H. Hartenstein and K. Laberteaux, VANET: vehicular applications and inter-networking technologies, 2010.
DOI : 10.1002/9780470740637

R. Jain, The art of computer systems performance analysis, 2008.

C. Baier and J. Katoen, Principles of Model Checking, 2008.

J. Boudec and P. Thiran, Network calculus: a theory of deterministic queuing systems for the internet, 2001.

Y. Lu, T. Nolte, I. Bate, and L. Cucu-grosjean, A Statistical Response-Time Analysis of Real-Time Embedded Systems, 2012 IEEE 33rd Real-Time Systems Symposium, pp.351-362
DOI : 10.1109/RTSS.2012.85

J. Beirlant, Y. Goegebeur, J. Segers, and J. Teugels, Statistics of extremes: theory and applications, 2006.
DOI : 10.1002/0470012382

S. Uppoor and M. Fiore, Large-scale urban vehicular mobility for networking research, 2011 IEEE Vehicular Networking Conference (VNC), pp.62-69, 2011.
DOI : 10.1109/VNC.2011.6117125

URL : https://hal.archives-ouvertes.fr/inria-00637858

H. Noori and B. Olyaei, A novel study on beaconing for VANET-based vehicle to vehicle communication: Probability of beacon delivery in realistic large-scale urban area using 802.11p, 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), pp.1-6, 2013.
DOI : 10.1109/SaCoNeT.2013.6654589

D. Jiang and L. Delgrossi, Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments, IEEE VTC spring, pp.2036-2040, 2008.

A. Mouradian, Study of probabilistic worst case inter-beacon delays under realistic vehicular mobility conditions, ADHOC-NOW 2015, pp.390-403, 2014.

E. Olderog and H. Dierks, Real-time systems: formal specification and automatic verification, 2008.
DOI : 10.1017/CBO9780511619953

E. Clarke and J. Wing, Formal methods: state of the art and future directions, ACM Computing Surveys, vol.28, issue.4, pp.626-643, 1996.
DOI : 10.1145/242223.242257

URL : https://hal.archives-ouvertes.fr/hal-00444076

J. Baeten, A brief history of process algebra, Theoretical Computer Science, vol.335, issue.2-3, pp.131-146, 2005.
DOI : 10.1016/j.tcs.2004.07.036

A. Fehnker, L. Van-hoesel, and A. Mader, Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks, pp.253-272, 2007.
DOI : 10.1007/978-3-540-73210-5_14

M. Kwiatkowska, G. Norman, and J. Sproston, Probabilistic model checking of the IEEE 802.11 wireless local area network protocol, Process Algebra and Probabilistic Methods: Performance Modeling and Verification, pp.1-8, 2002.

M. Kwiatkowska, G. Norman, R. Segala, and J. Sproston, Automatic verification of real-time systems with discrete probability distributions, Theoretical Computer Science, vol.282, issue.1, pp.101-150, 2002.
DOI : 10.1016/S0304-3975(01)00046-9

M. Vojnovic and J. Boudec, Stochastic analysis of some Expedited Forwarding networks, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, pp.1004-1013, 2002.
DOI : 10.1109/INFCOM.2002.1019348

Y. Jiang, A basic stochastic network calculus, ACM SIGCOMM, pp.123-134, 2006.

S. Edgar and A. Burns, Statistical analysis of WCET for scheduling, Proceedings 22nd IEEE Real-Time Systems Symposium (RTSS 2001) (Cat. No.01PR1420), pp.215-224, 2001.
DOI : 10.1109/REAL.2001.990614

R. K. Shukla, M. Trivedi, and M. Kumar, On the proficient use of gev distribution: a case study of subtropical monsoon region in india, Annals. Computer Science Series, vol.8

E. Alvarado, D. V. Sandberg, and S. G. Pickford, Modeling large forest fires as extreme events, National Emergency Training Center, 1998.

P. Embrechts, S. I. Resnick, and G. Samorodnitsky, Extreme Value Theory as a Risk Management Tool, North American Actuarial Journal, vol.1, issue.2, pp.30-41, 1999.
DOI : 10.1080/10920277.1999.10595797

C. Liu, Y. Shu, J. Liu, and O. Yang, Application of Extreme Value Theory to the Analysis of Wireless Network Traffic, 2007 IEEE International Conference on Communications, pp.486-491, 2007.
DOI : 10.1109/ICC.2007.86

M. Uchida, Traffic data analysis based on extreme value theory and its applications, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.1418-1424, 2004.
DOI : 10.1109/GLOCOM.2004.1378217

A. Y. Dahab, A. Bin-md-said, and H. Hasbullah, Application of extreme value theory to bursts prediction, Signal Processing, An International Journal (SPIJ), vol.3, issue.4, p.55, 2009.

P. Liu, R. Berry, and M. L. Honig, Delay-sensitive packet scheduling in wireless networks, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003., pp.1627-1632, 2003.
DOI : 10.1109/WCNC.2003.1200630

J. A. Nelder and R. Mead, A Simplex Method for Function Minimization, The Computer Journal, vol.7, issue.4, pp.308-313, 1965.
DOI : 10.1093/comjnl/7.4.308

C. V. Consortium, Vehicle safety communications project: task 3 final report: identify intelligent vehicle safety applications enabled by dsrc, National Highway Traffic Safety Administration

R. Stanica, E. Chaput, and A. Beylot, Broadcast communication in Vehicular Ad-Hoc Network safety applications, 2011 IEEE Consumer Communications and Networking Conference (CCNC), pp.462-466, 2011.
DOI : 10.1109/CCNC.2011.5766513

B. Kloiber, C. Garcia, J. Härri, and T. Strang, Update delay: A new information-centric metric for a combined communication and application level reliability evaluation of cam based safety applications, ITS World Congress, 2012.

A. Autolitano, C. Campolo, A. Molinaro, R. M. Scopigno, and A. Vesco, An insight into Decentralized Congestion Control techniques for VANETs from ETSI TS 102 687 V1. 1.1, IFIP WD, pp.1-6, 2013.

J. and S. Long, Regression models for categorical and limited dependent variables, Advanced quantitative techniques in the social sciences

J. Abella, E. Quinones, F. Wartel, T. Vardanega, and F. J. Cazorla, Heart of Gold: Making the Improbable Happen to Increase Confidence in MBPTA, 2014 26th Euromicro Conference on Real-Time Systems
DOI : 10.1109/ECRTS.2014.33