Scientific publications
Explore the publications from TNO‑ESI, showcasing our research findings and expertise. This includes peer-reviewed articles, conference papers, and research reports, as well as more accessible publications that share insights from our collaborations with industry partners. You can easily search the publications by keyword to find what is most relevant to you.
- Year
- 2019
- Authors
- Borth, M.; Barbini, L.
Probabilistic Health and Mission Readiness Assessment at System-Level
Predictive maintenance strategies which estimate remaining useful life of system components ensure reliable availability of assets and low total costs of ownership by preventing breakdowns and down-times with timely and well-scheduled maintenance. The focus on the components’ life times falls short, however, to infer the system-level capability to achieve upcoming tasks, especially if these tasks vary either in the strain they cause for the system or in the environmental conditions in which the system needs to perform.
- Year
- 2019
- Authors
- Vasenev, A.; Stahl, F.; Hamazaryan, H.; Ma, Z.; Shan, L.; Kemmerich, J.; Loiseaux, C.
Practical security and privacy threat analysis in the automotive domain: long term support scenario for over-the-air updates
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research on OTA threats often exclude human actors, such as drivers and maintenance personnel, as well as leave aside privacy threats.
- Year
- 2019
- Authors
- Janssen, R.; Tretmans, J.
Matching implementations to specifications: The Corner Cases of ioco
A well-known conformance relation for model-based testing is ioco. A conformance relation expresses when an implementation is correct with respect to a specification. Unlike many other conformance and refinement relations, ioco has different domains for implementations and for specifications. Consequently, ioco is neither reflexive nor transitive, implying that a specification does not implement itself, and that specifications cannot be compared for refinement.
- Year
- 2019
- Authors
- Sioutas, S.; Stuijk, S.; Waeijen, L.; Basten, T.; Corporaal, H.; Somers, L.
Schedule synthesis for halide pipelines through reuse analysis
- Published in
- ACM Transactions on Architecture and Code Optimization, 16(2)
Efficient code generation for image processing applications continues to pose a challenge in a domain where high performance is often necessary to meet real-time constraints. The inherently complex structure found in most image-processing pipelines, the plethora of transformations that can be applied to optimize the performance of an implementation, as well as the interaction of these optimizations with locality, redundant computation and parallelism, can be indentified as the key reasons behind this issue.
- Year
- 2019
- Authors
- Detterer, P.; Erdin, C.; Nabi, M.; Gyvez, J.P. de; Basten, A.A.; Jiao, H.
Trading Digital Accuracy for Power in an RSSI Computation of a Sensor Network Transceiver
To handle the rigid power and energy constraints in the Digital BaseBand (DBB) of Wireless Sensor Networks (WSN)s, we introduce approximate computing as a new power reduction method. The Received Signal Strength Indicator (RSSI) computation is a key element in DBB processing. We evaluate the trade-off in RSSI computation between Quality-of-Service (QoS) and power consumption through circuit-level approximation.
- Year
- 2019
- Authors
- Fu, Y.; Terechko, A.; Bijlsma, T.; Cuijners, P.J.L.; Redegeld, J.; Ors, A.O.
A retargetable fault injection framework for safety validation of autonomous vehicles
Autonomous vehicles use Electronic Control Units running complex software to improve passenger comfort and safety. To test safety of in-vehicle electronics, the ISO 26262 standard on functional safety recommends using fault injection during component and system-level design. A Fault Injection Framework (FIF) induces hard-to-trigger hardware and software faults at runtime, enabling analysis of fault propagation effects.
- Year
- 2019
- Authors
- Jasper, M.; Mues, M.; Murtovi, A.; Schlüter, M.; Howar, F.; Steffen, B.; Schordan, M.; Hendriks, D.; Schiffelers, R.; Kuppens, H.; Vaandrager, F.W.
RERS 2019: Combining Synthesis with Real-World Models
This paper covers the Rigorous Examination of Reactive Systems (RERS) Challenge 2019. For the first time in the history of RERS, the challenge features industrial tracks where benchmark programs that participants need to analyze are synthesized from real-world models. These new tracks comprise LTL, CTL, and Reachability properties.
- Year
- 2019
- Authors
- Nägele, T.; Hooman, J.
Scalability Analysis of Cloud-Based Distributed Simulations of IoT Systems Using HLA
Gaining insight in the properties of an Internet of Things (IoT) system during the design phase is difficult. The cosimulation of such a system would be very useful, but creating it is usually time consuming. By means of domain specific languages (DSLs) we support the fast construction of large co-simulations of IoT systems.
- Year
- 2019
- Authors
- Yang, N.; Aslam, K.; Schiffelers, R.; Lensink, L.; Hendriks, D.; Cleophas, L.; Serebrenik, A.
Improving Model Inference in Industry by Combining Active and Passive Learning
Inferring behavioral models (e.g., state machines) of software systems is an important element of re-engineering activities. Model inference techniques can be categorized as active or passive learning, constructing models by (dynamically) interacting with systems or (statically) analyzing traces, respectively.
- Year
- 2019
- Authors
- Grappiolo, C.; Gerwen, M.J.A.M. van; Verhoosel, J.P.C.; Somers, L.
The semantic snake charmer search engine: A tool to facilitate data science in high-tech industry domains
The booming popularity of data science is also affecting high-tech industries. However, since these usually have different core competencies - building cyber-physical systems rather than e.g. machine learning or data mining algorithms - delving into data science by domain experts such as system engineers or architects might be more cumbersome than expected.

