Issue Downloads
IoTranx: Transactions for Safer Smart Spaces
Smart spaces such as smart homes deliver digital services to optimize space use and enhance user experience. They are composed of an Internet of Things (IoT), people, and physical content. They differ from traditional computer systems in that their cyber-...
A Novel Approach for Deploying Minimum Sensors in Smart Buildings
Buildings, viewed as cyber-physical systems, become smart by deploying Building Management Systems (BMS). They should be aware about the state and environment of the building. This is achieved by developing a sensing system that senses different ...
Tool Integration for Automated Synthesis of Distributed Embedded Controllers
Controller design and their software implementations are usually done in isolated design spaces using respective COTS design tools. However, this separation of concerns can lead to long debugging and integration phases. This is because assumptions made ...
The Wireless Control Bus: Enabling Efficient Multi-Hop Event-Triggered Control with Concurrent Transmissions
- Matteo Trobinger,
- Gabriel de Albuquerque Gleizer,
- Timofei Istomin,
- Manuel Mazo,
- Amy L. Murphy,
- Gian Pietro Picco
Event-triggered control (ETC) holds the potential to significantly improve the efficiency of wireless networked control systems. Unfortunately, its real-world impact has hitherto been hampered by the lack of a network stack able to transfer its benefits ...
Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered
The recent emergence of Connected Autonomous Vehicles (CAVs) enables the Autonomous Intersection Management (AIM) system, replacing traffic signals and human driving operations for improved safety and road efficiency. When CAVs approach an intersection, ...
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models
In this article, we present a novel approach for continuous operator authentication in teleoperated robotic processes based on Hidden Markov Models (HMM). While HMMs were originally developed and widely used in speech recognition, they have shown great ...
Real-Time Cooling Power Attribution for Co-Located Data Center Rooms with Distinct Temperatures and Humidities
At present, a co-location data center often applies an identical and low temperature setpoint for its all server rooms. Although increasing the temperature setpoint is a rule-of-thumb approach to reducing the cooling energy usage, the tenants may have ...
The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road
This study focuses on the comprehensive investigation of stop-and-go waves appearing in closed-circuit ring road traffic wherein we evaluate various longitudinal dynamical models for vehicles. It is known that the behavior of human-driven vehicles, with ...
Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems
For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. ...