-
1
-
-
84900821300
-
Internet of things in industries: A survey
-
to be published
-
L. Xu, W. He, and S. Li, "Internet of things in industries: A survey," IEEE Trans. Ind. Informat., to be published.
-
IEEE Trans. Ind. Informat
-
-
Xu, L.1
He, W.2
Li, S.3
-
2
-
-
84900537270
-
Developing vehicular data cloud services in the IoT environment
-
W. He, G. Yan, and L. Xu, "Developing vehicular data cloud services in the IoT environment," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1587-1595, 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 1587-1595
-
-
He, W.1
Yan, G.2
Xu, L.3
-
3
-
-
84900826011
-
Internet of things for enterprise systems of modern manufacturing
-
Z. Bi, L. Xu, and C. Wang, "Internet of things for enterprise systems of modern manufacturing," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1537-1546, 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 1537-1546
-
-
Bi, Z.1
Xu, L.2
Wang, C.3
-
4
-
-
84890935327
-
An integrated approach to snowmelt flood forecasting in water resource management
-
Feb
-
S. Fang, L. Xu, H. Pei, Y. Liu, Z. Liu, Y. Zhu et al., "An integrated approach to snowmelt flood forecasting in water resource management," IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 548-558, Feb. 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.1
, pp. 548-558
-
-
Fang, S.1
Xu, L.2
Pei, H.3
Liu, Y.4
Liu, Z.5
Zhu, Y.6
-
5
-
-
84900794442
-
IoT based smart rehabilitation system
-
Y. Fan, Y. Yin, L. Xu, Y. Zeng, and F. Wu, "IoT based smart rehabilitation system," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1568-1577, 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 1568-1577
-
-
Fan, Y.1
Yin, Y.2
Xu, L.3
Zeng, Y.4
Wu, F.5
-
6
-
-
84900827869
-
A new approach for compliance checking in service workflows
-
W. Viriyasitavat and L. Xu, "A new approach for compliance checking in service workflows," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1452-1460, 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 1452-1460
-
-
Viriyasitavat, W.1
Xu, L.2
-
7
-
-
84878128450
-
Introduction: Systems science in industrial sectors
-
May/Jun
-
L. Xu, "Introduction: Systems science in industrial sectors," Syst. Res. Behav. Sci., vol. 30, no. 3, pp. 211-213, May/Jun. 2013.
-
(2013)
Syst. Res. Behav. Sci.
, vol.30
, Issue.3
, pp. 211-213
-
-
Xu, L.1
-
8
-
-
78649487968
-
Information architecture for supply chain quality management
-
Jan
-
L. Xu, "Information architecture for supply chain quality management," Int. J. Prod. Res., vol. 49, no. 1, pp. 183-198, Jan. 2011.
-
(2011)
Int. J. Prod. Res.
, vol.49
, Issue.1
, pp. 183-198
-
-
Xu, L.1
-
9
-
-
84873988160
-
Technology designed to combat fakes in the global supply chain
-
L. Li, "Technology designed to combat fakes in the global supply chain," Bus. Horiz., vol. 56, no. 2, pp. 167-177, 2013.
-
(2013)
Bus. Horiz.
, vol.56
, Issue.2
, pp. 167-177
-
-
Li, L.1
-
10
-
-
77956877124
-
The internet of things: A survey
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
11
-
-
84900813073
-
A novel architecture for requirement-oriented participation decision in service workflows
-
L. Xu and W. Viriyasitavat, "A novel architecture for requirement-oriented participation decision in service workflows," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1478-1485, 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 1478-1485
-
-
Xu, L.1
Viriyasitavat, W.2
-
12
-
-
84900808680
-
Compliance checking for requirementoriented service workflow interoperations
-
W. Viriyasitavat and L. Xu, "Compliance checking for requirementoriented service workflow interoperations," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1469-1477, 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 1469-1477
-
-
Viriyasitavat, W.1
Xu, L.2
-
13
-
-
78650902290
-
Android: Changing the mobile landscape
-
Jan./Mar
-
M. Butler, "Android: Changing the mobile landscape," IEEE Pervasive Comput., vol. 10, no. 1, pp. 4-7, Jan./Mar. 2011.
-
(2011)
IEEE Pervasive Comput.
, vol.10
, Issue.1
, pp. 4-7
-
-
Butler, M.1
-
14
-
-
0034295566
-
Oil well diagnosis by sensing terminal characteristics of the induction motor
-
Oct.
-
B. M. Wilamowski and O. Kaynak, "Oil well diagnosis by sensing terminal characteristics of the induction motor," IEEE Trans. Ind. Electron., vol. 47, no. 5, pp. 1100-1107, Oct. 2000.
-
(2000)
IEEE Trans. Ind. Electron.
, vol.47
, Issue.5
, pp. 1100-1107
-
-
Wilamowski, B.M.1
Kaynak, O.2
-
15
-
-
80053202403
-
Advantages of radial basis function networks for dynamic system design
-
Dec
-
H. Yu, T. Xie, S. Paszczynski, and B. M. Wilamowski, "Advantages of radial basis function networks for dynamic system design," IEEE Trans. Ind. Electron., vol. 58, no. 12, pp. 5438-5450, Dec. 2011.
-
(2011)
IEEE Trans. Ind. Electron.
, vol.58
, Issue.12
, pp. 5438-5450
-
-
Yu, H.1
Xie, T.2
Paszczynski, S.3
Wilamowski, B.M.4
-
16
-
-
0034849118
-
Implementing a fuzzy system on a field programmable gate array
-
M. McKenna and B. M. Wilamowski, "Implementing a fuzzy system on a field programmable gate array," in Proc. Int. Joint Conf. Neural Netw., Washington, DC, USA, 2001, vol. 1, pp. 189-194. (Pubitemid 32794827)
-
(2001)
Proceedings of the International Joint Conference on Neural Networks
, vol.1
, pp. 189-194
-
-
McKenna, M.1
Wilamowski, B.M.2
-
17
-
-
84873638285
-
Enterprise systems in Russia: 1992-2012
-
M. Y. Kataev, L. A. Bulysheva, A. A. Emelyanenko, and V. A. Emelyanenko, "Enterprise systems in Russia: 1992-2012," Enterp. Inform. Syst., vol. 7, no. 2, pp. 169-186, 2013.
-
(2013)
Enterp. Inform. Syst.
, vol.7
, Issue.2
, pp. 169-186
-
-
Kataev, M.Y.1
Bulysheva, L.A.2
Emelyanenko, A.A.3
Emelyanenko, V.A.4
-
18
-
-
84882727238
-
Dataconfigurations in railway signalling engineering-An application of enterprise systems techniques
-
Aug
-
X.Chen,A.Guan,X.Qiu,H.Huang, J.Liu,andH.Duan, "Dataconfigurations in railway signalling engineering-An application of enterprise systems techniques," Enterp. Inform. Syst., vol. 7, no. 3, pp. 354-374, Aug. 2013.
-
(2013)
Enterp. Inform. Syst.
, vol.7
, Issue.3
, pp. 354-374
-
-
Chen, X.1
Guan, A.2
Qiu, X.3
Huang, H.4
Liu, J.5
Duan, H.6
-
19
-
-
84860905341
-
DIMP: An interoperable solution for software integration and product data exchange
-
Aug
-
X. V. Wang and X. W. Xu, "DIMP: An interoperable solution for software integration and product data exchange," Enterp. Inform. Syst., vol. 6, no. 3, pp. 291-314, Aug. 2012.
-
(2012)
Enterp. Inform. Syst.
, vol.6
, Issue.3
, pp. 291-314
-
-
Wang, X.V.1
Xu, X.W.2
-
20
-
-
84878121386
-
Enterprise systems in financial sector-an application in precious metal trading forecasting
-
Nov
-
X. Chen and Y. Fang, "Enterprise systems in financial sector-an application in precious metal trading forecasting," Enterp. Inform. Syst., vol. 7, no. 4, pp. 558-568, Nov. 2013.
-
(2013)
Enterp. Inform. Syst.
, vol.7
, Issue.4
, pp. 558-568
-
-
Chen, X.1
Fang, Y.2
-
21
-
-
84882700116
-
Public and expert collaborative evaluation model and algorithm for enterprise knowledge
-
Aug
-
C. Le, X. Gu, K. Pan, F. Dai, and G. Qi, "Public and expert collaborative evaluation model and algorithm for enterprise knowledge," Enterp. Inform. Syst., vol. 7, no. 3, pp. 375-393, Aug. 2013.
-
(2013)
Enterp. Inform. Syst.
, vol.7
, Issue.3
, pp. 375-393
-
-
Le, C.1
Gu, X.2
Pan, K.3
Dai, F.4
Qi, G.5
-
22
-
-
84860901794
-
An efficient and flexible web services-based multidisciplinary design optimization framework for complex engineering systems
-
Aug
-
L. Li and J. Liu, "An efficient and flexible web services-based multidisciplinary design optimization framework for complex engineering systems," Enterp. Inform. Syst., vol. 6, no. 3, pp. 345-371, Aug. 2012.
-
(2012)
Enterp. Inform. Syst.
, vol.6
, Issue.3
, pp. 345-371
-
-
Li, L.1
Liu, J.2
-
23
-
-
84884332287
-
A framework for service enterprise workflow simulation with multi-agents cooperation
-
W. Tan, W. Xu, F. Yang, L. Xu, and C. Jiang, "A framework for service enterprise workflow simulation with multi-agents cooperation," Enterp. Inform. Syst., vol. 7, no. 4, pp. 523-542, 2013.
-
(2013)
Enterp. Inform. Syst.
, vol.7
, Issue.4
, pp. 523-542
-
-
Tan, W.1
Xu, W.2
Yang, F.3
Xu, L.4
Jiang, C.5
-
24
-
-
84878125540
-
A system framework of security management in enterprise systems
-
F. Wang, B. Ge, L. Zhang, Y. Chen, Y. Xin, and X. Li, "A system framework of security management in enterprise systems," Syst. Res. Behav. Sci., vol. 30, no. 3, pp. 287-299, 2013.
-
(2013)
Syst. Res. Behav. Sci.
, vol.30
, Issue.3
, pp. 287-299
-
-
Wang, F.1
Ge, B.2
Zhang, L.3
Chen, Y.4
Xin, Y.5
Li, X.6
-
25
-
-
84898426599
-
Integration of distributed enterprise applications: A survey
-
Feb
-
W. He and L. Xu, "Integration of distributed enterprise applications: A survey," IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 35-42, Feb. 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.1
, pp. 35-42
-
-
He, W.1
Xu, L.2
-
26
-
-
84871810161
-
Smartphone-based industrial informatics projects and laboratories
-
Feb
-
H. Hassan, J. Martinez-Rubio, A. Perles, J. Capella, C. Dominguez, and J. Albaladejo, "Smartphone-based industrial informatics projects and laboratories," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 557-566, Feb. 2013.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.1
, pp. 557-566
-
-
Hassan, H.1
Martinez-Rubio, J.2
Perles, A.3
Capella, J.4
Dominguez, C.5
Albaladejo, J.6
-
27
-
-
84911215405
-
Design of a terminal solution for integration of in-home health care devices and services towards the internet-of-things
-
to be published doi: 10.1080/17517575.2013.776118
-
Z. Pang, L. Zheng, J. Tian, S. Kao-Walter, E. Dubrova, and Q. Chen, "Design of a terminal solution for integration of in-home health care devices and services towards the internet-of-things," Enterp. Inform. Syst., to be published, doi: 10.1080/17517575.2013.776118.
-
Enterp. Inform. Syst
-
-
Pang, Z.1
Zheng, L.2
Tian, J.3
Kao-Walter, S.4
Dubrova, E.5
Chen, Q.6
-
29
-
-
80051520848
-
Mobile attacks and defense
-
Jul./Aug
-
C. Miller, "Mobile attacks and defense," IEEE Security Privacy, vol. 9, no. 4, pp. 68-70, Jul./Aug. 2011.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.4
, pp. 68-70
-
-
Miller, C.1
-
30
-
-
0009481412
-
A survey of trust in internet applications
-
T. Grandison and M. Sloman, "A survey of trust in internet applications," IEEE Commun. Surveys Tuts., vol. 3, no. 4, pp. 2-16, 2000.
-
(2000)
IEEE Commun. Surveys Tuts.
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
31
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
-
A. Jsang, R. Ismail, and C. Boyd, "Asurvey of trust and reputation systems for online service provision," Decis. Support Syst., vol. 43, no. 2, pp. 618-644, Mar. 2007. (Pubitemid 46216533)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
32
-
-
84900792477
-
-
Trustworthy Application Platform Trustworthy Application Store for Mobile Terminal [Online]. Available:
-
Trustworthy Application Platform, Trustworthy Application Store for Mobile Terminal [Online]. Available: http://www.kexinapp.com/
-
-
-
-
33
-
-
79955554330
-
Usefulness is not trustworthiness
-
May/Jun
-
L. P. Cox, "Usefulness is not trustworthiness," IEEE Internet Comput., vol. 15, no. 3, pp. 79-80, May/Jun. 2011.
-
(2011)
IEEE Internet Comput.
, vol.15
, Issue.3
, pp. 79-80
-
-
Cox, L.P.1
-
34
-
-
84856511098
-
Adatamining basedmeasurementmethod for software trustworthiness
-
Y.Yuan andQ.Han, "Adatamining basedmeasurementmethod for software trustworthiness," Chinese J. Electron., vol. 21, no. 1, pp. 13-16, 2012.
-
(2012)
Chinese J. Electron.
, vol.21
, Issue.1
, pp. 13-16
-
-
Yuan, Y.1
Han, Q.2
-
35
-
-
84900833426
-
-
TCG MPWG Mobile Trusted Module Specification [Online]. Available
-
TCG MPWG, Mobile Trusted Module Specification [Online]. Available: http://www.trustedcomputinggroup.org/developers/mobile
-
-
-
-
36
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. 13th USENIX Conf. Security Symp., 2004, vol. 13, p. 16.
-
(2004)
Proc. 13th USENIX Conf. Security Symp.
, vol.13
, pp. 16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
37
-
-
33846179345
-
A behavior-based remote trust attestation model
-
H. Zhang and F. Wang, "A behavior-based remote trust attestation model," Wuhan Univ. J. Nat. Sci., vol. 11, no. 6, pp. 1819-1822, 2006.
-
(2006)
Wuhan Univ. J. Nat. Sci.
, vol.11
, Issue.6
, pp. 1819-1822
-
-
Zhang, H.1
Wang, F.2
-
39
-
-
3142523603
-
The UCONABCusage control model
-
Feb.
-
J. Park and R. Sandhu, "TheUCONABCusage control model, "ACMTrans. Inform. Syst. Security (TISSEC), vol. 7, no. 1, pp. 128-174, Feb. 2004.
-
(2004)
ACM Trans. Inform. Syst. Security (TISSEC)
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
40
-
-
84874702090
-
App epidemics: Modelling the effects of publicity in a mobile app ecosystem
-
S. L. Lim and P. J. Bentley, "App epidemics: Modelling the effects of publicity in a mobile app ecosystem," Artif. Life, vol. 13, pp. 202-209, 2012.
-
(2012)
Artif. Life
, vol.13
, pp. 202-209
-
-
Lim, S.L.1
Bentley, P.J.2
-
41
-
-
84864978921
-
Measuring user confidence in smartphone security and privacy
-
New York, NY, USA
-
E. Chin, A. P. Felt, V. Sekar, and D. Wagner, "Measuring user confidence in smartphone security and privacy," in Proc. 8th Symp. Usable Privacy Security, New York, NY, USA, 2012, p. 1.
-
(2012)
Proc. 8th Symp. Usable Privacy Security
, pp. 1
-
-
Chin, E.1
Felt, A.P.2
Sekar, V.3
Wagner, D.4
-
42
-
-
79958760133
-
Mobile application market: A developers perspective
-
A. Holzer and J. Ondrus, "Mobile application market: A developers perspective," Telemat. Inform., vol. 28, no. 1, pp. 22-31, 2011.
-
(2011)
Telemat. Inform.
, vol.28
, Issue.1
, pp. 22-31
-
-
Holzer, A.1
Ondrus, J.2
-
43
-
-
77954981828
-
Exploring trust of mobile applications based on user behaviors
-
Z. Yan, Y. Dong, V. Niemi, and G. Yu, "Exploring trust of mobile applications based on user behaviors," in 1st Int. Conf. Trusted Syst., 2010, pp. 212-226.
-
(2010)
1st Int. Conf. Trusted Syst.
, pp. 212-226
-
-
Yan, Z.1
Dong, Y.2
Niemi, V.3
Yu, G.4
-
44
-
-
84864614830
-
TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications
-
Jun
-
Z. Yan, P. Zhang, and R. H. Deng, "TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications," Pers. Ubiquit. Comput., vol. 16, no. 5, pp. 485-506, Jun. 2012.
-
(2012)
Pers. Ubiquit. Comput.
, vol.16
, Issue.5
, pp. 485-506
-
-
Yan, Z.1
Zhang, P.2
Deng, R.H.3
-
46
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
New York, NY, USA
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Using probabilistic generative models for ranking risks of android apps," in Proc. ACM Conf. Comput. Commun. Security, New York, NY, USA, 2012, pp. 241-252.
-
(2012)
Proc.ACM Conf. Comput. Commun. Security
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
47
-
-
84874529724
-
Determining trustworthiness and quality of mobile applications
-
Oper. Syst. Appl., Berlin, Germany
-
I. Pranata, R. Athauda, and G. Skinner, "Determining trustworthiness and quality of mobile applications," in 5th Int. Conf. Mobile Wireless Middleware, Oper. Syst. Appl., Berlin, Germany, 2013, pp. 192-206.
-
(2013)
5th Int. Conf. Mobile Wireless Middleware
, pp. 192-206
-
-
Pranata, I.1
Athauda, R.2
Skinner, G.3
-
48
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
New York, NY, USA
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung, "Vision: Automated security validation of mobile apps at app markets," in Proc. 2nd Int. Workshop Mobile Cloud Comput. Serv., New York, NY, USA, 2011, pp. 21-26.
-
(2011)
Proc. 2nd Int. Workshop Mobile Cloud Comput. Serv
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
49
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in Proc. 9th USENIX Conf. Operating Syst. Design Implement., 2010, pp. 1-6.
-
(2010)
Proc. 9th USENIX Conf. Operating Syst. Design Implement.
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
50
-
-
37349127497
-
A DS-AHP approach for multi-attribute decision making problem with incomplete information
-
DOI 10.1016/j.eswa.2007.02.021, PII S0957417407000991
-
Z. Hua, B. Gong, and X. Xu, "A DS-AHP approach for multi-attribute decision making problem with incomplete information," Expert Syst. Appl., vol. 34, no. 3, pp. 2221-2227, Apr. 2008. (Pubitemid 350298240)
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.3
, pp. 2221-2227
-
-
Hua, Z.1
Gong, B.2
Xu, X.3
-
51
-
-
77950989855
-
Dynamic evolution mechanism for trustworthy software based on service composition
-
J. Zeng, H. Sun, X. Liu, T. Deng, and J. Huai, "Dynamic evolution mechanism for trustworthy software based on service composition," J. Softw., vol. 21, no. 2, pp. 261-276, 2010.
-
(2010)
J. Softw.
, vol.21
, Issue.2
, pp. 261-276
-
-
Zeng, J.1
Sun, H.2
Liu, X.3
Deng, T.4
Huai, J.5
-
52
-
-
84876220797
-
Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things
-
Pyeong Chang, South Korea
-
Z. Pang, Q. Chen, J. Tian, L. Zheng, and E. Dubrova, "Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things," in Proc. 15th Int. Conf. Adv. Commun. Technol., Pyeong Chang, South Korea, 2013, pp. 529-534.
-
(2013)
Proc. 15th Int. Conf. Adv. Commun. Technol
, pp. 529-534
-
-
Pang, Z.1
Chen, Q.2
Tian, J.3
Zheng, L.4
Dubrova, E.5
-
53
-
-
84871964962
-
Review of security issues in industrial networks
-
Feb
-
M. Cheminod, L. Durante, and A. Valenzano. "Review of security issues in industrial networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 277-293, Feb. 2013.
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.1
, pp. 277-293
-
-
Cheminod, M.1
Durante, L.2
Valenzano., A.3
|