• Home
  • Sandford Bessler
Sandford Bessler

Sandford Bessler
University of Technology Vienna · Informatics

Dr

About

78
Publications
5,945
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
389
Citations
Citations since 2016
8 Research Items
111 Citations
2016201720182019202020212022051015202530
2016201720182019202020212022051015202530
2016201720182019202020212022051015202530
2016201720182019202020212022051015202530
Introduction
I am currently teaching at the University of Technology Vienna, Faculty of Informatics. Besides teaching, I am engaged in consulting and R&D activities. My current research interests are in the energy and e-mobility domains. They cover electric vehicle charging optimization, demand management using flexible loads and renewable generation, as well as novel peer to peer trading mechanisms in local energy communities.
Additional affiliations
September 2008 - present
TU Wien
Position
  • Lector (venia docendi)
Description
  • Peer to peer systems, since 2008 Algorithm design, 2010
January 2001 - December 2015
Forschungszentrum Telekommunikation Wien
Position
  • Researcher
Description
  • Telecom Service platfoms, Intelligent Transportation services, e-Mobility, smart grid optimization

Publications

Publications (78)
Article
Demand Management uses the interaction and information exchange between multiple control functions in order to achieve goals that can vary in different application contexts. Since there are several stakeholders involved, these may have diverse objectives and even use different architectures to actively manage power demand. This paper utilizes an ex...
Conference Paper
Full-text available
In this work we address the distribution of PV power generated in a microgrid connected to the main grid. Instead of self-consumption maximization, the new goal is to enable the local trade between PV producers and neighbors consumers in the microgrid. We propose a ”many-to-many” lexicographic allocation and balancing algorithm between producers an...
Conference Paper
With the increased use of electric vehicles, the discharge of electric vehicle (EV) batteries (vehicle to grid, V2G) has been repeatedly proposed as enabler of smart grid services. In this work we describe the weaknesses of current discharging models and propose a model based on explicit discharging tasks. Using simulation in a microgrid control ar...
Conference Paper
Full-text available
Cyber security is becoming more and more relevant with the advent of large-scale systems made of independent and autonomous constituent systems that interoperate to achieve complex goals. To ensure security of cyber-physical systems, it is important to analyze identified threats and their possible consequences. In case of smart grids as an example...
Conference Paper
This work addresses the electric grid planning process in general and the outage response in particular. Using the advance control architecture of microgrids, we show that by planning for demand reduction in the microgrids, certain outages can be mitigated, without the need of additional local generation or islanding. We describe the load models, t...
Book
This book constitutes the post-conference proceedings of the Second EAI International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2017, held in London, UK, in March 2017. The revised full papers are presented in four tracks: Track 1 - Communications, Networks and Architectures; Track 2 - Smart Control and Operation; Track 3 - G...
Conference Paper
Full-text available
The reliability of the power supply is increasingly threatened both by natural catastrophes (such as floods, drought, storms, etc.) due to climate change effects and by cyber attacks on the connected power grid. In order to study the response to an outage, we address the problem in a bottom-up manner, starting from a small entity, the microgrid, in...
Conference Paper
Two trends will help to ensure reliable electricity supply in Smart Cities: a) the ongoing deployment of Smart Grid technology and b) the adoption of distributed energy resources. Unfortunately, the increased reliance on ICT in the Smart Grid will expose new threats that could result in incidents that might affect urban electricity distribution net...
Conference Paper
Full-text available
lexibility information that characterizes the energy consumption of certain loads with electric or thermal storage has been recently proposed as a means for energy management in the electric grid. In this paper we propose an energy management architecture that allows the grid operator to learn and use the consumption flexibility of its users. Start...
Conference Paper
Energy flexibility information describes the energy minimum and the maximum consumption profiles of a flexible load, and has been recently recognized as a significant enabler for smart energy management in the grid. In this paper we describe an energy management architecture in a residential grid that allows a flexibility operator to use the flexib...
Conference Paper
Abstract—The deployment of cooperative ITS applications is due to start as soon as 2015. Large investments in the roadside unit (RSU) infrastructure will be necessary to create a dense network and accommodate an increasing number of services, leading to a discussion about the trade-off between distributed processing and storage solutions on the RSU...
Article
Novel, networked information-rich control systems are emerging to provide a stable and cost-efficient operation of future electricity distribution grids. However, the dependence on fault-prone, low-cost, and heterogeneous network technologies and architectures challenges the grid control quality. In this work, we study the impact of varying network...
Conference Paper
Full-text available
Since vehicle to infrastructure communication will become state of the art in a few years, data from mobility and environment sensors in the vehicle could produce valuable information for traffic management and vehicle safety applications. The massive deployment of such data sources could however lead to high data traffic that would unnecessarily s...
Conference Paper
Full-text available
Real-time monitoring and automated management of Low Voltage grids is foreseen to bring: a) improved utilization of existing grid capacity, and b) acceptable power quality under large amounts of decentralized production and fluctuating demand. In this work, we introduce a joint photovoltaic (PV) and electrical vehicle (EV) control approach encapsul...
Conference Paper
Full-text available
Increasing amounts of local power generation and loads are challenging the management of low voltage (LV) grids. This paper proposes a low voltage grid monitoring and control solution enabling a grid operator to: 1) assess available capacity in an LV grid for planning purposes, 2) provide grid constrained electrical vehicle (EV) charging control, a...
Conference Paper
Full-text available
In this work we address the optimization problem related to the recharge of electric vehicles, in which parking place availability, parking duration and available power constraints have to be satisfied. We formulate this problem as a resource allocation problem (with time windows) and solve it with exact and heuristic methods. The results obtained...
Article
In this work we address the efficient operation of public charging stations. Matching energy supply and demand requires an interdisciplinary understanding of both the mobility of electric vehicle (EV) users and the load balancing mechanisms. As a result of existing mobility studies, we propose in this work a routing service for searching and reserv...
Article
Full-text available
Diese Arbeit beschäftigt sich mit der Verknüpfung zwischen den suchenden Elektroautobenutzern und den Ladestationen. Ziel ist es, mittels Verkehrslenkungsdiensten die optimale Ladestation zu finden und im Vorhinein zu reservieren. Weiters wird in dieser Arbeit die Kombination mit dem öffentlichen Verkehr in Form mehrerer Szenarien detailliert analy...
Article
Full-text available
The realization of novel vehicular services requires a distributed computing and data management architecture in the roadside nodes. We show the proposed architecture with a data transport service that can cope with connectivity disruptions, inherent to this kind of mobility. We discuss the results obtained by running the disruption tolerant servic...
Article
Structured, spatial–temporal content arises in application areas such as mobile computing, intelligent transportation, urban mobility, and ubiquitous sensing. For the distributed storage and dissemination of such content, peer-to-peer solutions appear to be the natural choice. However, a closer analysis shows that distributed hash tables (DHT) alon...
Conference Paper
This work addresses the intermittent connectivity observed in a vehicular ad hoc network and proposes a Disruption Tolerant Network (DTN) service that is shown to degrade gracefully in case of bad channel conditions or load increase, if compared to plain datagram transmission case. The considered infrastructure is a mesh network of road side units...
Conference Paper
Full-text available
This overview discusses the technological and architectural evolution of the telco service delivery platforms in the last decade. We argue that not only the telco business model but also the system environment contributed to the decrease in revenues from added value services and continues to be threatened by the success of the OEMs and their AppSto...
Conference Paper
Full-text available
This paper discusses an approach for distributing a large number of multimedia (video) titles to users located at the leaves of a tree network. The proposed approach is to build multicast trees, over which the content files are sent to user disks, followed by delayed local playback of the content. The work concentrates on exact and heuristic method...
Chapter
The development of new research paradigms is usually not supported by a proof-of-concept that helps to showcase the potential impact of the research concept behind. Personal Networking is an emerging concept which combines pervasive computing and strong user focus. The idea is that the user’s personal devices organize themselves in a secure and pri...
Conference Paper
Full-text available
The publish/subscribe paradigm is a common concept for delivering events from information producers to consumers in a decoupled manner. Some approaches allow durable subscriptions or the transportation of events even to mobile subscribers in a dynamic network infrastructure. However, in the safety-critical telematics durable delivery of events is n...
Chapter
Full-text available
Policy rules are often written in organizations by a team of people in different roles and technical backgrounds. While user-generated content and community-driven ontologies become common practices in the semantic environments, machine-processable user-generated policies have been underexplored, and tool support for such policy acquisition is prac...
Conference Paper
Full-text available
The publish/subscribe paradigm is a common concept for delivering events from information producers to consumers in a decoupled manner. Some approaches allow the transportation of events even to mobile subscribers in a dynamic network infrastructure. Additionally, durable subscriptions are guaranteed exactly-once message delivery, despite periods o...
Conference Paper
Full-text available
The effectiveness of Intelligent Transportation Systems (ITS) depends on their ability to collect contextual data from various sources and appropriately generate and transport comprehensible, reliable and timely content to users. In such applications, the exchanged content is structured in space and time. Peer-to-peer(P2P) networks are the natural...
Conference Paper
IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based...
Conference Paper
Full-text available
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for the distributed architecture required by these applications. However, a closer analysis of the available distributed hash table (DHT) based approaches shows their inefficien...
Conference Paper
Full-text available
This paper discusses a novel approach for distributing a large number of multimedia (video) titles to users via a managed network infrastructure based on DSL technology. The approach, sometimes called push-VoD, is based on multicasting and the direct download of the content on user disks, followed by the local, but delayed playback of the video. We...
Article
Full-text available
We describe a policy management environment (PME) for the Semantic Web and show its added value compared to existing policy-related developments. In particular, we detail a part of the PME, the policy acquisition tool that enables non-expert users to create and modify semantic policy rules. The implementation of such a policy editor has at its core...
Article
Full-text available
A Personal Network (PN) connects nearby and remote devices a user owns: at home, at work in the car, on his body. It enables the user to secure and easily consume services spanning these devices. Although the PN and the IP Multimedia Subsystem (IMS) have quite complementary architectures and goals, it was the aim of this work to investigate the bus...
Conference Paper
The federation concept extends the communication between trusted devices or nodes of a personal network (PN) to interactions between PNs belonging to different users. Federation formation, participation control and resource disclosure are controlled by policy rules running in each personal network. The paper describes the architecture and the chall...
Article
Full-text available
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset technology, a terminal-based positioning approach, using overlay SIP signaling on top of a packet switched bearer and area notification as basic functionality becomes feasible...
Conference Paper
According to the IETF definition, "presence conveys the ability and willingness of a user to communicate across a set of devices". In this paper we use semantic techniques to ask and reason about this ability and willingness on the basis of local context, instead of conveying raw context data. We describe the architecture of a policy engine, using...
Conference Paper
Full-text available
Influenced by the success of web service technologies for the development and deployment of IT services, the telecommunications R&D community starts adapting and building similar service delivery platforms, trying to manage the hard constraints of telco domains, such as: existence of heterogeneous protocols, extensive use of asynchronous communicat...
Conference Paper
This paper discusses scenario construction and personalization of PN services based on work related to this area in MAGNET and ongoing work in MAGNET Beyond. The pilot services in MAGNET Beyond are based on the two main cases named MAGNET.Care and Nomadic@work, covering health care and professional work situations. The vision is to enable intellige...
Conference Paper
Full-text available
This paper describes the system architecture for a terminal-based location service enabler in the 3rd generation (3G) IP multimedia subsystem (IMS). A location service enabler provides data about the geographical position of mobile terminals to requesting clients. Since location data can be regarded as a type of presence information, we propose an...
Article
We present the TOTEM open source Traffic Engineering (TE) toolbox and a set of TE methods that we have designed and/or integrated. These methods cover intra-domain and inter-domain TE, IP-based and MPLS-based TE. They are suitable for network optimisation, better routing of traffic for providing QoS, load balancing, protection and restoration in ca...
Chapter
Full-text available
We present the TOTEM open source Traffic Engineering (TE) toolbox and a set of TE methods that we have designed and/or integrated. These methods cover intra-domain and inter-domain TE, IP-based and MPLS-based TE. They are suitable for network optimisation, better routing of traffic for providing QoS, load balancing, protection and restoration in ca...
Conference Paper
Full-text available
The imminent introduction of the 3GPP IP Multimedia Subsystem (IMS) into commercial mobile networks is considered to be a major step towards all-IP based next generation networks. This has immediate consequences both for the migration of the core network as well as the integration of future mobile services and applications. This paper presents an e...
Article
Full-text available
The 3GPP IP Multimedia Subsystem (IMS) is currently expected to provide the basic architecture framework for the Next Generation Network which will bridge the traditional divide between circuit-switched and packet-switched networks and consolidate both sides into one single network for all services. There-fore, the imminent commercial roll-out of I...
Conference Paper
Presence information represents the basis for context awareness and for building pervasive systems. This paper addresses design aspects in the inter-working between two important presence standards: IETF'S SIMPLE presence protocol and the OSA/Parlay presence and availability management APIs. We also consider a third alternative supposed to offer a...
Conference Paper
Full-text available
Third party service providers are starting to use advanced lo- cation services based on area or periodical notification in order to develop innovative applications. However, such functions can be easily misused for tracking users and building their activity profiles, if privacy enhance- ment mechanisms are not integrated into the service architectu...
Conference Paper
Full-text available
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revealing their actualized location, presence or contact address information, especially to non-trusted third party applications. In this paper we propose a privacy architectur...
Article
Full-text available
This paper develops a design framework toward the protable operation of generic service overlay networks (SON) assuring inter-domain QoS. The building blocks of the framework, namely, the QoS- bandwidth demand mapping and the topology optimization are elaborated in detail. Moreover, some preliminary results are presented to demonstrate the gains of...
Article
Full-text available
Location and presence information will provide considerable value to information and communication services. Nevertheless, the users are still concerned about revealing their position data especially to un-trusted third party applications. Furthermore, legal restrictions are effective in most countries that regulate processing of personal data and...
Conference Paper
Full-text available
In recent years auctions have become increasingly popular for the efficient allocation of congested network resources, such as bandwidth. In This work we consider a network provider performing auctions on end-to-end tunnels periodically, and users requesting bandwidth for long sessions (typically lasting for more than one auction period). Second-ch...
Article
Casual Multimedia Process Annotations, CoMPAs, allow users to comment every type of document and interactive application session on a computer. The specific focus is on annotating multimedia documents with multimedia annotations. Interactive application sessions, or processes, are treated as primary sources of multimedia, which can be annotated lik...
Conference Paper
Universal Mobile Telecommunications System (UMTS) uses the session initiation protocol (SIP) for packet switched (PS) call control (CC). Recent publications have shown that call set-up delay of PS CC varies between five and seven seconds, depending on the compression of the signalling traffic. The mentioned call set-up delay is a critical factor in...
Conference Paper
Full-text available
Auction mechanisms have recently gained increasing attention as an alternative approach for pricing Internet resources. For the case of divisible commodities over single links, Generalized Vickrey Auctions (GVA) are already a well-established standard mechanism, whereas an abundance of unsolved problems is related to the generalization of GVAs in s...
Article
Using MPLS for efficient traffic engineering crucially depends on the optimal dimensioning of Label Switched Paths (LSPs). The standard formulation as multi-commodity flow problem periodically solves a mixed integer programming problem that maximizes total network revenue, assuming fixed charges for carrying traffic of a certain QoS (Quality-of-Ser...
Conference Paper
Using MPLS for efficient traffic engineering crucially depends on the optimaldimensioning of Label Switched Paths (LSPs). The standard formulation as multi-commodityflow problem periodically solves a mixed integer programming problem thatmaximizes total network revenue, assuming fixed charges for carrying traffic of a certainQoS (Quality-of-Service...
Article
Dieser Artikel befasst sich mit drei voneinander unabhängigen Zugängen zur Steuerung der Leistung eines heterogenen Hochgeschwindigkeitsnetzes für Telekommunikation, welche einander allerdings passend ergänzen. Zunächst wird eine allgemeine Architektur zur Steuerung von Telekommunikationsnetzen definiert. Die Trägertechnologie der Netze kann dabei...
Article
Full-text available
Multiprotocol label switching (MPLS) has several advan-tages over destination-based IP routing protocols: it al-lows to setup end to end paths explicitly (also called label switched paths, LSP), to better monitor the traffic on these LSPs, to perform admission control, etc. While routing along a LSP is considered faster than IP routing, the op-erat...
Article
Full-text available
This paper proposes the introduction of a Service Platform for the creation, execution and management of multimedia services in heterogeneous networks. Examining the business-roles, the actors in the Service Platform are identified. Furthermore several common building blocks for developing services for the Internet are described and a brief overvie...