
Johan J Lukkien- prof. dr.
- Chair at Eindhoven University of Technology
Johan J Lukkien
- prof. dr.
- Chair at Eindhoven University of Technology
About
285
Publications
38,369
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,594
Citations
Introduction
Current institution
Publications
Publications (285)
Context
Execution logs capture the run-time behavior of software systems. To assist developers in their maintenance tasks, many studies have proposed tools to analyze execution information from logs. However, it is as yet unknown how industry developers use logs in embedded software engineering.
Objective
In this study, we aim to understand how de...
Multi-modal fusion methods for movie genre classification have shown to be superior over their single modality counterparts. However, it is still challenging to design a fusion strategy for real-world scenarios where missing data and weak labeling are common. Considering the heterogeneity in different modalities, most existing works design late fus...
Context
Models, as the main artifact in model-driven engineering, have been extensively used in the area of embedded systems for code generation and verification. One of the most popular behavioral modeling techniques is the state machine. Many state machine modeling guidelines recommend that a state machine should have more than one state in order...
Software-defined networking (SDN) is a cornerstone of next-generation networks and has already led to numerous advantages for data-center networks and wide-area networks. However, SDN is not widely adopted in constrained networks, such as Wireless Sensor Networks (WSN), due to excessive control overhead, lossy medium, and in-band control channels....
Smartphones, wearables, and Internet of Things (IoT) devices produce a wealth of data that cannot be accumulated in a centralized repository for learning supervised models due to privacy, bandwidth limitations, and the prohibitive cost of annotations. Federated learning provides a compelling framework for learning models from decentralized data, bu...
Smartphones, wearables, and Internet-of-Things (IoT) devices produce a wealth of data that cannot be accumulated in a centralized repository for learning supervised models due to privacy, bandwidth limitations, and the prohibitive cost of annotations. Federated learning provides a compelling framework for learning models from decentralized data, bu...
Sport classification is a crucial step for content analysis in a sport stream monitoring system. Training a reliable sport classifier can be a challenging task when the data is limited in amount and highly imbalanced. In this paper, we introduce a supervised two-stage transfer learning (Two-Stage-TL) method to solve the data shortage problem. It ca...
Deep learning methods are successfully used in applications pertaining to ubiquitous computing, health, and well-being. Specifically, the area of human activity recognition (HAR) is primarily transformed by the convolutional and recurrent neural networks, thanks to their ability to learn semantic representations from raw input. However, to extract...
In this chapter we compactly introduce the overall system architecture and standards of countrywide cooperative intelligent transportation systems. This is an introduction to the next three chapters that take three different application perspectives on C-ITS, namely, intra-vehicle, inter-vehicle and countrywide. The focus lies on architecture and o...
Deep learning methods are successfully used in applications pertaining to ubiquitous computing, pervasive intelligence, health, and well-being. Specifically, the area of human activity recognition (HAR) is primarily transformed by the convolutional and recurrent neural networks, thanks to their ability to learn semantic representations directly fro...
How to process the big data generated in large IoT networks is still challenging current techniques. To date, a lot of network clustering approaches have been proposed to improve the performance of data aggregation in IoT. However, most of them focus on partitioning networks with static topologies, and thus they are not optimal on handling the case...
Cognitive applications that involve complex decision making such as smart lighting have non-deterministic input–output relationships, i.e., more than one output may be acceptable for a given input. We refer them as non-deterministic multiple output classification (nDMOC) problems, which are particularly difficult for machine learning (ML) algorithm...
Software-defined networking (SDN) is a cornerstone of next-generation networks and has already led to numerous advantages for data-center networks and wide-area networks, for instance in terms of reduced management complexity and more fine-grained traffic engineering. However, the design and implementation of SDN within wireless sensor networks (WS...
Smart spaces have been actively emerging recently, and researchers are working on developing and testing smart spaces in the real world. They facilitate smart applications that are adaptive to user preferences and contexts. In doing so they must satisfy applications’ dynamically changing resource needs. These objectives are achievable by cooperatio...
In the high-tech and automotive industry, bandwidth considerations and widely accepted standardization are two important reasons why Ethernet is currently being considered as an alternative solution for real-time communication (compared to traditional fieldbusses). Although Ethernet was originally not intended for this purpose, the development of t...
Detection of human activities along with the associated context is of key importance for various application areas, including assisted living and well-being. To predict a user’s context in the daily-life situation a system needs to learn from multimodal data that are often imbalanced, and noisy with missing values. The model is likely to encounter...
Smart devices of everyday use (such as smartphones and wearables) are increasingly integrated with sensors that provide immense amounts of information about a person's daily life such as behavior and context. The automatic and unobtrusive sensing of behavioral context can help develop solutions for assisted living, fitness tracking, sleep monitorin...
The advancements in the smart space research bring us closer and closer to a future, in which the living standards of people are greatly enhanced. Smart spaces are composed of heterogeneous networks of embedded devices that communicate, perform computations and actuate. From a system point of view, a smart space is a specific type of ubiquitous sys...
Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The life cycle view is one of the views used for syst...
The Internet of Things (IoT) is opening up new services and is stimulating changes in industries. The lighting industry is also embracing this change by establishing an Internet of Lights (IoL). This article highlights the main benefits and the challenges to face while going towards IoL. To address these challenges and cater to the specific require...
Application performance in a smart space is affected by faulty behaviours of nodes and communication networks. Detection of faults helps diagnosis of problems and maintenance can be done to restore performance, for example, by replacing or reconfiguring faulty parts. Fault detection methods in the literature are too complex for typical low-resource...
Smart cities blend the boundaries between infrastructure and consumer devices, and rely on their cooperation for making new applications possible. This poses a challenge, as extremely resource-constrained devices such as ubiquitous sensors and actuators need to communicate with more powerful devices, such as smartphones and servers. Users move thro...
In the high-tech and automotive industry, bandwidth considerations and widely accepted standardization are two important reasons why Ethernet is currently being considered as an alternative solution for real-time communication (compared to the traditional fieldbusses). Although Ethernet was originally not intended for this purpose, the development...
Simulations are widely used in the engineering workflow of complex mechatronic embedded systems in various domains, such as healthcare, railway, automotive and aerospace, for analyzing, testing and validating purposes. This paper focuses on the development and test of the control software of complex mechatronic embedded systems from the perspective...
The Internet of Things (IoT) refers to extending the reach of the Internet into the physical world. The realization of IoT applications involves the integrated operation of many subsystems that retain their private function. This makes IoT application deployment and integration a Systems of Systems (SoS) problem. In this paper we collect SoS proper...
We present a solution for service discovery of resource constrained devices based on mDNS/DNS-SD. We extend the mDNS/DNS-SD service discovery protocol with support for proxy servers. Proxy servers temporarily store information about services offered on resource constrained devices and respond on their behalf while they are not available. We analyze...
In literature, several hierarchical scheduling frameworks (HSFs) have been proposed for enabling resource sharing between components on a uni-processor system. Each HSF comes with its own set of composition rules which take into account a specific synchronization protocol for arbitrating access to resources. However, the inventors of these synchron...
Busy period analysis is often used as a basis for worst-case response time analysis of priority based systems. However, when shaping strategies are used to prevent starvation of lower priorities, it becomes difficult to achieve tightness results using this method. The reason for this is that a busy period is defined as the longest interval in which...
This paper proposes a cycle-accurate performance analysis method for real-time component-based distributed systems (CB-RTDS). The method involves the following phases: (a) profiling SW components at cycle execution level and modeling the obtained performance measurements in MARTE-compatible component resource models, (b) guided composition of the s...
In cyber-physical systems such as intelligent lighting, the system responds autonomously to observed changes in the environment. In such systems, more than one output may be acceptable for a given input scenario. This type of relationship between the input and output makes it difficult to analyze machine learning algorithms using commonly used perf...
We propose an extension of the mDNS/DNS-SD service discovery protocol, which enables service clients to discover and select services based on their context. The extension improves scalability in large networks, which is of particular importance in future Internet of Things deployments.
This is an overview presentation on the recent state of vehicle security issues and solutions.
A personal literature summary on Systems of Systems engineering
Low-power wireless networks play an important role in the Internet of Things. Typically, these networks consist of a very large number of lossy and low-capacity devices, challenging the current state of the art in protocol design. In this context the Trickle algorithm plays an important role, serving as the basic mechanism for message dissemination...
Smart environment applications demand novel solutions for managing quality of
services, especially availability and reliability at run-time. The underlying
systems are changing dynamically due to addition and removal of system
components, changing execution environments, and resources depletion.
Therefore, in such dynamic systems, the functionality...
Resource management is a vital activity of many resource platforms. For time-critical applications the principle resource to be managed is processor time. For many streaming video applications processor usage of their individual components follows a limited set of modes each of which represents a small range of processor utilization values. In this...
In this paper we revisit the admission of applications upon a processor share modeled by the explicit-deadline periodic (EDP) resource-supply model. In particular, we consider applications that represent a fixed-priority sporadic task system. Existing works heavily build on the analysis of a hierarchy of preemptive task schedulers. We instead consi...
Trickle is a polite gossip algorithm for managing communication traffic. It
is of particular interest in low-power wireless networks for reducing the
amount of control traffic, as in routing protocols (RPL), or reducing network
congestion, as in multicast protocols (MPL). Trickle is used at the network or
application level, and relies on up-to-date...
In this paper, we compare and survey different ways to model the scheduling delays corresponding to non-preemptive critical sections being executed by the tasks of different components that ultimately need to share one processor. We focus on the performance of compositional timing analyses for systems and we compare different protocols for the arbi...
Many smart city lighting applications require information about the location of light poles, in particular about which light poles are neighbors along the street with respect to passing traffic. This paper addresses the problem of deriving the topology of light poles in a smart city, relying only on the data gathered from Passive Infrared Sensors a...
The functionality and the performance of smart environment applications can be hampered by faults. Fault tolerance solutions aim to achieve graceful performance degradation in the presence of faults, ideally without leading to application failures. This is a reactive approach and, by itself, gives little flexibility and time for preventing potentia...
This paper addresses the problem of storing an ordered list using a red-black tree, where node keys can only be expressed relative to each other. The insert and delete operations in a red-black tree are extended to maintain the relative key values. The extensions rely only on relative keys of neighboring nodes, adding constant overhead and thus pre...
Crucial to the success of Body Area Sensor Networks is the flexibility with which stakeholders can share, extend and adapt the system with respect to sensors, data and func-tionality. The first step is to develop an interoperable plat-form with explicit interfaces, which takes care of common management tasks. Beyond that, interoperability is define...
Applications in smart environments can make use of a user positioning service for various purposes such as activity recognition, context awareness and indoor navigation. We propose a novel solution to the user positioning problem based on inplane detection, which employs infrared light emitters and sensors placed horizontally on fixed positions alo...
In this paper we consider various flavors of the stack resource policy (SRP) for arbitrating access to shared resources in a hierarchical scheduling framework (HSF) upon a uni-processor. We propose algorithms for exploring and selecting the (local) resource ceilings within components, such that it results in an optimal composition of resource-shari...
Simulations are often used to improve the develop-ment and test time of industrial embedded systems in different domains, such as healthcare, railway, automobile and aerospace. This paper introduces a general framework capable of simulating real components simultaneously with simulated ones, in real-time, and with a low impact on the performance of...
The advances in dynamic street lighting introduce new functionality for control and maintenance of the street lighting infrastructure. Vital elements in this infrastructure are the powerful controlling devices that control separate groups of light poles and collect information from the system. For an infrastructure based on wireless communication,...
Scalability and reusability of software components enable consumer electronics products to become more open and flexible. Some important features in many of those products are provided via video components. Since these components have highly fluctuating resource usage, dynamic re-allocation of resources is more cost-effective than static allocation...
This paper presents a framework for trust evaluation through monitoring, in particular, to address the question of how to derive trust from observations of certain properties. We propose a trust model based on subjective logic to represent trust through the notion of an opinion and to include aspects of uncertainty in a systematic fashion. Moreover...
For people suffering from nocturnal epileptic seizures it is crucial to have a system that can detect such seizures in real-time. In this paper, we present a preclinical demonstrator for real-time detection of nocturnal seizures based on the heart rate. The system is built on the VITRUVIUS body sensor platform, which consists of a body hub (a smart...
Generally, in machine learning applications, the problem of missing data has significant effect on the prediction performance. For a given missing data problem, it is not straightforward to select a treatment approach in combination with a classification model due to several factors such as the pattern of data and nature of missing data. The select...
In this paper, we present and prove exact best-case response time and improved jitter analysis of real-time periodic tasks with activation jitter and arbitrary deadlines that are scheduled by means of fixed-priority pre-emptive scheduling. We illustrate the analysis by means of examples.
Apart from having a value on its own whenever timing constrai...
This paper aims at advancing the relative strength of limited-preemptive schedulers by improving the feasibility of a task set and simultaneously limiting, or even precluding, arbitrary preemptions. In particular, we present a refinement of existing limited-preemptive fixed-priority scheduling (FPS) schemes with preemption thresholds for preemption...
This paper addresses a framework to evaluate trustworthiness of a Body Area Sensor Networks (BASN), in particular, of sensor readings. We show that such trustworthiness is to be interpreted with respect to a certain statement or goal; its evaluation is based on quality aspects derived from observations and opinions from others. We examine relevant...
In intelligent street lighting systems where light posts communicate wirelessly, location awareness is necessary for the system to provide context-aware services. To solve the specific localization problem, we developed an iterative algorithm based on the relation between the received signal strength and the distance to assign the known locations t...
Recent developments in wearable sensor technologies allow for collecting various information about the person in different conditions. This data is often of limited use without proper interpretation provided by human experts. We propose a practical platform that collects long-term data from multiple body and ambient sensors along with human-provide...
In this paper, we extend the compositional scheduling framework to enable the integration of an existing (legacy) application as a component on a faster processor which needs to be shared with other components. After admission of this application into the framework, the integrated component still has to satisfy its tasks' deadline constraints and i...
This paper presents a method for optimizing software updates of consumer electronic devices running multiple applications with a common software component, called horizontal patching. Instead of using separate deltas for patching different applications, the method generates one delta from the other. Due to the large similarities between the deltas,...
In machine learning, the choice of a learning algorithm that is suitable for
the application domain is critical. The performance metric used to compare
different algorithms must also reflect the concerns of users in the application
domain under consideration. In this work, we propose a novel probability-based
performance metric called Relevance Sco...
Software reprogramming enables users to extend or correct functionality of a sensor network after deployment, preferably at a low cost. This paper investigates the improvement of energy efficiency and delay of reprogramming, at low resource cost. As enabling technologies data compression and incremental updates are used. Algorithms for both approac...
Consumer electronic products become increasingly more open and flexible, which is achieved by scalable and reusable software components. Important features in many of those products are provided via video components. Since these components have fluctuating resource usage, run-time resource-prediction strategies are required to enable cost-effective...
This paper studies an approach to enhance the trust in the widespread use of Body Sensor Networks (BSN) in Healthcare. To address the wide variety in medical indications and differences between patients, we assume that such BSNs are programmable and highly flexible in their functionality. Yet this opens a vulnerability to malicious attacks and intr...
Reprogramming is an important issue in wireless sensor networks. It enables users to extend or correct functionality of a sensor network after deployment at a low cost. In this paper, we investigate the problem of improving energy efficiency and delay of reprogramming by using data compression and incremental updates. We analyze different algorithm...
Many embedded systems have complex timing constraints and, at the same time, have flexibility requirements which prohibit offline planning of the entire system. To support a mixture of time-triggered and event-triggered tasks, some industrial systems deploy a real-time operating system (RTOS) with a table-driven dispatcher complemented with a preem...
The last two decades have seen a significant amount of results and insights that promote the Ambient Intelligence vision, in particular via the architecture and design of Ambient Intelligence infrastructures supporting interconnected, context aware, personalized devices and services to act as an interactive and intelligent environment. We propose a...
The concept of intelligent lighting facilitates the use of machine learning models to adapt the lighting application behavior based on changing context. Ideally, a complete dataset without missing values is used to train the learning algorithm. Nevertheless, it is common to have missing data values in the dataset, e.g. due to lack of rich enough us...
This paper presents a Body Sensor Platform supporting concurrent applications that share resources and data. Concerns are application isolation, data privacy and platform trustworthiness in view of dynamic loading of applications. A prototype has been built on commercial-off-the-shelf hardware. The platform is evaluated through a case study of two...
Research has shown that environment lighting influences the behavior of the employees in an office setting highly, making lighting configuration in an office space crucial. A breakout area may be used by the employees for various activities that need to be supported by different lighting conditions, e.g. informal meetings or personal retreat. The d...
Smart spaces are physical spaces where services provided by Consumer Electronics (CE) devices with varying resource availabilities work together to realize user-specific automated scenarios. These scenarios may be interrupted in case one of the services making up the scenario stops, e.g. due to lack of resources, node failure or leave. Therefore, t...
Fixed-priority scheduling with deferred preemption(FPDS) and fixed-priority scheduling with preemption thresholds(FPTS) have been proposed in the literature as viable alternatives to fixed-priority preemptive scheduling (FPPS), that reduce memory requirements, reduce the cost of arbitrary preemptions, and may improve the feasibility of a task set e...
This paper addresses the problem of scheduling periodic parallel tasks on a multi-resource platform, where tasks have real-time constraints. The goal is to exploit the inherent parallelism of a platform comprised of multiple heterogeneous resources. A resource model is proposed, which abstracts the key properties of any heterogeneous resource from...