-
1
-
-
85030385311
-
-
NSF Workshop On Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, TX
-
Lee E, Cyber-Physical Systems - Are Computing Foundations Adequate?, NSF Workshop On Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, TX, 2006.
-
(2006)
Cyber-physical Systems - Are Computing Foundations Adequate?
-
-
Lee, E.1
-
2
-
-
77956217277
-
-
Design Automation Conference, Anaheim, California, USA
-
Rajkumar R., Lee I, Sha L, and Stankovic J, Cyber-Physical Systems: The Next Computing Revolution, Design Automation Conference, Anaheim, California, USA, 2010.
-
(2010)
Cyber-physical Systems: The Next Computing Revolution
-
-
Rajkumar, R.1
Lee, I.2
Sha, L.3
Stankovic, J.4
-
3
-
-
84941070941
-
-
Bachelor thesis, Information and Communication School, KTH Royal Institute of Technology, Kista, Sweden
-
Persson M., Communication Protocol for a Cyber-Physical System - Using Bluetooth, NFC and Cloud Computing, Bachelor thesis, Information and Communication School, KTH Royal Institute of Technology, Kista, Sweden 2015.
-
(2015)
Communication Protocol for a Cyber-physical System - Using Bluetooth, NFC and Cloud Computing
-
-
Persson, M.1
-
4
-
-
65249108723
-
Cyber-physical systems
-
Mar.
-
Wolf W, "Cyber-physical Systems", Computer, vol. 42, no. 3, pp. 88-89, Mar. 2009.
-
(2009)
Computer
, vol.42
, Issue.3
, pp. 88-89
-
-
Wolf, W.1
-
5
-
-
84928667408
-
The past, present and future of cyber-physical systems: A focus on models
-
Feb.
-
Lee E, The Past, Present and Future of Cyber-Physical Systems: A Focus on Models, Sensors, vol. 15, no. 3, pp. 4837-4869, Feb. 2015.
-
(2015)
Sensors
, vol.15
, Issue.3
, pp. 4837-4869
-
-
Lee, E.1
-
6
-
-
84924124356
-
An infrastructure for individualised and intelligent decision-making and negotiation in cyber-physical systems
-
2014, entity works according the abstract protocol specification
-
A. Håkansson and R. Hartung, An Infrastructure for Individualised and Intelligent Decision-making and Negotiation in Cyber-physical Systems, In Procedia Comput. Sci., vol. 35, pp. 822-831, 2014. entity works according the abstract protocol specification.
-
Procedia Comput. Sci.
, vol.35
, pp. 822-831
-
-
Håkansson, A.1
Hartung, R.2
-
7
-
-
85030379154
-
Bluetooth SIG, fast facts | bluetooth technology website
-
Bluetooth SIG, Fast Facts | Bluetooth Technology Website, Bluetooth, 2015. [Online]. Available: http://www.bluetooth.com/Pages/Fast-Facts.aspx.
-
(2015)
Bluetooth
-
-
-
8
-
-
84941094520
-
Bluetooth 3.0 goes to 24 Mbps via 802.11
-
21-Apr
-
Quick D, Bluetooth 3.0 goes to 24 Mbps via 802.11, Gizmag, 21-Apr-2009. [Online]. Available: http://www.gizmag.com/bluetooth-3-sig/11515/.
-
(2009)
Gizmag
-
-
Quick, D.1
-
9
-
-
84941027258
-
About near field communication
-
Apr.
-
NearFieldCommunication.org, "About Near Field Communication", NFC, Apr-2014, http://www.nearfieldcommunication.org/about-nfc.html.
-
(2014)
NFC
-
-
NearFieldCommunication.org1
-
10
-
-
85030384750
-
Frequently asked questions
-
RFID Journal LLC, "Frequently Asked Questions", RFID Journal, 2015, http://www.rfidjournal.com/site/faqs#Anchor-How-7638.
-
(2015)
RFID Journal
-
-
RFID Journal LLC1
-
11
-
-
85030374336
-
How near field communication works
-
NearFieldCommunication.org, "How Near Field Communication Works", NFC, 2015, http://www.nearfieldcommunication.org/how-it-works.html
-
(2015)
NFC
-
-
NearFieldCommunication.org1
-
12
-
-
85030378610
-
Near field communication versus bluetooth
-
NearFieldCommunication.org, "Near Field Communication versus Bluetooth", NFC, 2015, http://www.nearfieldcommunication.org/bluetooth.html
-
(2015)
NFC
-
-
NearFieldCommunication.org1
-
15
-
-
79959345176
-
Evaluating IEEE 802.15.4 for cyber-physical systems
-
Xia F, Vinel A. V, Gao R, Wang L, and Qiu T, Evaluating IEEE 802.15.4 for Cyber-Physical Systems, Eurasip J. Wirel. Commun. Netw., vol. 2011, pp. 1-14, 2011.
-
(2011)
Eurasip J. Wirel. Commun. Netw.
, vol.2011
, pp. 1-14
-
-
Xia, F.1
Vinel, A.V.2
Gao, R.3
Wang, L.4
Qiu, T.5
-
16
-
-
45849102072
-
Detecting communication protocol security flaws by formal fuzz testing and machine learning
-
Springer Berlin Heidelberg
-
Shu Q, Hsu Y, and Lee D, Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning, in Formal Techniques for Networked and Distributed Systems-FORTE 2008, Springer Berlin Heidelberg, 2008, pp. 299-304.
-
(2008)
Formal Techniques for Networked and Distributed Systems-FORTE 2008
, pp. 299-304
-
-
Shu, Q.1
Hsu, Y.2
Lee, D.3
-
17
-
-
0029732592
-
Non-repudiation with mandatory proof of receipt
-
Jan.
-
Coffey T, and Saidha P, Non-Repudiation with Mandatory Proof of Receipt, SIGCOMM Comput Commun Rev, vol. 26, no. 1, pp. 6-17, Jan. 1996.
-
(1996)
SIGCOMM Comput Commun Rev
, vol.26
, Issue.1
, pp. 6-17
-
-
Coffey, T.1
Saidha, P.2
-
18
-
-
84941129538
-
Cloud security - Crypto services and data security in microsoft azure
-
Jan.
-
Wiggs J, Cloud Security - Crypto Services and Data Security in Microsoft Azure, MSDN Magazine, Jan-2010.
-
(2010)
MSDN Magazine
-
-
Wiggs, J.1
-
19
-
-
85030377156
-
Can the automotive industry help boost the global economy?
-
Biller C, Can the automotive industry help boost the global economy?, Automotive World Megatrends Magazine, vol. Q1, pp. 32-33, 2014
-
(2014)
Automotive World Megatrends Magazine
, vol.Q1
, pp. 32-33
-
-
Biller, C.1
-
21
-
-
84855303509
-
A secured health care application architecture for cyber-physical systems
-
Wang J, Abid H, Lee S, Shu L, Xia F, A secured health care application architecture for cyber-physical systems, Control Eng. Appl. Inform., vol. 13, no. 3, pp. 101-108, 2011
-
(2011)
Control Eng. Appl. Inform.
, vol.13
, Issue.3
, pp. 101-108
-
-
Wang, J.1
Abid, H.2
Lee, S.3
Shu, L.4
Xia, F.5
-
22
-
-
0019009081
-
Formal methods in communication protocol design
-
Bochmann G. V, and Sunshine C. A, Formal Methods in Communication Protocol Design, IEEE Trans. Commun., vol. 28, no. 4, 1980.
-
(1980)
IEEE Trans. Commun.
, vol.28
, Issue.4
-
-
Bochmann, G.V.1
Sunshine, C.A.2
|