![]() ![]() Caruso, Geoffrey ![]() in Antoni, Jean-Philippe (Ed.) Modéliser la ville: formes urbaines et politiques de transport (2011) Detailed reference viewed: 115 (2 UL)![]() Fiandrino, Claudio ![]() in Ars TeXnica (2013), 15 The article illustrates how it is possible to draw some types of switching architectures in a simple manner. The Sa-TikZ library provides not only the keys devoted to the drawing part, but also the keys ... [more ▼] The article illustrates how it is possible to draw some types of switching architectures in a simple manner. The Sa-TikZ library provides not only the keys devoted to the drawing part, but also the keys devoted to customize the aspect of the architectures in the spirit of the TikZ syntax. [less ▲] Detailed reference viewed: 118 (9 UL)![]() Wang, Min ![]() ![]() in Safer UAV Piloting: A Robust Sense-and-Avoid Solution for Remotely Piloted Quadrotor UAVs in Complex Environments (2019, December) Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ... [more ▼] Current commercial UAVs are to a large extent remotely piloted by amateur human pilots. Due to lack of teleoperation experience or skills, they often drive the UAVs into collision. Therefore, in order to ensure safety of the UAV as well as its surroundings, it is necessary for the UAV to boast the capability of detecting emergency situation and acting on its own when facing imminent threat. However, the majority of UAVs currently available in the market are not equipped with such capability. To fill in the gap, in this paper we present a complete sense-and-avoid solution for assisting unskilled pilots in ensuring a safe flight. Particularly, we propose a novel nonlinear vehicle control system which takes into account of sensor characteristics, an emergency evaluation policy and a novel optimization-based avoidance control strategy. The effectiveness of the proposed approach is demonstrated and validated in simulation with multiple moving objects. [less ▲] Detailed reference viewed: 106 (16 UL)![]() ; ; Kasprzak, Mikolaj ![]() in Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS) 2019 (2019) Detailed reference viewed: 52 (9 UL)![]() Schaffer, Peter ![]() in Computer Networks (2012), 56(11), 27262741 In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and ... [more ▼] In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable clustering, which is critical in WSNs deployed in hostile environments, has gained modest attention so far or has been limited only to fault tolerance. In this paper, we review the state-of-the-art of clustering protocols in WSNs with special emphasis on security and reliability issues. First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols. Finally, we propose countermeasures against typical attacks and show how they improve the discussed protocols. [less ▲] Detailed reference viewed: 107 (0 UL)![]() ; McCall, Roderick ![]() ![]() in Papadopoulos, Harris; Andreou, Andreass; Iliadis, Lazaros (Eds.) et al Artificial Intelligence Applications and Innovations (2013) Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot,designed to allow for visitors at two defined locations to interact with one another in a ... [more ▼] Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot,designed to allow for visitors at two defined locations to interact with one another in a joint experience and to get educational/entertainment benefits, originating directly from the museum content delivery. We discuss a set of semi-pervasive games (the so-called “Twin Cities”games) which are designed to bring people together at remotely twinned locations through the use of video-to-video communication and multitouch interaction. We also present an early classification of video-to-video (v2v) interaction games that is designed to inform designers about the potential of such technologies. We classify them as: using video for awareness and communication, interacting with video and video as a game. [less ▲] Detailed reference viewed: 354 (17 UL)![]() Goncalves, Jorge ![]() in Proceedings of the 37th IEEE Conference on Decision and Control (1998) This paper presents semi-global sufficient stability conditions of limit cycles for relay feedback systems. Local stability conditions exist. These are based on analyzing the linear part of the Poincare ... [more ▼] This paper presents semi-global sufficient stability conditions of limit cycles for relay feedback systems. Local stability conditions exist. These are based on analyzing the linear part of the Poincare map. We know that when a certain limit cycle satisfies those local conditions, a neighborhood around the limit cycle exists such that any trajectory starting in this neighborhood converges to the limit cycle as time goes to infinity. However, tools to characterize this neighborhood do not exist. In this work, we present conditions, in the form of linear matrix inequalities (LMI), that guarantee the stability of a limit cycle in a reasonably large set around it. These results differ from previous local results as they take into account the high order terms of the Poincare map. [less ▲] Detailed reference viewed: 133 (2 UL)![]() ; ; Bordas, Stéphane ![]() Scientific Conference (2013, March 25) Detailed reference viewed: 439 (9 UL)![]() ; ; Bordas, Stéphane ![]() Scientific Conference (2013, March) Detailed reference viewed: 305 (1 UL)![]() ; ; Bordas, Stéphane ![]() Scientific Conference (2012, March 27) Detailed reference viewed: 292 (5 UL)![]() ; ; Bordas, Stéphane ![]() Scientific Conference (2014, July) Detailed reference viewed: 394 (7 UL)![]() ; ; Viti, Francesco ![]() in 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC) (2020, December) Detailed reference viewed: 112 (9 UL)![]() ; ; Viti, Francesco ![]() Scientific Conference (2021, February) Detailed reference viewed: 19 (0 UL)![]() Rinaldi, Marco ![]() in Transportation Research. Part C : Emerging Technologies (2016), 66 Anticipatory optimal network control is defined as the problem of determining the set of control actions that minimizes a network-wide objective function. This not only takes into account local ... [more ▼] Anticipatory optimal network control is defined as the problem of determining the set of control actions that minimizes a network-wide objective function. This not only takes into account local consequences on the propagation of flows, but also the global network-wide routing behavior of the users. Such an objective function is, in general, defined in a centralized setting, as knowledge regarding the whole network is needed to correctly compute it. Reaching a level of centralization sufficient to attain network-wide control objectives is however rarely realistic in practice. Multiple authorities are influencing different portions the network, separated either hierarchically or geographically. The distributed nature of networks and traffic directly influences the complexity of the anticipatory control problem. This is our motivation for this work, in which we introduce a decomposition mechanism for the global anticipatory network traffic control problem, based on dynamic clustering of traffic controllers. Rather than solving the full centralized problem, or blindly performing a full controller-wise decomposition, this technique allows recognizing when and which controllers should be grouped in clusters, and when, instead, these can be optimized separately. The practical relevance with respect to our motivation is that our approach allows identification of those network traffic conditions in which multiple actors need to actively coordinate their actions, or when unilateral action suffices for still approximating global optimality. This clustering procedure is based on well-known algebraic and statistical tools that exploit the network's sensitivity to control and its structure to deduce coupling behavior. We devise several case studies in order to assess our newly introduced procedure's performances, in comparison with fully decomposed and fully centralized anticipatory optimal network control, and show that our approach is able to outperform both centralized and decomposed procedures. © 2016 Elsevier Ltd. [less ▲] Detailed reference viewed: 103 (3 UL)![]() Schafer, Valerie ![]() in Technique et Science Informatiques (2014) Des bases de données au « data déluge » actuel, Serge Abiteboul se passionne depuis plus de trente ans pour un domaine qui ne cesse d’évoluer et de nous confronter à de nouveaux défis, techniques, mais ... [more ▼] Des bases de données au « data déluge » actuel, Serge Abiteboul se passionne depuis plus de trente ans pour un domaine qui ne cesse d’évoluer et de nous confronter à de nouveaux défis, techniques, mais aussi sociétaux. Il a reçu en 2013 le prix Milner de la Royal Society et vient d’achever le projet Webdam sur la gestion des données, pour lequel il avait été lauréat en 2008 d’une bourse ERC. Membre de l’Académie des Sciences et du Conseil National du Numérique, président du conseil scientifique de la SIF, co-fondateur du blog binaire, Serge Abiteboul, chercheur à Inria, revient sur sa carrière, ses recherches et éclaire pour nous quelques-uns des enjeux que pose aujourd’hui le numérique. [less ▲] Detailed reference viewed: 67 (1 UL)![]() ; ; Bordas, Stéphane ![]() Report (2016) Detailed reference viewed: 356 (5 UL)![]() ; Bordas, Stéphane ![]() Report (2014) Detailed reference viewed: 272 (18 UL)![]() ; Mauroy, Alexandre ![]() ![]() in 10th IFAC Symposium on Nonlinear Control Systems (2016, August) In this paper, we further develop a recently proposed control method to switch a bistable system between its steady states using temporal pulses. The motivation for using pulses comes from biomedical and ... [more ▼] In this paper, we further develop a recently proposed control method to switch a bistable system between its steady states using temporal pulses. The motivation for using pulses comes from biomedical and biological applications (e.g. synthetic biology), where it is generally di cult to build feedback control systems due to technical limitations in sensing and actuation. The original framework was derived for monotone systems and all the extensions relied on monotone systems theory. In contrast, we introduce the concept of switching function which is related to eigenfunctions of the so-called Koopman operator subject to a xed control pulse. Using the level sets of the switching function we can (i) compute the set of all pulses that drive the system toward the steady state in a synchronous way and (ii) estimate the time needed by the ow to reach an epsilon neighborhood of the target steady state. Additionally, we show that for monotone systems the switching function is also monotone in some sense, a property that can yield e cient algorithms to compute it. This observation recovers and further extends the results of the original framework, which we illustrate on numerical examples inspired by biological applications. [less ▲] Detailed reference viewed: 126 (1 UL)![]() Eisenbart, Boris ![]() ![]() ![]() in Proceedings of Norddesign 2012 (2012) The presented research aims at contributing to a better understanding of the diverse functional modelling approaches proposed across disciplines, often involving more than one function model. The paper ... [more ▼] The presented research aims at contributing to a better understanding of the diverse functional modelling approaches proposed across disciplines, often involving more than one function model. The paper presents a review of 41 systematic design approaches from different disciplines, analysing what is addressed by functional modelling at which point in the proposed development process, i.e. in which sequence, if any. The analysis aims at deriving potential commonalities across disciplines, which could support the development of an integrative functional modelling approach. Finally, the results of the analysis are discussed, concluding that while there seems to be no shared sequence in functional modelling across disciplines, a common base can be derived, with regard to what is prominently addressed by functional modelling in the different disciplines. [less ▲] Detailed reference viewed: 80 (4 UL)![]() ; ; Ermolaev, Egor ![]() in Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct (2018) Networked digital sharing economy services enable the effective and efficient sharing of vehicles, housing, and everyday objects. However, contemporary online sharing platforms face several challenges ... [more ▼] Networked digital sharing economy services enable the effective and efficient sharing of vehicles, housing, and everyday objects. However, contemporary online sharing platforms face several challenges related to the establishment of trust among peers, as well difficulties to deal with the growing number of intermediaries (e.g., payment, insurance) needed to ensure an adequate service delivery. We designed and developed "Just Share It" (JSI), an interactive system that enables the sharing of personal physical possessions (e.g., power tools, toys, sports gear) by directly connecting lenders and borrowers, as peers, through mobile technology. The JSI system utilizes a blockchain ledger and smart contracting technologies to improve peer trust and limit the number of required intermediaries, respectively. In this submission, we briefly review emergent challenges in this space, describe the JSI prototype system and its trust model, and reflect on future architectural opportunities for an eventual "in the wild" deployment. [less ▲] Detailed reference viewed: 40 (4 UL) |
||