Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Raffaele Romagnoli"'
Publikováno v:
Future Generation Computer Systems. 144:151-164
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. :1-11
Publikováno v:
IEEE Transactions on Control Systems Technology. :1-16
Autor:
Luis D. Couto, Raffaele Romagnoli, Saehong Park, Dong Zhang, Scott J. Moura, Michel Kinnaert, Emanuele Garone
Publikováno v:
IEEE Transactions on Control Systems Technology. 30:1990-2001
Publikováno v:
IEEE Control Systems Letters. 6:1214-1219
Software rejuvenation was born to fix operating system faults by periodically refreshing the run-time code and data. This mechanism has been extended to protect control systems from cyber-attacks. This letter proposes a software rejuvenation design m
Publikováno v:
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).
Autor:
Emanuele Garone, Michel Kinnaert, Luis D. Couto, Alejandro Goldar, Raffaele Romagnoli, Marco M. Nicotra
Publikováno v:
IEEE transactions on control systems technology, 29 (4
This article proposes and compares a new family of low-complexity control schemes for the fast charge of lithium-ion (Li-ion) battery cells accounting for degradation constraints. These schemes are based on a two-level architecture, where a low-level
Publikováno v:
IEEE Transactions on Automatic Control. 66:2770-2777
The purpose of this article is to reduce some technical difficulties related to the complexity of stability and feasibility analysis of Model Predictive Control (MPC) as well as to reduce the complexity of the relative optimization procedure. The new
Publikováno v:
IFAC-PapersOnLine. 53:5499-5504
Classical scalar Reference Governor (RG) schemes require a convex admissible region. Recently, a novel scalar RG approach has been proposed for the case of nonconvex constraints that can be approximated as union of polyhedral sets. This new method, s
Publikováno v:
IFAC-PapersOnLine. 53:4088-4094
Software rejuvenation has been proposed to guarantee safety of cyber-physical systems (CPSs) against cyber-attacks. Recent work has demonstrated how this method can be applied to more general control problems such as tracking control. Despite this pr