Faldella, Eugenio; Loreti, Daniela, Precise Worst-case Blocking Time of Tasks under Priority Inheritance Protocol, «IEEE TRANSACTIONS ON COMPUTERS», 2021, 70, pp. 1901 - 1913 [articolo]Open Access
Paolo Torroni; Zeynep Kiziltan; Eugenio Faldella, Blocking time under basic priority inheritance: Polynomial bound and
exact computation, 2018. [rapporto tecnico]
Tucci P.; Faldella E., An efficient real-time infrastructure for home automation based on powerline communications, in: Proceedings of the 2012 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012), DALLAS, TEXAS, American Telecommunications Systems Management Association Inc., 2012, pp. 9 - 17 (atti di: International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012), Prague, Czech Republic, May 24-27, 2012) [Contributo in Atti di convegno]
Faldella E.; Tucci P., A portable infrastructure supporting global scheduling of embedded real-time applications on asymmetric MPSoCs, in: Proceedings 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP (2) 2011, BERLIN-HEIDELBERG, Springer-Verlag, «LECTURE NOTES IN COMPUTER SCIENCE», 2011, LNCS 7017, pp. 331 - 342 (atti di: 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP (2) 2011, Melbourne, Australia, 24-26 Ottobre 2011) [Contributo in Atti di convegno]
P. Tucci; E. Faldella, Network Evasion via DNS Covert Channels, in: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS, MODELING AND ANALYSIS, DALLAS TX, American Telecommunications Systems Management Association Inc., 2011, pp. 97 - 103 (atti di: International Conference on Telecommunication Systems, Modeling and Analysis - ICTSM2011, Prague, Czech Republic, 26-28 May, 2011) [Contributo in Atti di convegno]
E. Faldella; A. Tilli; P. Tucci, Logic Device Agents: Smart and Highly Reusable Components in Industrial Automation Systems, in: Proceedings of the 15th IEEE International Conference on Emerging Technologies and Factory Automation, PISCATAWAY, NJ, IEEE Publishing Services, 2010, pp. 1 - 8 (atti di: 2010 IEEE Conference on Emerging Technologies and Factory Automation (ETFA), Bilbao, Spagna, 13-16 settembre, 2010) [Contributo in Atti di convegno]
Faldella E.; Tucci P., A Model-Driven Approach to Automated Diagnosis of Industrial Distributed I/O Systems Based on Fieldbus Technologies, in: Proceedings XXII International Symposium on
Information, Communication and Automation
Technologies, PISCATAWAY, NJ, IEEE, 2009, pp. 1 - 7 (atti di: XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009), Sarajevo, Bosnia and Herzegovina, October 29-31, 2009) [Contributo in Atti di convegno]
Faldella E.; Paoli A.; Sartini M.; Tilli A.; Guidi D., Architectural design patterns for logic control of manufacturing systems: the generalized device, in: Proceedings XXII IEEE International Symposium on Information, Communication and Automation, PISCATAWAY, NJ, IEEE, 2009, pp. 1 - 7 (atti di: XXII IEEE International Symposium on Information, Communication and Automation Technologies (ICAT 2009), Sarajevo, Bosnia and Herzegovina, October 29-31, 2009) [Contributo in Atti di convegno]
E. Faldella; A. Paoli; M. Sartini; A. Tilli, Hierarchical Control Architectures in Industrial Automation: a Design Approach based on the Generalized Actuator Concept, in: Proceedings of the 17th IFAC World Congress 2008, s.l, International Federation of Automatic Control, 2008, pp. 69 - 76 (atti di: 17th IFAC World Congress 2008, Seoul, Corea del Sud, 6-11 Luglio 2008) [Contributo in Atti di convegno]
Marco Prandini; Eugenio Faldella; Roberto Laschi, Confining the Insider Threat in Mass Virtual Hosting Systems, in: Security in Information SystemsProceedings of the 5th International Workshop onSecurity in Information Systems - WOSIS 2007, SETÚBAL, INSTICC Press, 2007, pp. 105 - 114 (atti di: 5th International Workshop onSecurity in Information Systems - WOSIS 2007, Funchal - Madeira, Portugal, 12-16 giugno 2007) [Contributo in Atti di convegno]
M. prandini; e.faldella; r. laschi, Mandatory Access Control applications to web hosting, in: EC2ND 2006
Proceedings of the second European conference on computer network defence, LONDON, Springer-Verlag, 2006, pp. 13 - 22 (atti di: EC2ND 2006
Second European conference on computer network defence, Pontypridd (Cardiff), Wales, UK, 13-15 Dicembre 2006) [Contributo in Atti di convegno]
E., Faldella; M., Prandini, Design and Implementation of a New Public-Key Certificate Status Handling Scheme, in: Proceedings of the IASTED International Conference on Communication, Network and Information Security (CNIS 2005), CALGARY, ACTA Press, 2005, pp. 86 - 93 (atti di: IASTED International Conference on Communication, Network and Information Security (CNIS 2005), Phoenix, Arizona, USA, 14-16 novembre 2005) [Contributo in Atti di convegno]
E., Faldella; M., Prandini, Efficient authentication and verification of certificate status within public-key infrastructures, in: Proceedings of the Third IASTED International Conference on Communications, Internet and Information Technology, CALGARY, ACTA Press, 2004, pp. 182 - 188 (atti di: Third IASTED International Conference on Communications, Internet and Information Technology, St. Thomas, US Virgin Islands, 22-24 novembre 2004) [Contributo in Atti di convegno]
Faldella E.; Prandini M., An application of efficient certificate status handling methods to high traffic authentication services, in: Proceedings - IEEE Symposium on Computers and Communications, 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, IEEE COMPUTER SOC, «PROCEEDINGS - IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS», 2003, pp. 821 - 827 (atti di: 8th IEEE International Symposium on Computers and Communication, ISCC 2003, Kemer-Antalya, TR, 3 July 2003) [Contributo in Atti di convegno]
Faldella E.; Prandini M., An efficient and secure alternative to OCSP for public-key certificate revocation, in: Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2003, pp. 120 - 125 (atti di: Proceedings of the IASTED International Conference on Communication, Network, an d Information Security, New York, NY., usa, 2003) [Contributo in Atti di convegno]