default search action
Simin Nadjm-Tehrani
Person information
- affiliation: Linköping University, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Rodrigo Saar de Moraes, Simin Nadjm-Tehrani:
NetGAP: A graph grammar approach for concept design of networked platforms with extra-functional requirements. Eng. Appl. Artif. Intell. 133: 108089 (2024) - [j36]Klervie Toczé, Simin Nadjm-Tehrani:
The Necessary Shift: Toward a Sufficient Edge Computing. IEEE Pervasive Comput. 23(2): 7-16 (2024) - [c94]Rodrigo S. de Moraes, Simin Nadjm-Tehrani:
NeuralGAP: Deep Learning Evaluation of Networked Avionic Architectures. EDCC 2024: 107-110 - [i11]Klervie Toczé, Simin Nadjm-Tehrani:
Energy-aware Distributed Microservice Request Placement at the Edge. CoRR abs/2408.13748 (2024) - 2023
- [j35]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Secur. Priv. 21(6): 64-75 (2023) - [j34]Chih-Yuan Lin, Simin Nadjm-Tehrani:
Protocol study and anomaly detection for server-driven traffic in SCADA networks. Int. J. Crit. Infrastructure Prot. 42: 100612 (2023) - [j33]Simona Bernardi, Matthias Eckhart, José Merseguer, Simin Nadjm-Tehrani:
Dependable and secure infrastructures and systems in intelligent environments. J. Reliab. Intell. Environ. 9(3): 261-262 (2023) - [j32]Klervie Toczé, Ali J. Fahs, Guillaume Pierre, Simin Nadjm-Tehrani:
VioLinn: Proximity-aware Edge Placementwith Dynamic and Elastic Resource Provisioning. ACM Trans. Internet Things 4(1): 7:1-7:31 (2023) - [c93]Valency Oscar Colaco, Simin Nadjm-Tehrani:
Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations. SafeAI@AAAI 2023 - [c92]Matyas Barocsai, Johan Can, Martin Karresand, Simin Nadjm-Tehrani:
Mapping and Analysis of Common Vulnerabilities in Popular Web Servers. critis 2023: 3-22 - [c91]Roland Plaka, Mikael Asplund, Simin Nadjm-Tehrani:
Vulnerability Analysis of an Electric Vehicle Charging Ecosystem. critis 2023: 155-173 - [c90]Navya Sivaraman, Simin Nadjm-Tehrani:
5G Handover: When Forward Security Breaks. SECRYPT 2023: 503-510 - [i10]John Törnblom, Emil Karlsson, Simin Nadjm-Tehrani:
Finding Minimum-Cost Explanations for Predictions made by Tree Ensembles. CoRR abs/2303.09271 (2023) - [i9]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. CoRR abs/2305.00639 (2023) - [i8]Rodrigo Saar de Moraes, Simin Nadjm-Tehrani:
NetGAP: A Graph-Grammar approach for concept design of networked platforms with extra-functional requirements. CoRR abs/2306.07778 (2023) - 2022
- [j31]Fellipe Guilherme Rey de Souza, Celso Massaki Hirata, Simin Nadjm-Tehrani:
Synthesis of a Controller Algorithm for Safety-Critical Systems. IEEE Access 10: 76351-76375 (2022) - [i7]Alvaro A. Cárdenas-Mora, Simin Nadjm-Tehrani, Edgar R. Weippl, Matthias Eckhart:
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171). Dagstuhl Reports 12(4): 54-71 (2022) - 2021
- [j30]Rodrigo Saar de Moraes, Simin Nadjm-Tehrani:
Abstraction models for verifying resource adequacy of IMA systems at concept level. Sci. Comput. Program. 208: 102654 (2021) - [j29]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection. ACM Trans. Priv. Secur. 24(2): 8:1-8:39 (2021) - [c89]Rodrigo Saar de Moraes, Simona Bernardi, Simin Nadjm-Tehrani:
A model-based approach for analysing network communication timeliness in IMA systems at concept level. RTNS 2021: 78-88 - [e2]Mikael Asplund, Simin Nadjm-Tehrani:
Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings. Lecture Notes in Computer Science 12556, Springer 2021, ISBN 978-3-030-70851-1 [contents] - [i6]John Törnblom, Simin Nadjm-Tehrani:
Scaling up Memory-Efficient Formal Verification Tools for Tree Ensembles. CoRR abs/2105.02595 (2021) - 2020
- [j28]Sara Bergman, Mikael Asplund, Simin Nadjm-Tehrani:
Permissioned blockchains and distributed databases: A performance study. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j27]Klervie Toczé, Johan Lindqvist, Simin Nadjm-Tehrani:
Characterization and modeling of an edge computing mixed reality workload. J. Cloud Comput. 9: 46 (2020) - [j26]Tobias Sund, Claes Lööf, Simin Nadjm-Tehrani, Mikael Asplund:
Blockchain-based event processing in supply chains - A case study at IKEA. Robotics Comput. Integr. Manuf. 65: 101971 (2020) - [j25]John Törnblom, Simin Nadjm-Tehrani:
Formal verification of input-output mappings of tree ensembles. Sci. Comput. Program. 194: 102450 (2020) - [j24]Antonio Augusto da Fontoura, Francisco Assis Moreira do Nascimento, Simin Nadjm-Tehrani, Edison Pignaton de Freitas:
Timing Assurance of Avionic Reconfiguration Schemes Using Formal Analysis. IEEE Trans. Aerosp. Electron. Syst. 56(1): 95-106 (2020) - [c88]Chih-Yuan Lin, Simin Nadjm-Tehrani:
A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. CPS4CIP 2020: 207-223 - [e1]Simin Nadjm-Tehrani:
Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23-25, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11777, Springer 2020, ISBN 978-3-030-37669-7 [contents]
2010 – 2019
- 2019
- [j23]Daniel Patrick Pereira, Celso M. Hirata, Simin Nadjm-Tehrani:
A STAMP-based ontology approach to support safety and security analyses. J. Inf. Secur. Appl. 47: 302-319 (2019) - [c87]Rodrigo Saar de Moraes, Simin Nadjm-Tehrani:
Verifying Resource Adequacy of Networked IMA Systems at Concept Level. FTSCS 2019: 40-56 - [c86]Klervie Toczé, Simin Nadjm-Tehrani:
ORCH: Distributed Orchestration Framework using Mobile Edge Devices. ICFEC 2019: 1-10 - [c85]Chih-Yuan Lin, Simin Nadjm-Tehrani:
Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. RAID 2019: 73-88 - [c84]Celso M. Hirata, Simin Nadjm-Tehrani:
Combining GSN and STPA for Safety Arguments. SAFECOMP Workshops 2019: 5-15 - [c83]John Törnblom, Simin Nadjm-Tehrani:
An Abstraction-Refinement Approach to Formal Verification of Tree Ensembles. SAFECOMP Workshops 2019: 301-313 - [c82]Klervie Toczé, Norbert Schmitt, Ivona Brandic, Atakan Aral, Simin Nadjm-Tehrani:
Towards Edge Benchmarking: A Methodology for Characterizing Edge Workloads. FAS*W@SASO/ICAC 2019: 70-71 - [c81]Klervie Toczé, Johan Lindqvist, Simin Nadjm-Tehrani:
Performance Study of Mixed Reality for Edge Computing. UCC 2019: 285-294 - [i5]Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On generating network traffic datasets with synthetic attacks for intrusion detection. CoRR abs/1905.00304 (2019) - [i4]John Törnblom, Simin Nadjm-Tehrani:
Formal Verification of Input-Output Mappings of Tree Ensembles. CoRR abs/1905.04194 (2019) - 2018
- [j22]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Fault and timing analysis in critical multi-core systems: A survey with an avionics perspective. J. Syst. Archit. 87: 1-11 (2018) - [j21]Klervie Toczé, Simin Nadjm-Tehrani:
A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing. Wirel. Commun. Mob. Comput. 2018: 7476201:1-7476201:23 (2018) - [c80]Chih-Yuan Lin, Simin Nadjm-Tehrani:
Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks. CPSS@AsiaCCS 2018: 51-60 - [c79]Magnus Almgren, Peter Andersson, Gunnar Björkman, Mathias Ekstedt, Jonas Hallberg, Simin Nadjm-Tehrani, Erik Westring:
RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper). CRITIS 2018: 219-225 - [c78]John Törnblom, Simin Nadjm-Tehrani:
Formal Verification of Random Forests in Safety-Critical Applications. FTSCS 2018: 55-71 - [c77]Mikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani:
In-Store Payments Using Bitcoin. NTMS 2018: 1-6 - [i3]Klervie Toczé, Simin Nadjm-Tehrani:
A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing. CoRR abs/1801.05610 (2018) - 2017
- [c76]Klervie Toczé, Simin Nadjm-Tehrani:
Where Resources Meet at the Edge. CIT 2017: 302-307 - [c75]Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund:
Timing-Based Anomaly Detection in SCADA Networks. CRITIS 2017: 48-59 - [c74]Daniel Patrick Pereira, Celso M. Hirata, Rodrigo Pagliares, Simin Nadjm-Tehrani:
Towards Combined Safety and Security Constraints Analysis. SAFECOMP Workshops 2017: 70-80 - [c73]Jalil Boudjadar, Simin Nadjm-Tehrani:
Schedulability and Memory Interference Analysis of Multicore Preemptive Real-time Systems. ICPE 2017: 263-274 - 2016
- [j20]Mikael Asplund, Simin Nadjm-Tehrani:
Attitudes and Perceptions of IoT Security in Critical Societal Services. IEEE Access 4: 2130-2138 (2016) - [j19]Oscar Somarriba Jarquín, Urko Zurutuza, Roberto Uribeetxeberria, Laurent Delosières, Simin Nadjm-Tehrani:
Detection and Visualization of Android Malware Behavior. J. Electr. Comput. Eng. 2016: 8034967:1-8034967:17 (2016) - [j18]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund:
Fairness and Incentive Considerations in Energy Apportionment Policies. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 2:1-2:29 (2016) - [c72]Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt:
Exploiting Bro for Intrusion Detection in a SCADA System. CPSS@AsiaCCS 2016: 44-51 - [c71]Jalil Boudjadar, Jin Hyun Kim, Simin Nadjm-Tehrani:
Performance-aware scheduling of multicore time-critical systems. MEMOCODE 2016: 105-114 - [c70]Klervie Toczé, Maria Vasilevskaya, Patrik Sandahl, Simin Nadjm-Tehrani:
Maintainability of functional reactive programs in a telecom server software. SAC 2016: 2001-2003 - [c69]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Understanding Shared Memory Bank Access Interference in Multi-Core Avionics. WCET 2016: 12:1-12:11 - 2015
- [j17]Maria Vasilevskaya, Simin Nadjm-Tehrani:
Support for cross-domain composition of embedded systems using MARTE models. SIGBED Rev. 12(1): 37-45 (2015) - [c68]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform. ISSRE 2015: 153-160 - [c67]Mathias Almquist, Viktor Almquist, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Communication Energy Overhead of Mobiles Games. MobiGames@MobiSys 2015: 1-6 - [c66]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund:
Sharing the Cost of Lunch: Energy Apportionment Policies. Q2SWinet@MSWiM 2015: 91-97 - [c65]Maria Vasilevskaya, Simin Nadjm-Tehrani:
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design. SAFECOMP 2015: 347-361 - 2014
- [j16]Aruna Prem Bianzino, Mikael Asplund, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Cooperative proxies: Optimally trading energy and quality of service in mobile devices. Comput. Networks 75: 297-312 (2014) - [j15]Maria Vasilevskaya, Linda Ariani Gunawan, Simin Nadjm-Tehrani, Peter Herrmann:
Integrating security mechanisms into embedded systems by domain-specific modelling. Secur. Commun. Networks 7(12): 2815-2832 (2014) - [j14]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mihails Prihodko:
EnergyBox: Disclosing the wireless transmission energy cost for mobile devices. Sustain. Comput. Informatics Syst. 4(2): 118-135 (2014) - [c64]Maria Vasilevskaya, Simin Nadjm-Tehrani:
Model-Based Security Risk Analysis for Networked Embedded Systems. CRITIS 2014: 381-386 - [c63]Ekhiotz Jon Vergara, Simon Andersson, Simin Nadjm-Tehrani:
When mice consume like elephants: instant messaging applications. e-Energy 2014: 97-107 - [c62]Andreas Löfwenmark, Simin Nadjm-Tehrani:
Challenges in Future Avionic Systems on Multi-Core Platforms. ISSRE Workshops 2014: 115-119 - [c61]Javier Marian Santos, Simin Nadjm-Tehrani, Aruna Prem Bianzino:
Monkey Gamer: Automatic profiling of Android games. MobiCASE 2014: 125-132 - [i2]Mikael Asplund, Simin Nadjm-Tehrani:
Modelling Correlated Mobility. CoRR abs/1409.6431 (2014) - 2013
- [j13]Gabriel Sandulescu, Péter Schaffer, Simin Nadjm-Tehrani:
Exploiting resource heterogeneity in delay-tolerant networks. Wirel. Commun. Mob. Comput. 13(3): 230-243 (2013) - [c60]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
EnergyBox: A Trace-Driven Tool for Data Transmission Energy Consumption Studies. EE-LSDS 2013: 19-34 - [c59]Ekhiotz Jon Vergara, Mihails Prihodko, Simin Nadjm-Tehrani:
Mobile location sharing: an energy consumption study. e-Energy 2013: 289-290 - [c58]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Watts2Share: Energy-Aware Traffic Consolidation. GreenCom/iThings/CPScom 2013: 14-22 - [c57]Ekhiotz Jon Vergara, Joseba Sanjuan, Simin Nadjm-Tehrani:
Kernel level energy-efficient 3G background traffic shaper for android smartphones. IWCMC 2013: 443-449 - 2012
- [j12]Erik Kuiper, Simin Nadjm-Tehrani, Di Yuan:
A framework for performance analysis of geographic delaytolerant routing. EURASIP J. Wirel. Commun. Netw. 2012: 184 (2012) - [j11]Mikael Asplund, Simin Nadjm-Tehrani:
Worst-case latency of broadcast in intermittently connected networks. Int. J. Ad Hoc Ubiquitous Comput. 11(2/3): 125-138 (2012) - [j10]Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani, Tiziano Santoro:
Surviving Attacks in Challenged Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 917-929 (2012) - [c56]Mikael Asplund, Simin Nadjm-Tehrani:
Analysing Delay-Tolerant Networks with Correlated Mobility. ADHOC-NOW 2012: 83-97 - [c55]Massimiliano Raciti, Simin Nadjm-Tehrani:
Embedded Cyber-Physical Anomaly Detection in Smart Meters. CRITIS 2012: 34-45 - [c54]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Energy-aware cross-layer burst buffering for wireless communication. e-Energy 2012: 24 - [c53]Maria Vasilevskaya, Simin Nadjm-Tehrani, Linda Ariani Gunawan, Peter Herrmann:
Security asset elicitation for collaborative models. MDsec@MoDELS 2012: 7 - [c52]Laurent Delosières, Simin Nadjm-Tehrani:
BATMAN store-and-forward: The best of the two worlds. PerCom Workshops 2012: 721-727 - [p3]Massimiliano Raciti, Jordi Cucurull, Simin Nadjm-Tehrani:
Anomaly Detection in Water Management Systems. Critical Infrastructure Protection 2012: 98-119 - 2011
- [j9]Erik Kuiper, Simin Nadjm-Tehrani:
Geographical Routing With Location Service in Intermittently Connected MANETs. IEEE Trans. Veh. Technol. 60(2): 592-604 (2011) - [c51]Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani:
Crowdroid: behavior-based malware detection system for Android. SPSM@CCS 2011: 15-26 - [c50]Simin Nadjm-Tehrani, Maria Vasilevskaya:
Towards a Security Domain Model for Embedded Systems. HASE 2011: 180-181 - [c49]Erik Kuiper, Simin Nadjm-Tehrani:
Predicting the performance of geographic delay-tolerant routing. MILCOM 2011: 1003-1008 - [c48]Mikael Asplund, Anton Thomasson, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Software-related energy footprint of a wireless broadband module. MOBIWAC 2011: 75-82 - [c47]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund, Urko Zurutuza:
Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms. NGMAST 2011: 154-160 - [c46]Jordi Cucurull, Simin Nadjm-Tehrani, Massimiliano Raciti:
Modular Anomaly Detection for Smartphone Ad Hoc Communication. NordSec 2011: 65-81 - [c45]Massimiliano Raciti, Jordi Cucurull, Simin Nadjm-Tehrani:
Energy-based adaptation in simulations of survivability of ad hoc communication. Wireless Days 2011: 1-7 - 2010
- [j8]Gabriel Sandulescu, Simin Nadjm-Tehrani:
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing. J. Commun. 5(2): 117-129 (2010) - [c44]Mikael Asplund, Trishan R. de Lanerolle, Christopher Fei, Prasanna Gautam, Ralph A. Morelli, Simin Nadjm-Tehrani, Gustav Nykvist:
Wireless ad hoc dissemination for search and rescue. ISCRAM 2010 - [c43]Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani:
Anomaly Detection and Mitigation for Disaster Area Networks. RAID 2010: 339-359 - [c42]Gabriel Sandulescu, Péter Schaffer, Simin Nadjm-Tehrani:
Vicinity resource cartography for delay-tolerant networks: A holistic perspective. Wireless Days 2010: 1-7
2000 – 2009
- 2009
- [j7]Mikael Asplund, Simin Nadjm-Tehrani, Klemen Zagar:
Middleware extensions that trade consistency for availability. Concurr. Comput. Pract. Exp. 21(9): 1181-1203 (2009) - [c41]Mikael Asplund, Simin Nadjm-Tehrani:
A Partition-Tolerant Manycast Algorithm for Disaster Area Networks. SRDS 2009: 156-165 - [i1]Moisés Goldszmidt, Miroslaw Malek, Simin Nadjm-Tehrani, Priya Narasimhan, Felix Salfner, Paul A. S. Ward, John Wilkes:
Wheels within Wheels: Making Fault Management Cost-Effective. Self-Healing and Self-Adaptive Systems 2009 - 2008
- [j6]Calin Curescu, Simin Nadjm-Tehrani:
A Bidding Algorithm for Optimized Utility-Based Resource Allocation in Ad Hoc Networks. IEEE Trans. Mob. Comput. 7(12): 1397-1414 (2008) - [c40]Erik Kuiper, Simin Nadjm-Tehrani:
Geographical Routing in Intermittently Connected Ad Hoc Networks. AINA Workshops 2008: 1690-1695 - [c39]Gabriel Sandulescu, Simin Nadjm-Tehrani:
Opportunistic DTN routing with window-aware adaptive replication. AINTEC 2008: 103-112 - [c38]Mikael Asplund, Simin Nadjm-Tehrani, Johan Sigholm:
Emerging Information Infrastructures: Cooperation in Disasters. CRITIS 2008: 258-270 - [c37]Jonas Elmqvist, Simin Nadjm-Tehrani:
Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems. DATE 2008: 921-927 - [c36]Jonas Elmqvist, Simin Nadjm-Tehrani:
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems. HASE 2008: 154-164 - 2007
- [j5]Kalle Burbeck, Simin Nadjm-Tehrani:
Adaptive real-time anomaly detection with incremental clustering. Inf. Secur. Tech. Rep. 12(1): 56-67 (2007) - [c35]Mikael Asplund, Simin Nadjm-Tehrani, Stefan Beyer, Pablo Galdámez:
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints. DSN 2007: 656-665 - 2006
- [c34]Erik Kuiper, Simin Nadjm-Tehrani:
Mobility Models for UAV Group Reconnaissance Applications. ICWMC 2006: 33 - [c33]Marcel Lüthi, Simin Nadjm-Tehrani, Calin Curescu:
Comparative study of price-based resource allocation algorithms for ad hoc networks. IPDPS 2006 - [c32]Mikael Asplund, Simin Nadjm-Tehrani:
Formalising Reconciliation in Partitionable Networks with Distributed Services. RODIN Book 2006: 37-58 - [c31]Mikael Asplund, Simin Nadjm-Tehrani:
Post-partition reconciliation protocols for maintaining consistency. SAC 2006: 710-717 - [c30]Jonas Elmqvist, Simin Nadjm-Tehrani:
Safety-Oriented Design of Component Assemblies using Safety Interfaces. FACS 2006: 57-72 - 2005
- [j4]Jerker Hammarberg, Simin Nadjm-Tehrani:
Formal verification of fault tolerance in safety-critical reconfigurable modules. Int. J. Softw. Tools Technol. Transf. 7(3): 268-279 (2005) - [j3]Calin Curescu, Simin Nadjm-Tehrani:
Time-Aware Utility-Based Resource Allocation in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 16(7): 624-636 (2005) - [c29]Diana Szentiványi, Simin Nadjm-Tehrani:
Configuring Fault-Tolerant Servers for Best Performance. DEXA Workshops 2005: 310-314 - [c28]Kristina Forsberg, Simin Nadjm-Tehrani, Jan Torin:
Fault Analysis of a Distributed Flight Control System. HICSS 2005 - [c27]Kalle Burbeck, Simin Nadjm-Tehrani:
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget. ICDCS Workshops 2005: 195-202 - [c26]Diana Szentiványi, Simin Nadjm-Tehrani, John M. Noble:
Optimal Choice of Checkpointing Interval for High Availability. PRDC 2005: 159-166 - [c25]Calin Curescu, Simin Nadjm-Tehrani, Bing Cao, Teresa A. Dahlberg:
Utility-based Adaptive Resource Allocation in Hybrid Wireless Networks. QSHINE 2005: 44 - [c24]Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea:
Safety Interfaces for Component-Based Systems. SAFECOMP 2005: 246-260 - [c23]Calin Curescu, Simin Nadjm-Tehrani:
Price/utility-based optimized resource allocation in wireless ad hoc networks. SECON 2005: 85-95 - [p2]Jonas Elmqvist, Simin Nadjm-Tehrani:
Intents and Upgrades in Component-Based High-Assurance Systems. Model-Driven Software Development 2005: 289-303 - [p1]Aleksandra Tesanovic, Simin Nadjm-Tehrani, Jörgen Hansson:
Modular Verification of Reconfigurable Components. Component-Based Software Development for Embedded Systems 2005: 59-81 - 2004
- [c22]Kalle Burbeck, Simin Nadjm-Tehrani:
ADWICE - Anomaly Detection with Real-Time Incremental Clustering. ICISC 2004: 407-424 - [c21]Kalle Burbeck, Daniel Garpe, Simin Nadjm-Tehrani:
Scale-up and performance studies of three agent platforms. IPCCC 2004: 857-863 - [c20]Diana Szentiványi, Simin Nadjm-Tehrani:
Aspects for Improvement of Performance in Fault-Tolerant Software. PRDC 2004: 283-291 - [c19]Mehdi Amirijoo, Aleksandra Tesanovic, Simin Nadjm-Tehrani:
Raising motivation in real-time laboratories: the soccer scenario. SIGCSE 2004: 265-269 - [c18]Tobias Chyssler, Simin Nadjm-Tehrani, Stefan Burschka, Kalle Burbeck:
Alarm Reduction and Correlation in Defence of IP Networks. WETICE 2004: 229-234 - 2003
- [c17]Calin Curescu, Simin Nadjm-Tehrani:
Time-Aware Utility-Based QoS Optimisation. ECRTS 2003: 83- - [c16]Jerker Hammarberg, Simin Nadjm-Tehrani:
Development of Safety-Critical Reconfigurable Hardware with Esterel. FMICS 2003: 219-234 - 2002
- [c15]Christoph W. Keßler, Simin Nadjm-Tehrani:
Mid-term course evaluations with muddy cards. ITiCSE 2002: 233 - [c14]Simin Nadjm-Tehrani, Kayvan Najarian, Calin Curescu, Tomas Lingvall, Teresa A. Dahlberg:
Adaptive load control algorithms for 3rd generation mobile networks. MSWiM 2002: 104-111 - 2001
- [c13]Erik Herzog, Peter Loborg, Simin Nadjm-Tehrani:
Real-time lab excercises: a teacher's dilemma. SIGCSE 2001: 273-277 - 2000
- [c12]Stéphane Tudoret, Simin Nadjm-Tehrani, Albert Beneviste, Jan-Erik Strömberg:
Co-simulation of Hybrid Systems: Signal-Simulink. FTRTFT 2000: 134-151
1990 – 1999
- 1999
- [j2]Simin Nadjm-Tehrani, Jan-Erik Strömberg:
Formal Verification of Dynamic Properties in an Aerospace Application. Formal Methods Syst. Des. 14(2): 135-169 (1999) - [c11]Man Lin, Jacek Malec, Simin Nadjm-Tehrani:
On Semantics and Correctness of Reactive Rule-Based Programs. Ershov Memorial Conference 1999: 235-246 - [c10]Simin Nadjm-Tehrani, Ove Åkerlund:
Combining Theorem Proving and Continuous Models in Synchronous Design. World Congress on Formal Methods 1999: 1384-1399 - [c9]Simin Nadjm-Tehrani:
Integration of Analog and Discrete Synchronous Design. HSCC 1999: 193-208 - 1997
- [c8]Man Lin, Jacek Malec, Simin Nadjm-Tehrani:
On Semantics of Reactive Rule-Based Systems. ASIAN 1997: 379-380 - [c7]Simin Nadjm-Tehrani:
Time-Deterministic Hybrid Transition Systems. Hybrid Systems 1997: 238-250 - 1996
- [c6]Martin Westhead, Simin Nadjm-Tehrani:
Verification of Embedded Systems Using Synchronous Observers. FTRTFT 1996: 405-419 - 1995
- [c5]Jan-Erik Strömberg, Simin Nadjm-Tehrani, Jan L. Top:
Switched Bond Graphs as Front-End to Formal Verification of Hybrid Systems. Hybrid Systems 1995: 282-293 - [c4]Simin Nadjm-Tehrani, Jan-Erik Strömberg:
Proving Dynamic Properties in an Aerospace Application. RTSS 1995: 2-10 - 1994
- [c3]Simin Nadjm-Tehrani, Jan-Erik Strömberg:
From Physical Modelling to Compositional Models of Hybrid Systems. FTRTFT 1994: 583-604 - 1992
- [j1]Magnus Morin, Simin Nadjm-Tehrani, Per Österling, Erik Sandewall:
Real-Time Hierarchical Control. IEEE Softw. 9(5): 51-57 (1992)
1980 – 1989
- 1988
- [c2]Wlodzimierz Drabent, Simin Nadjm-Tehrani, Jan Maluszynski:
The Use of Assertions in Algorithmic Debugging. FGCS 1988: 573-581 - [c1]Wlodzimierz Drabent, Simin Nadjm-Tehrani, Jan Maluszynski:
Algorithmic Debugging with Assertions. META 1988: 501-521
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint