/5, 2016, Page(s) 1855-1864, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tii.2016.2535393

Practical 3-D Beam Pattern Based Channel Modeling for Multi-Polarized Massive MIMO Systems (opens in new window)

Author(s): Saeid Aghaeinezhadfirouzja, Hui Liu, Ali Balador
Published in: Sensors, Issue 18/4, 2018, Page(s) 1186, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18041186

Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies (opens in new window)

Author(s): Ali Balador, Elisabeth Uhlemann, Carlos Calafate, Juan-Carlos Cano
Published in: Sensors, Issue 18/4, 2018, Page(s) 955, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18040955

Three-Step Two-Way Decode and Forward Relay With Energy Harvesting (opens in new window)

Author(s): Nguyen Thi Phuoc Van, Syed Faraz Hasan, Xiang Gui, Subhas Mukhopadhyay, Hung Tran
Published in: IEEE Communications Letters, Issue 21/4, 2017, Page(s) 857-860, ISSN 1089-7798
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/LCOMM.2016.2637891

RF energy harvesting: an analysis of wireless sensor networks for reliable communication (opens in new window)

Author(s): Hung Tran, Johan Åkerberg, Mats Björkman, Ha-Vu Tran
Published in: Wireless Networks, 2017, ISSN 1022-0038
Publisher: Baltzer Science Publishers B.V.
DOI: 10.1007/s11276-017-1546-6

A Traffic Aware Segment-based Routing protocol for VANETs in urban scenarios (opens in new window)

Author(s): Saifullah Khan, Muhammad Alam, Martin Fränzle, Nils Müllner, Yuanfang Chen
Published in: Computers & Electrical Engineering, Issue 68, 2018, Page(s) 447-462, ISSN 0045-7906
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2018.04.017

IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation (opens in new window)

Author(s): Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Published in: IEEE Communications Surveys & Tutorials, 2018, Page(s) 1-1, ISSN 1553-877X
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/COMST.2018.2800898

A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks (opens in new window)

Author(s): Amirhossein Moravejosharieh, Jaime Lloret
Published in: International Journal of Communication Systems, Issue 29/7, 2016, Page(s) 1269-1292, ISSN 1074-5351
Publisher: John Wiley & Sons Inc.
DOI: 10.1002/dac.3098

Vehicular networking and road weather related research in Sodankylä (opens in new window)

Author(s): T. Sukuvaara, K. Mäenpää, R. Ylitalo
Published in: Geoscientific Instrumentation, Methods and Data Systems Discussions, 2016, Page(s) 1-23, ISSN 2193-0872
Publisher: Copernicus Publications on behalf of the European Geosciences Union
DOI: 10.5194/gi-2015-23

Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems (opens in new window)

Author(s): Ali Balador, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, Jing Xie, Luigi Pomante, Maurizio Mongelli, Pierluigi Pierini, Stig Petersen, Timo Sukuvaara
Published in: Sensors, Issue 18/11, 2018, Page(s) 4075, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s18114075

A density-based contention window control scheme for unicast communications in vehicular ad hoc networks (opens in new window)

Author(s): Ali Balador, Carlos Calafate, Juan Carlos Cano, Pietro Manzoni
Published in: International Journal of Ad Hoc and Ubiquitous Computing, Issue 24/1/2, 2017, Page(s) 65, ISSN 1743-8225
Publisher: Inderscience Enterprises
DOI: 10.1504/ijahuc.2017.080913

Vehicular-networking- and road-weather-related research in Sodankylä (opens in new window)

Author(s): Timo Sukuvaara, Kari Mäenpää, Riika Ylitalo
Published in: Geoscientific Instrumentation, Methods and Data Systems, Issue 5/2, 2016, Page(s) 513-520, ISSN 2193-0864
Publisher: Copernicus Publications
DOI: 10.5194/gi-5-513-2016

Cognitive radio network with secrecy and interference constraints (opens in new window)

Author(s): Hung Tran, Georges Kaddoum, François Gagnon, Louis Sibomana
Published in: Physical Communication, Issue 22, 2017, Page(s) 32-41, ISSN 1874-4907
Publisher: Elsevier BV
DOI: 10.1016/j.phycom.2016.12.001

Machine Learning for Dynamic Software Analysis: Potentials and Limits (opens in new window)

Author(s): Amel Bennaceur, Dimitra Giannakopoulou, Reiner Hähnle, Karl Meinke
Published in: Dagstuhl Reports, Issue 4, 2016, Page(s) 161-173, ISSN 2192-5283
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
DOI: 10.4230/dagrep.6.4.161

DynaMO—Dynamic Multisuperframe Tuning for Adaptive IEEE 802.15.4e DSME Networks (opens in new window)

Author(s): Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
Published in: IEEE Access, Issue 7, 2019, Page(s) 122522-122535, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2019.2937952

CO-CPS: A sample XSTAMPP usage in V2I traffic management scenario based on STAMP model

Author(s): Leonardo Napoletani
Published in: 5th Scandinavian Conference on SYSTEM & SOFTWARE SAFETY, 2017
Publisher: ICES

Functional Safety and Evolvable Architectures for Autonomy (opens in new window)

Author(s): Rolf Johansson, Jonas Nilsson, Carl Bergenhem, Sagar Behere, Jörgen Tryggvesson, Stig Ursing, Andreas Söderberg, Martin Törngren, Fredrik Warg
Published in: Automated Driving - Automated Driving Safer and More Efficient Future Driving, Issue Book, 2017, Page(s) 547-560
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-31895-0_25

Learning-Based Testing of Cyber-Physical Systems-of-Systems: A Platooning Study (opens in new window)

Author(s): Karl Meinke
Published in: 2017, Page(s) 135-151
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-66583-2_9

Model-Based Safety and Assessment. Lecture Notes in Computer Science, (opens in new window)

Author(s): DeJiu Chen, Zhonghai Lu
Published in: 2017, Page(s) 227-240
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-64119-5_15

Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation (opens in new window)

Author(s): Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson, Stefano Puri
Published in: Reliable Software Technologies – Ada-Europe 2018, Issue 10873, 2018, Page(s) 19-33, ISBN 978-3-319-92431-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-92432-8_2

Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems (opens in new window)

Author(s): Falk Howar, Karl Meinke, Andreas Rausch
Published in: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, Issue 9953, 2016, Page(s) 651-654, ISBN 978-3-319-47168-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-47169-3_50

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0