-
1
-
-
65249108723
-
Cyber-physical systems
-
Wayne Wolf. Cyber-physical Systems. Computer, 2009, 42, 88-89.
-
(2009)
Computer
, vol.42
, pp. 88-89
-
-
Wolf, W.1
-
3
-
-
50949110438
-
Cyber-physical systems: A new frontier
-
Sha, Lui and Gopalakrishnan, Sathish and Liu, Xue and Wang, Qixin. Cyber-Physical Systems: A New Frontier. IEEE Int Conf on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2008, 1-9.
-
(2008)
IEEE Int Conf on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)
, pp. 1-9
-
-
Sha, L.1
Gopalakrishnan, S.2
Liu, X.3
Wang, Q.4
-
6
-
-
77954789045
-
Interaction analysis with a bayesian trajectory model
-
Alessio Dore, Carlo Regazzoni. Interaction Analysis with a Bayesian Trajectory Model. IEEE Intelligent Systems. 2010, 25, 32-40.
-
(2010)
IEEE Intelligent Systems
, vol.25
, pp. 32-40
-
-
Dore, A.1
Regazzoni, C.2
-
7
-
-
77958084419
-
Interaction modeling and prediction in smart spaces: A Bio- Inspired Approach Based on Autobiographical Memory
-
A. Dore, A.F. Cattoni and C.S. Regazzoni. Interaction Modeling and Prediction in Smart Spaces: a Bio- Inspired Approach Based on Autobiographical Memory. IEEE Transactions on Systems Man and Cybernetics- Part A,2010,40, 1191-1205.
-
(2010)
IEEE Transactions on Systems Man and Cybernetics- Part A
, vol.40
, pp. 1191-1205
-
-
Dore, A.1
Cattoni, A.F.2
Regazzoni, C.S.3
-
9
-
-
77955205283
-
Resource Discovery Protocols for Bluetooth-Based Ad-hoc Smart Spaces: Architectural Considerations and Protocol Evaluation
-
Andreas Brodt, Alexander Wobser, Bernhard Mitschang. Resource Discovery Protocols for Bluetooth-Based Ad-hoc Smart Spaces: Architectural Considerations and Protocol Evaluation. Eleventh Int Conf on Mobile Data Management. 2010, 145-150.
-
(2010)
Eleventh Int Conf on Mobile Data Management
, pp. 145-150
-
-
Brodt, A.1
Wobser, A.2
Mitschang, B.3
-
10
-
-
0030086382
-
Role Based Access Control Models
-
R. Sandhu, E. J. Coyne, H. L. Feinstein and C. E. Youman. Role Based Access Control Models. IEEE Computer, 1996, 29, 38-47.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
79954516234
-
Investigation of the statistical model based optimization accuracy under experimental errors. Case Study: Optimization of nutrient media for microorganisms' cultivation process
-
D. Levišauskas, T. Tekorius. Investigation of the Statistical Model Based Optimization Accuracy under Experimental Errors. Case Study: Optimization of Nutrient Media for Microorganisms' Cultivation Process. Information Technology and Control, Kaunas, Technologija, 2009, 38, 188-194.
-
(2009)
Information Technology and Control, Kaunas, Technologija
, vol.38
, pp. 188-194
-
-
Levišauskas, D.1
Tekorius, T.2
-
14
-
-
77953340991
-
One solution of task priority ordering in microprocessor measuring station
-
D.R. Milivojevic, V. Tasic, V. Despotovic, M. Pavlov. One Solution of Task Priority Ordering in Microprocessor Measuring Station. Information Technology and Control, Kaunas, Technologija, 2009, 38, 67-71.
-
(2009)
Information Technology and Control, Kaunas, Technologija
, vol.38
, pp. 67-71
-
-
Milivojevic, D.R.1
Tasic, V.2
Despotovic, V.3
Pavlov, M.4
-
15
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
(HotSec'08)
-
T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. 3rd USENIX Workshop on Hot Topics in Security (HotSec'08), 2008
-
(2008)
3rd USENIX Workshop on Hot Topics in Security
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
20
-
-
33745450500
-
Formal model and policy specification of usage control
-
X. Zhang, F. Parisi-Presicci, R. Sandhu and J. Park. Formal model and policy specification of usage control. ACM Transactions on Information and System Security. 2005, 8, 351-387.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicci, F.2
Sandhu, R.3
Park, J.4
-
21
-
-
50249144000
-
Regulating exceptions in healthcare using policy spaces
-
C.A. Ardagna, S.D.C. di Vimercati, T. Grandison, S. Jajodia and P. Samarati. Regulating Exceptions in Healthcare using Policy Spaces. 22nd Annual IFIP WG 11.3 Working Conf on Data and Applications Security. 2008, 254-267.
-
(2008)
22nd Annual IFIP WG 11.3 Working Conf on Data and Applications Security
, pp. 254-267
-
-
Ardagna, C.A.1
di Vimercati, S.D.C.2
Grandison, T.3
Jajodia, S.4
Samarati, P.5
-
23
-
-
33750905852
-
Performance modeling of critical event management for ubiquitous computing applications
-
T. Mukherjee, K. Venkatasubramanian, and S. K. S. Gupta. Performance Modeling of Critical Event Management for Ubiquitous Computing Applications. 9th ACM/IEEE Int Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2006, 12-19.
-
(2006)
9th ACM/IEEE Int Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
, pp. 12-19
-
-
Mukherjee, T.1
Venkatasubramanian, K.2
Gupta, S.K.S.3
-
25
-
-
70349844922
-
Separation of event and constraint rules in UML&OCL models of service oriented information systems
-
L. Ceponiene, L. Nemuraite, G. Vedrickas. Separation of Event and Constraint Rules in UML&OCL Models of Service Oriented Information Systems. Information Technology and Control, Kaunas, Technologija, 2009, 38, 29-37.
-
(2009)
Information Technology and Control, Kaunas, Technologija
, vol.38
, pp. 29-37
-
-
Ceponiene, L.1
Nemuraite, L.2
Vedrickas, G.3
-
27
-
-
77953457324
-
Measuring complexity of domain models represented by feature diagrams
-
V. Štuikys, R. Damaševičius. Measuring Complexity of Domain Models Represented by Feature Diagrams. Information Technology and Control, Kaunas, Technologija, 2009, 38, 179-187.
-
(2009)
Information Technology and Control, Kaunas, Technologija
, vol.38
, pp. 179-187
-
-
Štuikys, V.1
Damaševičius, R.2
|