This paper presents a design methodology for a hybrid Hardwarein-the-Loop (HIL) tester tool, based on both discrete event system theory, given by timed automata, and continuous sy...
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
A neural model-based predictive control scheme is proposed for dealing with steady-state offsets found in standard MPC schemes. This structure is based on a constrained local inst...
Design patterns represent solutions to specific problem of developing one application that have evolved over time. They leverage the reuse level to the design phase by providing a...
For the tasks of classification, two types of patterns can generate problems: ambiguous patterns and outliers. Furthermore, it is possible to separate classification algorithms in...
Jonathan Milgram, Mohamed Cheriet, Robert Sabourin