Scientific publications
Explore the publications from TNO‑ESI, showcasing our research findings and expertise. This includes peer-reviewed articles, conference papers, and research reports, as well as more accessible publications that share insights from our collaborations with industry partners. You can easily search the publications by keyword to find what is most relevant to you.
- Year
- 2007
- Authors
- Verhoef, M.; Visser, P.; Hooman, J.; Broenink, J.
Co-simulation of distributed embedded real-time control systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analysis approaches advocated by these disciplines are fundamentally different which complicates reasoning about e.g. performance at the system level.
- Year
- 2007
- Authors
- Oostdijk, M.; Rusu, V.; Tretmans, J.; Vries, R.G. de; Willemse, T.A.C.
Integrating verification testing and learning for cryptographic protocols
The verification of cryptographic protocol specifications is an active research topic and has received much attention from the formal verification community. By contrast, the black-box testing of actual implementations of protocols, which is, arguably, as important as verification for ensuring the correct functioning of protocols in the “real” world, is little studied.
- Year
- 2013
- Authors
- Muller, G.
Formula based performance design
Performance models are mostly simple mathematical formulas. The challenge is to model the performance at an appropriate level. In this presentation we introduce several levels of modeling, labeled zeroth order, second order, et cetera. AS illiustration we use the performance of MRI reconstruction.
- Year
- 2008
- Authors
- Muller, G.
Right Sizing Reference Architectures : How to provide specific guidance with limited information.
The growing complexity and size of systems and the organizations that create these systems trigger the need for instruments that facilitate the creation of these systems. We shortly analyze these trends and the (potential) role of reference architectures as facilitating means. After a short discussion about the content of Reference Architectures and their relation with system architectures, system design and actual systems, we zoom in on the question what the appropriate level of detail is for Reference Architectures.
- Year
- 2024
- Authors
- Piedrafita, A.; Barbini, L.
Leveraging Generative and Probabilistic Models for Diagnostics of Cyber-Physical Systems
A critical task for system operators is the precise identification of the root causes underlying an error situation. This identification is fundamental in deciding optimal maintenance actions, such as replacing a component versus calibrating it. However, the actual causes of an error are often neither measured nor unique.
- Year
- 2009
- Authors
- Yang, Y.; Geilen, M.; Basten, T.; Stuijk, S.; Corporaal, H.
Exploring trade-offs between performance and resource requirements for synchronous dataflow graphs
Synchronous dataflow graphs (SDFGs) are widely used to model streaming applications such as signal processing and multimedia applications. These are often implemented on resource-constrained embedded platforms ranging from PDAs and cell phones to automobile equipment and printing systems. Trade-off analysis between resource usage and performance is critical in the life cycle of those products, from tailoring platformsto target applications at design time to resource management at runtime.
- Year
- 2009
- Authors
- Yang, Y.; Heijenk, G.; Haverkort, B.R.
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback information. With this feedback information, the Transmission Opportunity (TXOP) limit of the sources can be controlled to balance the traffic.
- Year
- 2009
- Authors
- Blagojevic, M.; Nabi, M.; Hendriks, T.; Basten, T.; Geilen, M.
Fast simulation methods to predict wireless sensor network performance
With the increasing capabilities of Wireless Sensor Networks (WSN), complexity and expectation of the WSN applications increase as well. In order to make design-space exploration possible, it is necessary to have fast models that provide adequate insight in system behavior. In this paper, we propose a highly abstracted, hierarchical, system-level modeling method for WSN.
- Year
- 2009
- Authors
- Nabi, M.; Blagojevic, M.; Basten, T.; Geilen, M.; Hendriks, T.
Configuring multi-objective evolutionary algorithms for design-space exploration of wireless sensor networks
Wireless sensor networks (WSNs) consist of numerous sensor nodes with several possible configurations for each node. As there are a lot of nodes in a typical WSN, each with its own set of configurations, the number of configurations for the network as a whole is huge and the design space is extremely large.
- Year
- 2009
- Authors
- Mostowski, W.; Poll, E.; Schmaltz, J.; Tretmans, J.; Schreur, R. Wichers
Model-based testing of electronic passports
Electronic passports, or e-passports for short, contain a contactless smartcard which stores digitally signed data. To rigorously test e-passports, we developed formal models of the e-passport protocols that enable model-based testing using the TorXakis framework.

