-
3
-
-
84555177840
-
A survey of cyber-physical systems
-
November, IEEE
-
Shi, J., Wan, J., Yan, H., & Suo, H. (2011, November). A survey of cyber-physical systems. In Proceedings of Wireless Communications and Signal Processing (WCSP), (pp. 1-6). IEEE.
-
(2011)
Proceedings of Wireless Communications and Signal Processing (WCSP)
, pp. 1-6
-
-
Shi, J.1
Wan, J.2
Yan, H.3
Suo, H.4
-
4
-
-
79953117676
-
Security issues and challenges for cyber physical system
-
December, IEEE Computer Society
-
Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., & Chow, K. P. (2010, December). Security issues and challenges for cyber physical system. In Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing (pp. 733-738). IEEE Computer Society. doi:10.1109/GreenCom-CPSCom.2010.36
-
(2010)
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
, pp. 733-738
-
-
Wang, E.K.1
Ye, Y.2
Xu, X.3
Yiu, S.M.4
Hui, L.C.K.5
Chow, K.P.6
-
5
-
-
77950831820
-
Optimal and adaptive battery discharge strategies for cyberphysical systems
-
December, IEEE
-
Zhang, F., & Shi, Z. (2009, December). Optimal and adaptive battery discharge strategies for cyberphysical systems. In Proceedings of Decision and Control, 2009 Held Jointly with the 2009 28th Chinese Control Conference (pp. 6232-6237). IEEE. doi:10.1109/CDC.2009.5400561
-
(2009)
Proceedings of Decision and Control, 2009 Held Jointly with the 2009 28th Chinese Control Conference
, pp. 6232-6237
-
-
Zhang, F.1
Shi, Z.2
-
7
-
-
80255136670
-
Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence
-
Conti, M., Das, S. K., Bisdikian, C., Kumar, M., Ni, L. M., & Passarella, A. et al. (2012). Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence. Pervasive and Mobile Computing, 8(1), 2-21. doi:10.1016/j.pmcj.2011.10.001
-
(2012)
Pervasive and Mobile Computing
, vol.8
, Issue.1
, pp. 2-21
-
-
Conti, M.1
Das, S.K.2
Bisdikian, C.3
Kumar, M.4
Ni, L.M.5
Passarella, A.6
-
8
-
-
79953837952
-
Research directions in energy-sustainable cyber-physical systems
-
Gupta, S. K., Mukherjee, T., Varsamopoulos, G., & Banerjee, A. (2011). Research directions in energy-sustainable cyber-physical systems. Sustainable Computing: Informatics and Systems, 1(1), 57-74.
-
(2011)
Sustainable Computing: Informatics and Systems
, vol.1
, Issue.1
, pp. 57-74
-
-
Gupta, S.K.1
Mukherjee, T.2
Varsamopoulos, G.3
Banerjee, A.4
-
9
-
-
82755188185
-
Cyber physical systems: a survey
-
June
-
Huang, B. X. (2008). Cyber physical systems: a survey. Presentation Report, June.
-
(2008)
Presentation Report
-
-
Huang, B.X.1
-
12
-
-
77956217277
-
Cyber-physical systems: the next computing revolution
-
June, ACM
-
Rajkumar, R. R., Lee, I., Sha, L., & Stankovic, J. (2010, June). Cyber-physical systems: the next computing revolution. In Proceedings of the 47th Design Automation Conference (pp. 731-736). ACM. doi:10.1145/1837274.1837461
-
(2010)
Proceedings of the 47th Design Automation Conference
, pp. 731-736
-
-
Rajkumar, R.R.1
Lee, I.2
Sha, L.3
Stankovic, J.4
-
13
-
-
84892198803
-
Cyber-physical systems: A new frontier
-
Springer US
-
Sha, L., Gopalakrishnan, S., Liu, X., & Wang, Q. (2009). Cyber-physical systems: A new frontier. In Machine Learning in Cyber Trust (pp. 3-13). Springer US.
-
(2009)
Machine Learning in Cyber Trust
, pp. 3-13
-
-
Sha, L.1
Gopalakrishnan, S.2
Liu, X.3
Wang, Q.4
-
14
-
-
79960924365
-
From wireless sensor networks towards cyber physical systems
-
Wu, F. J., Kao, Y. F., & Tseng, Y. C. (2011). From wireless sensor networks towards cyber physical systems. Pervasive and Mobile Computing, 7(4), 397-413. doi:10.1016/j.pmcj.2011.03.003
-
(2011)
Pervasive and Mobile Computing
, vol.7
, Issue.4
, pp. 397-413
-
-
Wu, F.J.1
Kao, Y.F.2
Tseng, Y.C.3
-
15
-
-
0032178780
-
A network architecture for heterogeneous mobile computing
-
Brewer, E. A., Katz, R. H., Chawathe, Y., Gribble, S. D., Hodes, T., & Nguyen, G. et al. (1998). A network architecture for heterogeneous mobile computing. IEEE Personal Communications, 5(5), 8-24. doi:10.1109/98.729719
-
(1998)
IEEE Personal Communications
, vol.5
, Issue.5
, pp. 8-24
-
-
Brewer, E.A.1
Katz, R.H.2
Chawathe, Y.3
Gribble, S.D.4
Hodes, T.5
Nguyen, G.6
-
16
-
-
0032644528
-
Resilience in multilayer networks
-
Demeester, P., Gryseels, M., Autenrieth, A., Brianza, C., Castagna, L., & Signorelli, G. et al. (1999). Resilience in multilayer networks. IEEE Communications Magazine, 37(8), 70-76. doi:10.1109/35.783128
-
(1999)
IEEE Communications Magazine
, vol.37
, Issue.8
, pp. 70-76
-
-
Demeester, P.1
Gryseels, M.2
Autenrieth, A.3
Brianza, C.4
Castagna, L.5
Signorelli, G.6
-
17
-
-
77956364473
-
The design of an open data service architecture for cyberphysical systems
-
Kang, W., & Son, S. H. (2008). The design of an open data service architecture for cyberphysical systems. ACM SIGBED Review, 5(1), 3. doi:10.1145/1366283.1366286
-
(2008)
ACM SIGBED Review
, vol.5
, Issue.1
, pp. 3
-
-
Kang, W.1
Son, S.H.2
-
18
-
-
0029776122
-
The bay area research wireless access network (BARWAN)
-
February, IEEE
-
Katz, R. H., Brewer, E. A., Amir, E., Balakrishnan, H., Fox, A., Gribble, S., et al. (1996, February). The bay area research wireless access network (BARWAN). In Proceedings of Compcon'96: Technologies for the Information Superhighway (pp. 15-20). IEEE.
-
(1996)
Proceedings of Compcon'96: Technologies for the Information Superhighway
, pp. 15-20
-
-
Katz, R.H.1
Brewer, E.A.2
Amir, E.3
Balakrishnan, H.4
Fox, A.5
Gribble, S.6
-
19
-
-
70349655613
-
Cross-Layer Survivability in WDM-Based Networks
-
Lee, K., & Modiano, E. (2009). Cross-Layer Survivability in WDM-Based Networks. In Proceedings of INFOCOM 2009. IEEE. doi:10.1109/INFCOM.2009.5062013
-
(2009)
Proceedings of INFOCOM 2009. IEEE
-
-
Lee, K.1
Modiano, E.2
-
20
-
-
79955853464
-
Multilayer networks: An architecture framework
-
Lehman, T., Yang, X., Ghani, N., Gu, F., Guok, C., Monga, I., & Tierney, B. (2011). Multilayer networks: An architecture framework. IEEE Communications Magazine, 49(5), 122-130. doi:10.1109/MCOM.2011.5762808
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.5
, pp. 122-130
-
-
Lehman, T.1
Yang, X.2
Ghani, N.3
Gu, F.4
Guok, C.5
Monga, I.6
Tierney, B.7
-
21
-
-
84885397904
-
An architectural approach to the design and analysis of cyber-physical systems
-
Rajhans, A., Cheng, S. W., Schmerl, B., Garlan, D., Krogh, B. H., Agbi, C., & Bhave, A. (2009). An architectural approach to the design and analysis of cyber-physical systems. Electronic Communications of the EASST, 21.
-
(2009)
Electronic Communications of the EASST
, pp. 21
-
-
Rajhans, A.1
Cheng, S.W.2
Schmerl, B.3
Garlan, D.4
Krogh, B.H.5
Agbi, C.6
Bhave, A.7
-
22
-
-
78651451987
-
Heterogeneous multi-layer wireless networking for mobile CPS
-
October, UIC/ATC, IEEE
-
Shen, J., Xu, F., Lu, X., & Li, H. (2010, October). Heterogeneous multi-layer wireless networking for mobile CPS. In Proceedings of Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), (pp. 223-227). IEEE. doi:10.1109/UIC-ATC.2010.30
-
(2010)
Proceedings of Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing
, pp. 223-227
-
-
Shen, J.1
Xu, F.2
Lu, X.3
Li, H.4
-
23
-
-
80053160325
-
Cyber-physical handshake
-
August
-
Wu, F. J., Chu, F. I., & Tseng, Y. C. (2011, August). Cyber-physical handshake. Computer Communication Review, 41(4), 472-473. doi:10.1145/2043164.2018527
-
(2011)
Computer Communication Review
, vol.41
, Issue.4
, pp. 472-473
-
-
Wu, F.J.1
Chu, F.I.2
Tseng, Y.C.3
-
24
-
-
79960924365
-
From wireless sensor networks towards cyber physical systems
-
Wu, F. J., Kao, Y. F., & Tseng, Y. C. (2011a). From wireless sensor networks towards cyber physical systems. Pervasive and Mobile Computing, 7(4), 397-413. doi:10.1016/j.pmcj.2011.03.003
-
(2011)
Pervasive and Mobile Computing
, vol.7
, Issue.4
, pp. 397-413
-
-
Wu, F.J.1
Kao, Y.F.2
Tseng, Y.C.3
-
25
-
-
0035392889
-
Traffic grooming in WDM networks
-
Modiano, E. (2001). Traffic grooming in WDM networks. IEEE Communications Magazine, 39(7), 124-129. doi:10.1109/35.933446
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.7
, pp. 124-129
-
-
Modiano, E.1
-
26
-
-
84914165840
-
Towards Robustness of Cyber-Physical Systems
-
Tabuada, P., Caliskan, S. Y., Rungger, M., & Majumdar, R. (2014). Towards Robustness of Cyber-Physical Systems. IEEE Transactions on Automatic Control, 1. doi:10.1109/TAC.2014.2351632
-
(2014)
IEEE Transactions on Automatic Control
, pp. 1
-
-
Tabuada, P.1
Caliskan, S.Y.2
Rungger, M.3
Majumdar, R.4
-
27
-
-
79961153755
-
Towards a science of cyber-physical systems design
-
April, IEEE
-
Bogdan, P., & Marculescu, R. (2011, April). Towards a science of cyber-physical systems design. In Proceedings of Cyber-Physical Systems (ICCPS), (pp. 99-108). IEEE. doi:10.1109/ICCPS.2011.14
-
(2011)
Proceedings of Cyber-Physical Systems (ICCPS)
, pp. 99-108
-
-
Bogdan, P.1
Marculescu, R.2
-
28
-
-
80053213991
-
Network latency and packet delay variation in cyber-physical systems
-
June, IEEE
-
Cardoso, J., Derler, P., Eidson, J. C., & Lee, E. A. (2011, June). Network latency and packet delay variation in cyber-physical systems. In Proceedings of Network Science Workshop (NSW), (pp. 51-58). IEEE. doi:10.1109/NSW.2011.6004658
-
(2011)
Proceedings of Network Science Workshop (NSW)
, pp. 51-58
-
-
Cardoso, J.1
Derler, P.2
Eidson, J.C.3
Lee, E.A.4
-
29
-
-
78650146389
-
Information and control: A bridge between the physical and decision layers
-
NSF
-
Dahleh, M. A., Frazzoli, E., Megretski, A., Mitter, S. K., Ozdaglar, A. E., Parrilo, P. A., & Shah, D. (2006), Information and control: A bridge between the physical and decision layers. In Proceedings of NSF Workshop in Cyber-Physical Systems. NSF.
-
(2006)
Proceedings of NSF Workshop in Cyber-Physical Systems
-
-
Dahleh, M.A.1
Frazzoli, E.2
Megretski, A.3
Mitter, S.K.4
Ozdaglar, A.E.5
Parrilo, P.A.6
Shah, D.7
-
30
-
-
80052469409
-
A model-based design methodology for cyber-physical systems
-
July, IWCMC, IEEE
-
Jensen, J. C., Chang, D. H., & Lee, E. A. (2011, July). A model-based design methodology for cyber-physical systems. In Proceedings of Wireless Communications and Mobile Computing Conference (IWCMC), (pp. 1666-1671). IEEE. doi:10.1109/IWCMC.2011.5982785
-
(2011)
Proceedings of Wireless Communications and Mobile Computing Conference
, pp. 1666-1671
-
-
Jensen, J.C.1
Chang, D.H.2
Lee, E.A.3
-
32
-
-
85032602790
-
A cyber-physical system design approach
-
ICONS 2011, St. Maarten: International Academy, Research, and Industry Association
-
Miroslav, Š. V. É. D. A., & Radimír, V. R. B. A. (2011). A cyber-physical system design approach. In Proceedings of the Sixth International Conference on Systems (ICONS 2011). St. Maarten: International Academy, Research, and Industry Association.
-
(2011)
Proceedings of the Sixth International Conference on Systems
-
-
Miroslav, S.V.E.D.1
Radimír, V.R.B.A.2
-
33
-
-
84869097203
-
Cyberphysical systems: Milestones and research challenges
-
Park, K. J., Zheng, R., & Liu, X. (2012). Cyberphysical systems: Milestones and research challenges. Computer Communications, 36(1), 1-7. doi:10.1016/j.comcom.2012.09.006
-
(2012)
Computer Communications
, vol.36
, Issue.1
, pp. 1-7
-
-
Park, K.J.1
Zheng, R.2
Liu, X.3
-
34
-
-
85032601968
-
A multidisciplinary design methodology for cyber-physical systems
-
Slomka, F., Kollmann, S., Moser, S., & Kempf, K. (2011). A multidisciplinary design methodology for cyber-physical systems. ACESMB, 2011, 23.
-
(2011)
ACESMB
, vol.2011
, pp. 23
-
-
Slomka, F.1
Kollmann, S.2
Moser, S.3
Kempf, K.4
-
36
-
-
72849136347
-
Joint optimal congestion control and channel assignment for multi-radio multi-channel wireless networks in Cyber-Physical Systems
-
July, IEEE
-
Li, K., Liu, Q., Wang, F., & Xie, X. (2009, July). Joint optimal congestion control and channel assignment for multi-radio multi-channel wireless networks in Cyber-Physical Systems. In Proceedings of Ubiquitous, Autonomic and Trusted Computing, (pp. 456-460). IEEE. doi:10.1109/UIC-ATC.2009.27
-
(2009)
Proceedings of Ubiquitous, Autonomic and Trusted Computing
, pp. 456-460
-
-
Li, K.1
Liu, Q.2
Wang, F.3
Xie, X.4
-
37
-
-
84873315082
-
The future of human-in-the-loop cyber-physical systems
-
Science of Computer Programming
-
Schirner, G., Erdogmus, D., Chowdhury, K., & Padir, T. (2013). The future of human-in-the-loop cyber-physical systems. In A distributed logic for networked cyber-physical systems. Science of Computer Programming.
-
(2013)
A distributed logic for networked cyber-physical systems
-
-
Schirner, G.1
Erdogmus, D.2
Chowdhury, K.3
Padir, T.4
-
38
-
-
84873943001
-
A novel capacity and trust based service selection mechanism for collaborative decision making in CPS
-
Zhang, B., Xiang, Y., Wang, P., & Huang, Z. (2011). A novel capacity and trust based service selection mechanism for collaborative decision making in CPS. Computer Science and Information Systems, 8(4), 1159-1184. doi:10.2298/CSIS110225049Z
-
(2011)
Computer Science and Information Systems
, vol.8
, Issue.4
, pp. 1159-1184
-
-
Zhang, B.1
Xiang, Y.2
Wang, P.3
Huang, Z.4
-
39
-
-
85030153959
-
IEEE 802.11 ad hoc networks: protocols, performance and open issues
-
Academic Press
-
Anastasi, G., Conti, M., & Gregori, E. (2004). IEEE 802.11 ad hoc networks: protocols, performance and open issues. In Proceedings of Mobile Ad Hoc Networking, (pp. 69-116). Academic Press.
-
(2004)
Proceedings of Mobile Ad Hoc Networking
, pp. 69-116
-
-
Anastasi, G.1
Conti, M.2
Gregori, E.3
-
40
-
-
10044256517
-
Coverage in wireless sensor networks
-
Academic Press
-
Cardei, M., & Wu, J. (2004). Coverage in wireless sensor networks. In Handbook of sensor networks, (pp. 422-433). Academic Press.
-
(2004)
Handbook of sensor networks
, pp. 422-433
-
-
Cardei, M.1
Wu, J.2
-
41
-
-
24744442310
-
Performance issues with IEEE 802.11 in ad hoc networking
-
Chaudet, C., Dhoutaut, D., & Lassous, I. G. (2005). Performance issues with IEEE 802.11 in ad hoc networking. IEEE Communications Magazine, 43(7), 110-116. doi:10.1109/MCOM.2005.1470836
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 110-116
-
-
Chaudet, C.1
Dhoutaut, D.2
Lassous, I.G.3
-
42
-
-
0037250696
-
Multicast over wireless mobile ad hoc networks: Present and future directions
-
de Morais Cordeiro, C., Gossain, H., & Agrawal, D. P. (2003). Multicast over wireless mobile ad hoc networks: Present and future directions. IEEE Network, 17(1), 52-59. doi:10.1109/MNET.2003.1174178
-
(2003)
IEEE Network
, vol.17
, Issue.1
, pp. 52-59
-
-
de Morais Cordeiro, C.1
Gossain, H.2
Agrawal, D.P.3
-
43
-
-
78651541486
-
Coverage problem in wireless sensor network: A survey
-
Fan, G., & Jin, S. (2010). Coverage problem in wireless sensor network: A survey. Journal of Networks, 5(9), 1033-1040. doi:10.4304/jnw.5.9.1033-1040
-
(2010)
Journal of Networks
, vol.5
, Issue.9
, pp. 1033-1040
-
-
Fan, G.1
Jin, S.2
-
44
-
-
0003899974
-
-
Technical Report, 1999, Academic Press
-
Liu, M., Talpade, R. R., Mcauley, A., & Bommaiah, E. (1999). AMRoute: Adhoc Multicast Routing Protocol (Technical Report, 1999). Academic Press.
-
(1999)
AMRoute: Adhoc Multicast Routing Protocol
-
-
Liu, M.1
Talpade, R.R.2
Mcauley, A.3
Bommaiah, E.4
-
45
-
-
0034997317
-
Coverage problems in wireless ad-hoc sensor networks
-
July
-
Meguerdichian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M. (2001, July). Coverage problems in wireless ad-hoc sensor networks. IEEE Infocom, 3, 1380-1387.
-
(2001)
IEEE Infocom
, vol.3
, pp. 1380-1387
-
-
Meguerdichian, S.1
Koushanfar, F.2
Potkonjak, M.3
Srivastava, M.4
-
46
-
-
85032597410
-
Review and analysis of the issues of multicast routing in ad hoc networks: A novel study
-
Ahamed, S. R. (2011). Review and analysis of the issues of multicast routing in ad hoc networks: A novel study. International Journal of Engineering Science and Technology, 3(4).
-
(2011)
International Journal of Engineering Science and Technology
, vol.3
, Issue.4
-
-
Ahamed, S.R.1
-
48
-
-
79956017529
-
Broadcast analysis of spanning tree flooding algorithm for mobile ad hoc networks
-
February, ACM
-
Kimm, H., Engle, A., & Lee, F. (2011, February). Broadcast analysis of spanning tree flooding algorithm for mobile ad hoc networks. In Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication (p. 85). ACM. doi:10.1145/1968613.1968714
-
(2011)
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
, pp. 85
-
-
Kimm, H.1
Engle, A.2
Lee, F.3
-
49
-
-
0038719858
-
Coverage in wireless ad hoc sensor networks. Computers
-
Li, M., Wan, P. J., & Frieder, O. (2003). Coverage in wireless ad hoc sensor networks. Computers. IEEE Transactions on, 52(6), 753-763.
-
(2003)
IEEE Transactions on
, vol.52
, Issue.6
, pp. 753-763
-
-
Li, M.1
Wan, P.J.2
Frieder, O.3
-
50
-
-
84959273784
-
Multicast routing issues in ad hoc networks
-
October, ICUPC'98. IEEE 1998 International Conference on, IEEE
-
Obraczka, K., & Tsuduk, G. (1998, October). Multicast routing issues in ad hoc networks. In Universal Personal Communications, 1998. ICUPC'98. IEEE 1998 International Conference on (Vol. 1, pp. 751-756). IEEE. doi:10.1109/ ICUPC.1998.733066
-
(1998)
Universal Personal Communications, 1998
, vol.1
, pp. 751-756
-
-
Obraczka, K.1
Tsuduk, G.2
-
52
-
-
77649329871
-
An adaptive-reliability cyber-physical transport protocol for spatio-temporal data
-
December, IEEE
-
Ahmadi, H., & Abdelzaher, T. (2009, December). An adaptive-reliability cyber-physical transport protocol for spatio-temporal data. In Proceedings of Real-Time Systems Symposium, (pp. 238-247). IEEE. doi:10.1109/RTSS.2009.45
-
(2009)
Proceedings of Real-Time Systems Symposium
, pp. 238-247
-
-
Ahmadi, H.1
Abdelzaher, T.2
-
53
-
-
84864130962
-
Interacting with hardware Trojans over a network
-
June, HOST, IEEE
-
Farag, M. M., Lerner, L. W., & Patterson, C. D. (2012, June). Interacting with hardware Trojans over a network. In Proceedings of Hardware-Oriented Security and Trust (HOST), (pp. 69-74). IEEE. doi:10.1109/HST.2012.6224323
-
(2012)
Proceedings of Hardware-Oriented Security and Trust
, pp. 69-74
-
-
Farag, M.M.1
Lerner, L.W.2
Patterson, C.D.3
-
55
-
-
77950292358
-
CPS-IP: Cyber physical systems interconnection protocol
-
Lin, S., He, T., & Stankovic, J. A. (2008). CPS-IP: Cyber physical systems interconnection protocol. ACM SIGBED Review, 5(1), 22. doi:10.1145/1366283.1366305
-
(2008)
ACM SIGBED Review
, vol.5
, Issue.1
, pp. 22
-
-
Lin, S.1
He, T.2
Stankovic, J.A.3
-
56
-
-
55349097880
-
Network QoS management in cyber-physical systems
-
July, IEEE
-
Xia, F., Ma, L., Dong, J., & Sun, Y. (2008, July). Network QoS management in cyber-physical systems. In Proceedings of Embedded Software and Systems Symposia, (pp. 302-307). IEEE. doi:10.1109/ICESS.Symposia.2008.84
-
(2008)
Proceedings of Embedded Software and Systems Symposia
, pp. 302-307
-
-
Xia, F.1
Ma, L.2
Dong, J.3
Sun, Y.4
-
57
-
-
84870389187
-
Defining and computing a value based cyber-security measure
-
Aissa, A. B., Abercrombie, R. K., Sheldon, F. T., & Mili, A. (2012). Defining and computing a value based cyber-security measure. Information Systems and e-Business Management, 10(4), 433-453.
-
(2012)
Information Systems and e-Business Management
, vol.10
, Issue.4
, pp. 433-453
-
-
Aissa, A.B.1
Abercrombie, R.K.2
Sheldon, F.T.3
Mili, A.4
-
58
-
-
78649632175
-
Analysis of information flow security in cyber-physical systems
-
Akella, R., Tang, H., & McMillin, B. M. (2010). Analysis of information flow security in cyber-physical systems. International Journal of Critical Infrastructure Protection, 3(3), 157-173. doi:10.1016/j.ijcip.2010.09.001
-
(2010)
International Journal of Critical Infrastructure Protection
, vol.3
, Issue.3
, pp. 157-173
-
-
Akella, R.1
Tang, H.2
McMillin, B.M.3
-
59
-
-
78650146389
-
Information and control: A BRIDGE between the physical and decision layers
-
Dahleh, M. A., Frazzoli, E., Megretski, A., Mitter, S. K., Ozdaglar, A. E., Parrilo, P. A., & Shah, D. (2006), Information and control: A BRIDGE between the physical and decision layers, NSF Workshop in Cyber-Physical Systems.
-
(2006)
NSF Workshop in Cyber-Physical Systems
-
-
Dahleh, M.A.1
Frazzoli, E.2
Megretski, A.3
Mitter, S.K.4
Ozdaglar, A.E.5
Parrilo, P.A.6
Shah, D.7
-
62
-
-
51249083297
-
Netqope: A model-driven network qos provisioning engine for distributed real-time and embedded systems
-
April, IEEE
-
Balasubramanian, J., Tambe, S., Dasarathy, B., Gadgil, S., Porter, F., Gokhale, A., & Schmidt, D. C. (2008, April). Netqope: A model-driven network qos provisioning engine for distributed real-time and embedded systems. In Proceedings of Real-Time and Embedded Technology and Applications Symposium, (pp. 113-122). IEEE. doi:10.1109/RTAS.2008.32
-
(2008)
Proceedings of Real-Time and Embedded Technology and Applications Symposium
, pp. 113-122
-
-
Balasubramanian, J.1
Tambe, S.2
Dasarathy, B.3
Gadgil, S.4
Porter, F.5
Gokhale, A.6
Schmidt, D.C.7
-
63
-
-
79957443806
-
-
Academic Press
-
Balasubramanian, J., Tambe, S., Gokhale, A., Dasarathy, B., Gadgil, S., & Schmidt, D. (2010). A model-driven QoS provisioning engine for cyber physical systems. Academic Press.
-
(2010)
A model-driven QoS provisioning engine for cyber physical systems
-
-
Balasubramanian, J.1
Tambe, S.2
Gokhale, A.3
Dasarathy, B.4
Gadgil, S.5
Schmidt, D.6
-
64
-
-
40849094798
-
QoS challenges and opportunities in wireless sensor/actuator networks
-
Xia, F. (2008). QoS challenges and opportunities in wireless sensor/actuator networks. Sensors (Basel, Switzerland), 8(2), 1099-1110. doi:10.3390/s8021099
-
(2008)
Sensors (Basel, Switzerland)
, vol.8
, Issue.2
, pp. 1099-1110
-
-
Xia, F.1
-
65
-
-
55349097880
-
Network QoS management in cyber-physical systems
-
July, IEEE
-
Xia, F., Ma, L., Dong, J., & Sun, Y. (2008, July). Network QoS management in cyber-physical systems. In Proceedings of Embedded Software and Systems Symposia, (pp. 302-307). IEEE. doi:10.1109/ICESS.Symposia.2008.84
-
(2008)
Proceedings of Embedded Software and Systems Symposia
, pp. 302-307
-
-
Xia, F.1
Ma, L.2
Dong, J.3
Sun, Y.4
-
66
-
-
84859143104
-
Aspect-oriented development method for non-functional characteristics of cyber physical systems based on MDA approach
-
Zhang, L. (2012). Aspect-oriented development method for non-functional characteristics of cyber physical systems based on MDA approach. Journal of Software, 7(3), 608-619. doi:10.4304/jsw.7.3.608-619
-
(2012)
Journal of Software
, vol.7
, Issue.3
, pp. 608-619
-
-
Zhang, L.1
-
67
-
-
84960221718
-
Multimodal sensing in mobile and cyber-physical systems
-
October, ACM
-
Das, S. K. (2010, October). Multimodal sensing in mobile and cyber-physical systems. In Proceedings of the 3rd workshop on Mobile video delivery (pp. 1-2). ACM. doi:10.1145/1878022.1878023
-
(2010)
Proceedings of the 3rd workshop on Mobile video delivery
, pp. 1-2
-
-
Das, S.K.1
-
69
-
-
79953117676
-
Security issues and challenges for cyber physical system
-
December, IEEE Computer Society
-
Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., & Chow, K. P. (2010, December). Security issues and challenges for cyber physical system. In Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing (pp. 733-738). IEEE Computer Society. doi:10.1109/GreenCom-CPSCom.2010.36
-
(2010)
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
, pp. 733-738
-
-
Wang, E.K.1
Ye, Y.2
Xu, X.3
Yiu, S.M.4
Hui, L.C.K.5
Chow, K.P.6
-
70
-
-
36049027106
-
Wireless sensor/actuator network design for mobile control applications
-
Xia, F., Tian, Y. C., Li, Y., & Sung, Y. (2007). Wireless sensor/actuator network design for mobile control applications. Sensors (Basel, Switzerland), 7(10), 2157-2173. doi:10.3390/s7102157
-
(2007)
Sensors (Basel, Switzerland)
, vol.7
, Issue.10
, pp. 2157-2173
-
-
Xia, F.1
Tian, Y.C.2
Li, Y.3
Sung, Y.4
-
72
-
-
79959317465
-
Security challenges in next generation cyber physical systems
-
Academic Press
-
Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., & Lee, I. (2006). Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked embedded control for cyber physical systems. Academic Press.
-
(2006)
Beyond SCADA: Networked embedded control for cyber physical systems
-
-
Anand, M.1
Cronin, E.2
Sherr, M.3
Blaze, M.4
Ives, Z.5
Lee, I.6
-
73
-
-
84945543048
-
Secure control: Towards survivable cyber-physical systems
-
Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. System, 1(a2), a3.
-
(2008)
System
, vol.1
, Issue.A2
, pp. a3
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
75
-
-
84870349845
-
Cybersecurity through real-time distributed control systems: Oak Ridge National Laboratories report
-
Kisner, R. A., Manges, W. W., MacIntyre, L. P., Nutaro, J. J., Munro, J. K., & Ewing, P. D. et al. (2010). Cybersecurity through real-time distributed control systems: Oak Ridge National Laboratories report. ORNL. U. S. Atomic Energy Commission, TM-2010(30), 4-5.
-
(2010)
ORNL. U. S. Atomic Energy Commission
, vol.TM-2010
, Issue.30
, pp. 4-5
-
-
Kisner, R.A.1
Manges, W.W.2
MacIntyre, L.P.3
Nutaro, J.J.4
Munro, J.K.5
Ewing, P.D.6
-
76
-
-
84862887667
-
Cyber-physical systems security-challenges and research ideas
-
July, Academic Press
-
Pal, P., Schantz, R., Rohloff, K., & Loyall, J. (2009, July). Cyber-physical systems security-challenges and research ideas. In Proceedings of Workshop on Future Directions in Cyber-Physical Systems Security. Academic Press.
-
(2009)
Proceedings of Workshop on Future Directions in Cyber-Physical Systems Security
-
-
Pal, P.1
Schantz, R.2
Rohloff, K.3
Loyall, J.4
-
77
-
-
84859897825
-
Bundle: A group-based programming abstraction for cyber-physical systems
-
Vicaire, P. A., Hoque, E., Xie, Z., & Stankovic, J. A. (2012). Bundle: A group-based programming abstraction for cyber-physical systems. IEEE Transactions on Industrial Informatics, 8(2), 379-392.
-
(2012)
IEEE Transactions on Industrial Informatics
, vol.8
, Issue.2
, pp. 379-392
-
-
Vicaire, P.A.1
Hoque, E.2
Xie, Z.3
Stankovic, J.A.4
-
78
-
-
84884082267
-
Security and vulnerability of cyber-physical
-
Boston: Elsevier
-
Xue, M., Roy, S., Wan, Y., & Das, S. K. (2012). Security and vulnerability of cyber-physical. In Handbook on securing cyber-physical critical infrastructure (pp. 5-30). Boston: Elsevier. doi:10.1016/B978-0-12-415815-3.00001-7
-
(2012)
Handbook on securing cyber-physical critical infrastructure
, pp. 5-30
-
-
Xue, M.1
Roy, S.2
Wan, Y.3
Das, S.K.4
-
79
-
-
84868596713
-
Systematic analysis of cyber-attacks on CPSevaluating applicability of DFD-based approach
-
August, ISRCS, IEEE
-
Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., & Sztipanovits, J. (2012, August). Systematic analysis of cyber-attacks on CPSevaluating applicability of DFD-based approach. In Proceedings of Resilient Control Systems (ISRCS), (pp. 55-62). IEEE.
-
(2012)
Proceedings of Resilient Control Systems
, pp. 55-62
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.D.3
Xue, Y.4
Sztipanovits, J.5
-
81
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Springer Berlin Heidelberg
-
Amin, S., Cárdenas, A. A., & Sastry, S. S. (2009). Safe and secure networked control systems under denial-of-service attacks. In Hybrid systems: Computation and control (pp. 31-45). Springer Berlin Heidelberg. doi:10.1007/978-3-642-00602-9_3
-
(2009)
Hybrid systems: Computation and control
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.A.2
Sastry, S.S.3
-
83
-
-
80055028776
-
Challenges for securing cyber physical systems
-
July, Academic Press
-
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009, July). Challenges for securing cyber physical systems. In Proceedings of Workshop on Future Directions in Cyber-Physical Systems Security. Academic Press.
-
(2009)
Proceedings of Workshop on Future Directions in Cyber-Physical Systems Security
-
-
Cardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
84
-
-
79956009493
-
Attacks against process control systems: risk assessment, detection, and response
-
March, ACM
-
Cardenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. (2011, March). Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (pp. 355-366). ACM. doi:10.1145/1966913.1966959
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 355-366
-
-
Cardenas, A.A.1
Amin, S.2
Lin, Z.S.3
Huang, Y.L.4
Huang, C.Y.5
Sastry, S.6
-
85
-
-
85084140752
-
-
July, HotSec
-
Cárdenas, A. A., Amin, S., & Sastry, S. (2008, July). Research challenges for the security of control systems. HotSec.
-
(2008)
Research challenges for the security of control systems
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
86
-
-
34548155020
-
Security in pervasive computing: Current status and open issues
-
Haque, M. M., & Ahamed, S. I. (2006). Security in pervasive computing: Current status and open issues. International Journal of Network Security, 3(3), 203-214.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 203-214
-
-
Haque, M.M.1
Ahamed, S.I.2
-
87
-
-
78651420105
-
On malicious data attacks on power system state estimation
-
August, UPEC, IEEE
-
Kosut, O., Jia, L., Thomas, R. J., & Tong, L. (2010, August). On malicious data attacks on power system state estimation. In Proceedings of Universities Power Engineering Conference (UPEC), (pp. 1-6). IEEE.
-
(2010)
Proceedings of Universities Power Engineering Conference
, pp. 1-6
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
89
-
-
77949601382
-
Secure control against replay attacks
-
September, IEEE
-
Mo, Y., & Sinopoli, B. (2009, September). Secure control against replay attacks. In Proceedings of Communication, Control, and Computing, (pp. 911-918). IEEE. doi:10.1109/ALLERTON.2009.5394956
-
(2009)
Proceedings of Communication, Control, and Computing
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
90
-
-
79953117676
-
Security issues and challenges for cyber physical system
-
December, IEEE Computer Society
-
Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., & Chow, K. P. (2010, December). Security issues and challenges for cyber physical system. In Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing (pp. 733-738). IEEE Computer Society. doi:10.1109/GreenCom-CPSCom.2010.36
-
(2010)
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
, pp. 733-738
-
-
Wang, E.K.1
Ye, Y.2
Xu, X.3
Yiu, S.M.4
Hui, L.C.K.5
Chow, K.P.6
-
91
-
-
84870383435
-
Modeling security in cyber-physical systems
-
Burmester, M., Magkos, E., & Chrissikopoulos, V. (2012). Modeling security in cyber-physical systems. International Journal of Critical Infrastructure Protection, 5(3), 118-126. doi:10.1016/j.ijcip.2012.08.002
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.3
, pp. 118-126
-
-
Burmester, M.1
Magkos, E.2
Chrissikopoulos, V.3
-
92
-
-
0041973497
-
Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003
-
April, IEEE
-
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, April). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1976-1986). IEEE. doi:10.1109/INFCOM.2003.1209219
-
(2003)
Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
93
-
-
57849129123
-
Computing foundations and practice for cyber-physical systems: A preliminary report
-
University of California, Berkeley, Tech.Rep. UCB/EECS-2007-72
-
Lee, E. A. (2007). Computing foundations and practice for cyber-physical systems: A preliminary report. University of California, Berkeley, Tech.Rep. UCB/EECS-2007-72.
-
(2007)
-
-
Lee, E.A.1
-
96
-
-
84893448837
-
Multi-domain modeling of cyber-physical systems using architectural views
-
Bhave, A., Krogh, B., Garlan, D., & Schmerl, B. (2010). Multi-domain modeling of cyber-physical systems using architectural views. AVICPS, 2010, 43.
-
(2010)
AVICPS
, vol.2010
, pp. 43
-
-
Bhave, A.1
Krogh, B.2
Garlan, D.3
Schmerl, B.4
-
98
-
-
79960364092
-
Multihop performance of cooperative preamble sampling MAC (CPS-MAC) in wireless sensor networks
-
Springer Berlin Heidelberg
-
Khan, R. A. M., & Karl, H. (2011). Multihop performance of cooperative preamble sampling MAC (CPS-MAC) in wireless sensor networks. In Ad-hoc, mobile, and wireless networks (pp. 145-149). Springer Berlin Heidelberg.
-
(2011)
Ad-hoc, mobile, and wireless networks
, pp. 145-149
-
-
Khan, R.A.M.1
Karl, H.2
-
102
-
-
84861740876
-
A logic-based modeling and verification of CPS
-
Saeedloei, N., & Gupta, G. (2011). A logic-based modeling and verification of CPS. ACM SIGBED Review, 8(2), 31-34. doi:10.1145/2000367.2000374
-
(2011)
ACM SIGBED Review
, vol.8
, Issue.2
, pp. 31-34
-
-
Saeedloei, N.1
Gupta, G.2
-
103
-
-
79952557037
-
Cps-net: In-network aggregation for synchrophasor applications
-
January, IEEE
-
Arya, V., Hazra, J., Kodeswaran, P., Seetharam, D., Banerjee, N., & Kalyanaraman, S. (2011, January). Cps-net: In-network aggregation for synchrophasor applications. In Communication Systems and Networks (COMSNETS), 2011 Third International Conference on (pp. 1-8). IEEE.
-
(2011)
Communication Systems and Networks (COMSNETS), 2011 Third International Conference on
, pp. 1-8
-
-
Arya, V.1
Hazra, J.2
Kodeswaran, P.3
Seetharam, D.4
Banerjee, N.5
Kalyanaraman, S.6
-
104
-
-
79961138655
-
View consistency in architectures for cyber-physical systems
-
April, IEEE
-
Bhave, A., Krogh, B. H., Garlan, D., & Schmerl, B. (2011, April). View consistency in architectures for cyber-physical systems. In Cyber-Physical Systems (ICCPS), 2011 IEEE/ACM International Conference on (pp. 151-160). IEEE. doi:10.1109/ ICCPS.2011.17
-
(2011)
Cyber-Physical Systems (ICCPS), 2011 IEEE/ACM International Conference on
, pp. 151-160
-
-
Bhave, A.1
Krogh, B.H.2
Garlan, D.3
Schmerl, B.4
-
105
-
-
84863599407
-
Multicast routing for decentralized control of cyber physical systems with an application in smart grid. Selected Areas in Communications
-
Li, H., Lai, L., & Poor, H. V. (2012). Multicast routing for decentralized control of cyber physical systems with an application in smart grid. Selected Areas in Communications. IEEE Journal on, 30(6), 1097-1107.
-
(2012)
IEEE Journal on
, vol.30
, Issue.6
, pp. 1097-1107
-
-
Li, H.1
Lai, L.2
Poor, H.V.3
-
106
-
-
21944433610
-
Issues in integrating cellular networks WLANs and MANETs: A futuristic heterogeneous wireless network
-
Cavalcanti, D., Agrawal, D., Cordeiro, C., Xie, B., & Kumar, A. (2005). Issues in integrating cellular networks WLANs and MANETs: A futuristic heterogeneous wireless network. IEEE Wireless Communications, 12(3), 30-41. doi:10.1109/MWC.2005.1452852
-
(2005)
IEEE Wireless Communications
, vol.12
, Issue.3
, pp. 30-41
-
-
Cavalcanti, D.1
Agrawal, D.2
Cordeiro, C.3
Xie, B.4
Kumar, A.5
-
108
-
-
12244302230
-
A graph based model for survivability applications
-
Krings, A. W., & Azadmanesh, A. (2005). A graph based model for survivability applications. European Journal of Operational Research, 164(3), 680-689. doi:10.1016/j.ejor.2003.10.052
-
(2005)
European Journal of Operational Research
, vol.164
, Issue.3
, pp. 680-689
-
-
Krings, A.W.1
Azadmanesh, A.2
-
109
-
-
84960218475
-
-
Academic Press
-
Mapp, G. E., Cottingham, D., Shaikh, F., Vidales, P., Patanapongpibul, L., Baliosian, J., & Crowcroft, J. (2006). An architectural framework for heterogeneous networking. Academic Press.
-
(2006)
An architectural framework for heterogeneous networking
-
-
Mapp, G.E.1
Cottingham, D.2
Shaikh, F.3
Vidales, P.4
Patanapongpibul, L.5
Baliosian, J.6
Crowcroft, J.7
-
110
-
-
0242539790
-
Heterogeneous networking: A new survivability paradigm
-
September, ACM
-
Zhang, Y., Vin, H., Alvisi, L., Lee, W., & Dao, S. K. (2001, September). Heterogeneous networking: A new survivability paradigm. In Proceedings of the 2001 Workshop on New Security Paradigms (pp. 33-39). ACM. doi:10.1145/508171.508177
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 33-39
-
-
Zhang, Y.1
Vin, H.2
Alvisi, L.3
Lee, W.4
Dao, S.K.5
-
112
-
-
0346686052
-
Service overlay networks: SLAs, QoS, and bandwidth provisioning
-
Duan, Z., Zhang, Z. L., & Hou, Y. T. (2003). Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE/ACM Transactions on Networking (TON), 11(6), 870-883.
-
(2003)
IEEE/ACM Transactions on Networking (TON)
, vol.11
, Issue.6
, pp. 870-883
-
-
Duan, Z.1
Zhang, Z.L.2
Hou, Y.T.3
-
115
-
-
84864592155
-
Guest Editors' Introduction: Special Issue on Cyber-Physical Systems (CPS). Parallel and Distributed Systems
-
Papavassiliou, S., Kato, N., Liu, Y., Xu, C. Z., & Wang, X. (2012). Guest Editors' Introduction: Special Issue on Cyber-Physical Systems (CPS). Parallel and Distributed Systems. IEEE Transactions on, 23(9), 1569-1571.
-
(2012)
IEEE Transactions on
, vol.23
, Issue.9
, pp. 1569-1571
-
-
Papavassiliou, S.1
Kato, N.2
Liu, Y.3
Xu, C.Z.4
Wang, X.5
-
116
-
-
0032178780
-
A network architecture for heterogeneous mobile computing
-
Brewer, E. A., Katz, R. H., Chawathe, Y., Gribble, S. D., Hodes, T., & Nguyen, G. et al. (1998). A network architecture for heterogeneous mobile computing. IEEE Personal Communications, 5(5), 8-24. doi:10.1109/98.729719
-
(1998)
IEEE Personal Communications
, vol.5
, Issue.5
, pp. 8-24
-
-
Brewer, E.A.1
Katz, R.H.2
Chawathe, Y.3
Gribble, S.D.4
Hodes, T.5
Nguyen, G.6
-
117
-
-
4544355026
-
An adaptive scheme for vertical handoff in wireless overlay networks
-
July, IEEE
-
Chen, W. T., Liu, J. C., & Huang, H. K. (2004, July). An adaptive scheme for vertical handoff in wireless overlay networks. In Proceedings of Parallel and Distributed Systems, (pp. 541-548). IEEE.
-
(2004)
Proceedings of Parallel and Distributed Systems
, pp. 541-548
-
-
Chen, W.T.1
Liu, J.C.2
Huang, H.K.3
-
118
-
-
52049119782
-
A generalized context-aware architecture in heterogeneous mobile computing environments
-
July, IEEE
-
Schmohl, R., & Baumgarten, U. (2008, July). A generalized context-aware architecture in heterogeneous mobile computing environments. In Proceedings of Wireless and Mobile Communications, (pp. 118-124). IEEE. doi:10.1109/ICWMC.2008.59
-
(2008)
Proceedings of Wireless and Mobile Communications
, pp. 118-124
-
-
Schmohl, R.1
Baumgarten, U.2
-
120
-
-
0001531470
-
A note on reliable full-duplex transmission over half-duplex links
-
Bartlett, K. A., Scantlebury, R. A., & Wilkinson, P. T. (1969). A note on reliable full-duplex transmission over half-duplex links. Communications of the ACM, 12(5), 260-261. doi:10.1145/362946.362970
-
(1969)
Communications of the ACM
, vol.12
, Issue.5
, pp. 260-261
-
-
Bartlett, K.A.1
Scantlebury, R.A.2
Wilkinson, P.T.3
-
121
-
-
0011317224
-
Vertical handoffs in wireless overlay networks
-
Stemm, M., & Katz, R. H. (1998). Vertical handoffs in wireless overlay networks. Mobile Networks and Applications, 3(4), 335-350. doi:10.1023/A:1019197320544
-
(1998)
Mobile Networks and Applications
, vol.3
, Issue.4
, pp. 335-350
-
-
Stemm, M.1
Katz, R.H.2
-
122
-
-
79953699995
-
Policy-enabled handoffs across heterogeneous wireless networks
-
February, IEEE
-
Wang, H. J., Katz, R. H., & Giese, J. (1999, February). Policy-enabled handoffs across heterogeneous wireless networks. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on (pp. 51-60). IEEE. doi:10.1109/MCSA.1999.749277
-
(1999)
Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on
, pp. 51-60
-
-
Wang, H.J.1
Katz, R.H.2
Giese, J.3
-
123
-
-
0032178780
-
A network architecture for heterogeneous mobile computing
-
Brewer, E. A., Katz, R. H., Chawathe, Y., Gribble, S. D., Hodes, T., & Nguyen, G. et al. (1998). A network architecture for heterogeneous mobile computing. IEEE Personal Communications, 5(5), 8-24. doi:10.1109/98.729719
-
(1998)
IEEE Personal Communications
, vol.5
, Issue.5
, pp. 8-24
-
-
Brewer, E.A.1
Katz, R.H.2
Chawathe, Y.3
Gribble, S.D.4
Hodes, T.5
Nguyen, G.6
-
124
-
-
0010018591
-
A proxy architecture for reliable multicast in heterogeneous environments
-
September, ACM
-
Chawathe, Y., Fink, S. A., McCanne, S., & Brewer, E. A. (1998, September). A proxy architecture for reliable multicast in heterogeneous environments. In Proceedings of the Sixth ACM International Conference on Multimedia (pp. 151-159). ACM. doi:10.1145/290747.290767
-
(1998)
Proceedings of the Sixth ACM International Conference on Multimedia
, pp. 151-159
-
-
Chawathe, Y.1
Fink, S.A.2
McCanne, S.3
Brewer, E.A.4
-
125
-
-
84960316595
-
-
PUC
-
Endler, M., Rubinsztejn, H. K. S., da Rocha, R. C. A., & do Sacramento Rodrigues, V. J. (2005). Proxy-based adaptation for mobile computing (Vol. 736). PUC.
-
(2005)
Proxy-based adaptation for mobile computing
, vol.736
-
-
Endler, M.1
Rubinsztejn, H.K.S.2
da Rocha, R.C.A.3
do Sacramento Rodrigues, V.J.4
-
126
-
-
0002500187
-
-
ACM
-
Fox, A., Gribble, S. D., Chawathe, Y., Brewer, E. A., & Gauthier, P. (1997). Cluster-based scalable network services. ACM.
-
(1997)
Cluster-based scalable network services
-
-
Fox, A.1
Gribble, S.D.2
Chawathe, Y.3
Brewer, E.A.4
Gauthier, P.5
-
128
-
-
34547226894
-
Statistical on-chip communication bus synthesis and voltage scaling under timing yield constraint
-
July, ACM
-
Pandey, S., & Glesner, M. (2006, July). Statistical on-chip communication bus synthesis and voltage scaling under timing yield constraint. In Proceedings of the 43rd Annual Design Automation Conference (pp. 663-668). ACM. doi:10.1145/1146909.1147078
-
(2006)
Proceedings of the 43rd Annual Design Automation Conference
, pp. 663-668
-
-
Pandey, S.1
Glesner, M.2
-
129
-
-
34249742482
-
Real-time traffic support in heterogeneous mobile networks
-
Sun, Y., Belding-Royer, E. M., Gao, X., & Kempf, J. (2007). Real-time traffic support in heterogeneous mobile networks. Wireless Networks, 13(4), 431-445. doi:10.1007/s11276-006-9198-y
-
(2007)
Wireless Networks
, vol.13
, Issue.4
, pp. 431-445
-
-
Sun, Y.1
Belding-Royer, E.M.2
Gao, X.3
Kempf, J.4
-
130
-
-
20344383723
-
Model-based resource prediction for multi-hop wireless networks
-
October, IEEE
-
Sun, Y., Gao, X., Belding-Royer, E. M., & Kempf, J. (2004, October). Model-based resource prediction for multi-hop wireless networks. In Proceedings of Mobile Ad-Hoc and Sensor Systems, (pp. 114-123). IEEE.
-
(2004)
Proceedings of Mobile Ad-Hoc and Sensor Systems
, pp. 114-123
-
-
Sun, Y.1
Gao, X.2
Belding-Royer, E.M.3
Kempf, J.4
-
131
-
-
85084163131
-
Scalable content-aware request distribution in cluster-based network servers
-
No. LABOS-CONF-2005-025
-
Aron, M., Sanders, D., Druschel, P., & Zwaenepoel, W. (2000). Scalable content-aware request distribution in cluster-based network servers. In Proceedings of the 2000 Annual USENIX technical Conference (No. LABOS-CONF-2005-025).
-
(2000)
Proceedings of the 2000 Annual USENIX technical Conference
-
-
Aron, M.1
Sanders, D.2
Druschel, P.3
Zwaenepoel, W.4
-
132
-
-
84866872415
-
Bringing Heterogeneous Multiprocessors Into the Mainstream
-
Flachs, B., Goldrian, G., Hofstee, P., & Vogt, J. S. (2009). Bringing Heterogeneous Multiprocessors Into the Mainstream. In Proceedings of 2009 Symposium on Application Accelerators in High-Performance Computing (SAAHPC'09).
-
(2009)
Proceedings of 2009 Symposium on Application Accelerators in High-Performance Computing (SAAHPC'09)
-
-
Flachs, B.1
Goldrian, G.2
Hofstee, P.3
Vogt, J.S.4
-
133
-
-
33750123320
-
Load balancing in a cluster-based web server for multimedia applications. Parallel and Distributed Systems
-
Guo, J., & Bhuyan, L. N. (2006). Load balancing in a cluster-based web server for multimedia applications. Parallel and Distributed Systems. IEEE Transactions on, 17(11), 1321-1334.
-
(2006)
IEEE Transactions on
, vol.17
, Issue.11
, pp. 1321-1334
-
-
Guo, J.1
Bhuyan, L.N.2
-
134
-
-
0011317224
-
Vertical handoffs in wireless overlay networks
-
Stemm, M., & Katz, R. H. (1998). Vertical handoffs in wireless overlay networks. Mobile Networks and Applications, 3(4), 335-350. doi:10.1023/A:1019197320544
-
(1998)
Mobile Networks and Applications
, vol.3
, Issue.4
, pp. 335-350
-
-
Stemm, M.1
Katz, R.H.2
-
135
-
-
0342561532
-
A cluster-based active router architecture
-
Welling, G., Ott, M., & Mathur, S. (2001). A cluster-based active router architecture. IEEE Micro, 21(1), 16-25. doi:10.1109/40.903058
-
(2001)
IEEE Micro
, vol.21
, Issue.1
, pp. 16-25
-
-
Welling, G.1
Ott, M.2
Mathur, S.3
-
136
-
-
84874742054
-
Secure service discovery protocols for ad hoc networks
-
Springer Berlin Heidelberg
-
Elwahsh, H., Hashem, M., & Amin, M. (2011). Secure service discovery protocols for ad hoc networks. In Advances in computer science and information technology (pp. 147-157). Springer Berlin Heidelberg. doi:10.1007/978-3-642-17857-3_15
-
(2011)
Advances in computer science and information technology
, pp. 147-157
-
-
Elwahsh, H.1
Hashem, M.2
Amin, M.3
-
138
-
-
0036996942
-
Introduction to web services architecture
-
Gottschalk, K., Graham, S., Kreger, H., & Snell, J. (2002). Introduction to web services architecture. IBM Systems Journal, 41(2), 170-177. doi:10.1147/sj.412.0170
-
(2002)
IBM Systems Journal
, vol.41
, Issue.2
, pp. 170-177
-
-
Gottschalk, K.1
Graham, S.2
Kreger, H.3
Snell, J.4
-
139
-
-
84907705857
-
Konark-A service discovery and delivery protocol for ad-hoc networks
-
March, IEEE
-
Helal, S., Desai, N., Verma, V., & Lee, C. (2003, March). Konark-A service discovery and delivery protocol for ad-hoc networks. In Proceedings of Wireless Communications and Networking, (Vol. 3, pp. 2107-2113). IEEE. doi:10.1109/WCNC.2003.1200712
-
(2003)
Proceedings of Wireless Communications and Networking
, vol.3
, pp. 2107-2113
-
-
Helal, S.1
Desai, N.2
Verma, V.3
Lee, C.4
-
140
-
-
80052631455
-
A fault-tolerant service discovery protocol for emergency search and rescue missions
-
March, LATW, IEEE
-
Kniess, J., Loques, O., & Albuquerque, C. V. (2011, March). A fault-tolerant service discovery protocol for emergency search and rescue missions. In Proceedings of Test Workshop (LATW), (pp. 1-6). IEEE. doi:10.1109/LATW.2011.5985903
-
(2011)
Proceedings of Test Workshop
, pp. 1-6
-
-
Kniess, J.1
Loques, O.2
Albuquerque, C.V.3
-
141
-
-
84870278867
-
Web services conceptual architecture (WSCA 1.0)
-
Kreger, H. (2001). Web services conceptual architecture (WSCA 1.0). IBM Software Group, 5, 6-7.
-
(2001)
IBM Software Group
, vol.5
, pp. 6-7
-
-
Kreger, H.1
-
142
-
-
70449368657
-
A survey of survivability in mobile ad hoc networks
-
Lima, M., dos Santos, A. L., & Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 11(1), 66-77. doi:10.1109/SURV.2009.090106
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, Issue.1
, pp. 66-77
-
-
Lima, M.1
dos Santos, A.L.2
Pujolle, G.3
-
143
-
-
24644476523
-
Adaptive and evolvable network services
-
January, Springer Berlin Heidelberg
-
Nakano, T., & Suda, T. (2004, January). Adaptive and evolvable network services. In Proceedings of Genetic and Evolutionary Computation-GECCO 2004 (pp. 151-162). Springer Berlin Heidelberg. doi:10.1007/978-3-540-24854-5_14
-
(2004)
Proceedings of Genetic and Evolutionary Computation-GECCO 2004
, pp. 151-162
-
-
Nakano, T.1
Suda, T.2
-
144
-
-
0037629310
-
Generating remote control interfaces for complex appliances
-
October, ACM
-
Nichols, J., Myers, B. A., Higgins, M., Hughes, J., Harris, T. K., Rosenfeld, R., & Pignol, M. (2002, October). Generating remote control interfaces for complex appliances. In Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (pp. 161-170). ACM. doi:10.1145/571985.572008
-
(2002)
Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology
, pp. 161-170
-
-
Nichols, J.1
Myers, B.A.2
Higgins, M.3
Hughes, J.4
Harris, T.K.5
Rosenfeld, R.6
Pignol, M.7
-
145
-
-
0035428427
-
Pervasive computing: Vision and challenges
-
Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, 8(4), 10-17. doi:10.1109/98.943998
-
(2001)
IEEE Personal Communications
, vol.8
, Issue.4
, pp. 10-17
-
-
Satyanarayanan, M.1
-
146
-
-
84892591410
-
A survey of security issues in mobile ad hoc networks
-
Djenouri, D., Khelladi, L., & Badache, N. (2005). A survey of security issues in mobile ad hoc networks. IEEE Communications Surveys, 7(4), 2-28.
-
(2005)
IEEE Communications Surveys
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, N.3
-
147
-
-
84872483408
-
Overload provisioning in mixed-criticality cyber-physical systems
-
Lakshmanan, K., De Niz, D., Rajkumar, R. R., & Moreno, G. (2012). Overload provisioning in mixed-criticality cyber-physical systems. ACM Transactions on Embedded Computing Systems, 11(4), 83. doi:10.1145/2362336.2362350
-
(2012)
ACM Transactions on Embedded Computing Systems
, vol.11
, Issue.4
, pp. 83
-
-
Lakshmanan, K.1
De Niz, D.2
Rajkumar, R.R.3
Moreno, G.4
-
148
-
-
84929315070
-
Security issues and requirements for internet-scale publish-subscribe systems
-
January, HICSS. Proceedings of the 35th Annual Hawaii International Conference on, IEEE
-
Wang, C., Carzaniga, A., Evans, D., & Wolf, A. L. (2002, January). Security issues and requirements for internet-scale publish-subscribe systems. In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on (pp. 3940-3947). IEEE.
-
(2002)
System Sciences, 2002
, pp. 3940-3947
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
-
149
-
-
75149130886
-
On the application of predictive control techniques for adaptive performance management of computing systems
-
Abdelwahed, S., Bai, J., Su, R., & Kandasamy, N. (2009). On the application of predictive control techniques for adaptive performance management of computing systems. IEEE Transactions on Network and Service Management, 6(4), 212-225.
-
(2009)
IEEE Transactions on Network and Service Management
, vol.6
, Issue.4
, pp. 212-225
-
-
Abdelwahed, S.1
Bai, J.2
Su, R.3
Kandasamy, N.4
-
150
-
-
83355175778
-
Model predictive control to improve power system oscillations of SMIB with fuzzy logic controller
-
August, ICEMS, IEEE
-
Ahmadzade, B., Shahgholian, G., Tehrani, F. M., & Mahdavian, M. (2011, August). Model predictive control to improve power system oscillations of SMIB with fuzzy logic controller. In Proceedings of Electrical Machines and Systems (ICEMS), (pp. 1-5). IEEE. doi:10.1109/ICEMS.2011.6073337
-
(2011)
Proceedings of Electrical Machines and Systems
, pp. 1-5
-
-
Ahmadzade, B.1
Shahgholian, G.2
Tehrani, F.M.3
Mahdavian, M.4
-
152
-
-
19044389752
-
RCS: A cognitive architecture for intelligent multi-agent systems
-
Albus, J. S., & Barbera, A. J. (2005). RCS: A cognitive architecture for intelligent multi-agent systems. Annual Reviews in Control, 29(1), 87-99. doi:10.1016/j.arcontrol.2004.12.003
-
(2005)
Annual Reviews in Control
, vol.29
, Issue.1
, pp. 87-99
-
-
Albus, J.S.1
Barbera, A.J.2
-
153
-
-
0026866565
-
RCS: A reference model architecture for intelligent control
-
September, IEEE
-
Albus, J. S., & Rippey, W. G. (1994, September). RCS: A reference model architecture for intelligent control. In Proceedings of From Perception to Action Conference, (pp. 218-229). IEEE. doi:10.1109/2.144396
-
(1994)
Proceedings of From Perception to Action Conference
, pp. 218-229
-
-
Albus, J.S.1
Rippey, W.G.2
-
156
-
-
84960252542
-
A lecture on model predictive control
-
Retrieved from
-
Gorinevsky, D. (2005). A lecture on model predictive control. IndaBook. Retrieved from www.indabook.org/d/Model-Predictive-Control.pdf
-
(2005)
IndaBook.
-
-
Gorinevsky, D.1
-
160
-
-
35449002565
-
Model predictive controllers: A critical synthesis of theory and industrial needs
-
Nikolaou, M. (2001). Model predictive controllers: A critical synthesis of theory and industrial needs. Advances in Chemical Engineering, 26, 131-204. doi:10.1016/S0065-2377(01)26003-7
-
(2001)
Advances in Chemical Engineering
, vol.26
, pp. 131-204
-
-
Nikolaou, M.1
-
161
-
-
84855551696
-
Towards a compositional multi-modal framework for adaptive cyber-physical systems
-
August, RTCSA, IEEE
-
Phan, L. T., & Lee, I. (2011, August). Towards a compositional multi-modal framework for adaptive cyber-physical systems. In Proceedings of Embedded and Real-Time Computing Systems and Applications (RTCSA), (vol. 2, pp. 67-73). IEEE. doi:10.1109/RTCSA.2011.82
-
(2011)
Proceedings of Embedded and Real-Time Computing Systems and Applications
, vol.2
, pp. 67-73
-
-
Phan, L.T.1
Lee, I.2
-
163
-
-
0027843968
-
A software template approach to building complex large-scale intelligent control systems
-
August, IEEE
-
Quintero, R., & Barbera, A. J. (1993, August). A software template approach to building complex large-scale intelligent control systems. In Proceedings of Intelligent Control, (pp. 58-63). IEEE. doi:10.1109/ISIC.1993.397723
-
(1993)
Proceedings of Intelligent Control
, pp. 58-63
-
-
Quintero, R.1
Barbera, A.J.2
-
164
-
-
55349135799
-
Intelligent systems
-
Rudas, I. J., & Fodor, J. (2008). Intelligent systems. International Journal of Computers, Communications & Control, 3(3).
-
(2008)
International Journal of Computers, Communications & Control
, vol.3
, Issue.3
-
-
Rudas, I.J.1
Fodor, J.2
-
165
-
-
84864643991
-
Model predictive control to improve the power system stability
-
May, OPTIM, IEEE
-
Sebaa, K., Moulahoum, S., Houassine, H., & Kabache, N. (2012, May). Model predictive control to improve the power system stability. In Proceedings of Optimization of Electrical and Electronic Equipment (OPTIM), (pp. 208-212). IEEE. doi:10.1109/OPTIM.2012.6231972
-
(2012)
Proceedings of Optimization of Electrical and Electronic Equipment
, pp. 208-212
-
-
Sebaa, K.1
Moulahoum, S.2
Houassine, H.3
Kabache, N.4
-
167
-
-
84960253221
-
Supervisory control and data acquisition (SCADA) systems for command, control, communications, computer, intelligence, surveillance and reconnaissance (C4ISR)
-
Retrieved from
-
M5-601, Department of the Army. (2006). Supervisory control and data acquisition (SCADA) systems for command, control, communications, computer, intelligence, surveillance and reconnaissance (C4ISR). Facilities, 21. Retrieved from http://wbdg.org/ccb/ARMYCOE/COETM/tm_5_601.pdf
-
(2006)
Facilities
, pp. 21
-
-
-
168
-
-
84860321082
-
Aspect-oriented formal techniques of cyber physical systems
-
Zhang, L. (2012). Aspect-oriented formal techniques of cyber physical systems. Journal of Software, 7(4), 823-834. doi:10.4304/jsw.7.4.823-834
-
(2012)
Journal of Software
, vol.7
, Issue.4
, pp. 823-834
-
-
Zhang, L.1
-
169
-
-
84871946423
-
An online optimization approach for control and communication codesign in networked cyberphysical systems
-
Cao, X., Cheng, P., Chen, J., & Sun, Y. (2013). An online optimization approach for control and communication codesign in networked cyberphysical systems. IEEE Transactions on Industrial Informatics, 9(1), 439-450.
-
(2013)
IEEE Transactions on Industrial Informatics
, vol.9
, Issue.1
, pp. 439-450
-
-
Cao, X.1
Cheng, P.2
Chen, J.3
Sun, Y.4
-
171
-
-
84655168084
-
A robust multi-model predictive controller for distributed parameter systems
-
García, M. R., Vilas, C., Santos, L. O., & Alonso, A. A. (2012). A robust multi-model predictive controller for distributed parameter systems. Journal of Process Control, 22(1), 60-71. doi:10.1016/j.jprocont.2011.10.008
-
(2012)
Journal of Process Control
, vol.22
, Issue.1
, pp. 60-71
-
-
García, M.R.1
Vilas, C.2
Santos, L.O.3
Alonso, A.A.4
-
172
-
-
0034445661
-
System architecture directions for networked sensors
-
November
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., & Pister, K. (2000, November). System architecture directions for networked sensors. Operating Systems Review, 34(5), 93-104. doi:10.1145/384264.379006
-
(2000)
Operating Systems Review
, vol.34
, Issue.5
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
173
-
-
33750950660
-
Typed abstraction of complex network compositions
-
November, IEEE
-
Bestavros, A., Bradley, A. D., Kfoury, A. J., & Matta, I. (2005, November). Typed abstraction of complex network compositions. In Proceedings of Network Protocols, (pp. 10-pp). IEEE. doi:10.1109/ICNP.2005.44
-
(2005)
Proceedings of Network Protocols
, pp. 10-pp
-
-
Bestavros, A.1
Bradley, A.D.2
Kfoury, A.J.3
Matta, I.4
-
175
-
-
85032597883
-
-
Paper presented at National Workshop on High-Confidence Software Platforms for Cyber-Physical Systems (HCSP-CPS). Blacksburg, VA
-
Ermagan, V., Krüger, I., & Menarini, M. (2006). High-confidence service engineering for cyber physical systems. Paper presented at National Workshop on High-Confidence Software Platforms for Cyber-Physical Systems (HCSP-CPS). Blacksburg, VA.
-
(2006)
High-confidence service engineering for cyber physical systems
-
-
Ermagan, V.1
Krüger, I.2
Menarini, M.3
-
178
-
-
85045953475
-
Architecting principles for systems-of-systems
-
Maier, M. W. (1998). Architecting principles for systems-of-systems. Systems Engineering, 1(4), 267-284. doi:10.1002/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-D
-
(1998)
Systems Engineering
, vol.1
, Issue.4
, pp. 267-284
-
-
Maier, M.W.1
-
180
-
-
70349644372
-
System of systems engineering: An emerging multidiscipline
-
Sousa-Poza, A., Kovacic, S., & Keating, C. (2008). System of systems engineering: An emerging multidiscipline. International Journal of System of Systems Engineering, 1(1), 1-17. doi:10.1504/IJSSE.2008.018129
-
(2008)
International Journal of System of Systems Engineering
, vol.1
, Issue.1
, pp. 1-17
-
-
Sousa-Poza, A.1
Kovacic, S.2
Keating, C.3
-
183
-
-
80052060563
-
The web of things: A survey
-
Zeng, D., Guo, S., & Cheng, Z. (2011). The web of things: A survey. Journal of Communication, 6(6), 424-438.
-
(2011)
Journal of Communication
, vol.6
, Issue.6
, pp. 424-438
-
-
Zeng, D.1
Guo, S.2
Cheng, Z.3
-
184
-
-
84861484906
-
RESTful management for cyber-physical systems
-
April, ISORCW, IEEE
-
Zhang, Y., Cai, H., & Zhu, M. (2012, April). RESTful management for cyber-physical systems. In Proceedings of Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), (pp. 43-47). IEEE. doi:10.1109/ISORCW.2012.18
-
(2012)
Proceedings of Object/Component/Service-Oriented Real-Time Distributed Computing Workshops
, pp. 43-47
-
-
Zhang, Y.1
Cai, H.2
Zhu, M.3
-
185
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
Mitchell, R., & Chen, I. R. (2013). Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Transactions on Reliability, 62(1), 199-210. doi:10.1109/TR.2013.2240891
-
(2013)
IEEE Transactions on Reliability
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.R.2
|