Publications by authors named "Daniel-Ioan Curiac"

Data-driven expert team formation is a complicated and multifaceted process that requires access to accurate information to identify researchers' areas and level of expertise and their collaborative prospects. In this respect, bibliometric data represents a valuable and reliable source of information that can be effectively employed in revealing key insights regarding candidates. Due to its complex and complete structure of publication metadata records, IEEE Xplore database may offer the possibility to compute an extensive set of indicators about researchers' publication production and how they have interacted during time.

View Article and Find Full Text PDF

Mixed criticality systems are one of the relatively new directions of development for the classical real-time systems. As the real-time embedded systems become more and more complex, incorporating different tasks with different criticality levels, the continuous development of mixed criticality systems is only natural. These systems have practically entered every field where embedded systems are present: avionics, automotive, medical systems, wearable devices, home automation, industry and even the Internet of Things.

View Article and Find Full Text PDF

Nowadays, REpresentational State Transfer Application Programming Interfaces (REST APIs) are widely used in web applications, hence a plethora of test cases are developed to validate the APIs calls. We propose a solution that automates the generation of test cases for REST APIs based on their specifications. In our approach, apart from the automatic generation of test cases, we provide an option for the user to influence the test case generation process.

View Article and Find Full Text PDF

Living organisms have developed and optimized ingenious defense strategies based on positional entropy. One of the most significant examples in this respect is known as protean behavior, where a prey animal under threat performs unpredictable zig-zag movements in order to confuse, delay or escape the predator. This kind of defensive behavior can inspire efficient strategies for patrolling robots evolving in the presence of adversaries.

View Article and Find Full Text PDF

Sensor networks become increasingly a key technology for complex control applications. Their potential use in safety- and time-critical domains has raised the need for task scheduling mechanisms specially adapted to sensor node specific requirements, often materialized in predictable jitter-less execution of tasks characterized by different criticality levels. This paper offers an efficient scheduling solution, named Hybrid Hard Real-Time Scheduling (H²RTS), which combines a static, clock driven method with a dynamic, event driven scheduling technique, in order to provide high execution predictability, while keeping a high node Central Processing Unit (CPU) utilization factor.

View Article and Find Full Text PDF

Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method.

View Article and Find Full Text PDF

Providing unpredictable trajectories for patrol robots is essential when coping with adversaries. In order to solve this problem we developed an effective approach based on the known protean behavior of individual prey animals-random zig-zag movement. The proposed bio-inspired method modifies the normal robot's path by incorporating sudden and irregular direction changes without jeopardizing the robot's mission.

View Article and Find Full Text PDF

Distributed sensing, computing and communication capabilities of wireless sensor networks require, in most situations, an efficient node localization procedure. In the case of random deployments in harsh or hostile environments, a general localization process within global coordinates is based on a set of anchor nodes able to determine their own position using GPS receivers. In this paper we propose another anchor node localization technique that can be used when GPS devices cannot accomplish their mission or are considered to be too expensive.

View Article and Find Full Text PDF