Search for dissertations about: "Björn Victor"
Showing result 1 - 5 of 14 swedish dissertations containing the words Björn Victor.
-
1. The Fusion Calculus : Expressiveness and Symmetry in Mobile Processes
Abstract : The fusion calculus is presented as a significant step towards a canonical calculus of concurrency. It simplifies and extends the π-calculus of Milner, Parrow and Walker.The fusion calculus contains the polyadic π-calculus as a proper subcalculus and thus inherits all its expressive power. READ MORE
-
2. Autonomous Vehicle Maneuvering at the Limit of Friction
Abstract : Without a driver to fall back on, a fully self-driving car needs to be able to handle any situation it can encounter. With the perspective of future safety systems, this research studies autonomous maneuvering at the tire-road friction limit. In these situations, the dynamics is highly nonlinear, and the tire-road parameters are uncertain. READ MORE
-
3. Optimal Braking Patterns and Forces in Autonomous Safety-Critical Maneuvers
Abstract : The trend of more advanced driver-assistance features and the development toward autonomous vehicles enable new possibilities in the area of active safety. With more information available in the vehicle about the surrounding traffic and the road ahead, there is the possibility of improved active-safety systems that make use of this information for stability control in safety-critical maneuvers. READ MORE
-
4. Equivalences and Calculi for Formal Verification of Cryptographic Protocols
Abstract : Security protocols are essential to the proper functioning of any distributed system running over an insecure network but often have flaws that can be exploited even without breaking the cryptography. Formal cryptography, the assumption that the cryptographic primitives are flawless, facilitates the construction of formal models and verification tools. READ MORE
-
5. Protocol, mobility and adversary models for the verification of security
Abstract : The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. READ MORE