-
1
-
-
27644541979
-
Hardware/software co-design for power system test development
-
Austin Armbruster, Matt Ryan, Xiaoqing Frank Liu, Ying Cheng, and Bruce M. McMillin. Hardware/software co-design for power system test development. In WISER, pages 83–88, 2004.
-
(2004)
WISER
, pp. 83-88
-
-
Armbruster, A.1
Ryan, M.2
Liu, X.F.3
Cheng, Y.4
McMillin, B.M.5
-
2
-
-
4544361194
-
Etherware: Domainware for wireless control networks
-
0
-
Girish Bagliga, Scott Graham, Lui Sha, and P. R. Kumar. Etherware: Domainware for wireless control networks. Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on, 0:155–162, 2004.
-
(2004)
Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
, pp. 155-162
-
-
Bagliga, G.1
Graham, S.2
Sha, L.3
Kumar, P.R.4
-
7
-
-
34247127701
-
Challenges in automotive software engineering
-
New York, NY, USA, ACM
-
Manfred Broy. Challenges in automotive software engineering. In ICSE’06: Proceedings of the 28th international conference on Software engineering, pages 33–42, New York, NY, USA, 2006. ACM.
-
(2006)
ICSE’06: Proceedings of the 28th International Conference on Software Engineering
, pp. 33-42
-
-
Broy, M.1
-
8
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Washington, DC, USA, IEEE Computer Society
-
Alvaro A. Cardenas, Saurabh Amin, and Shankar Sastry. Secure control: Towards survivable cyber-physical systems. In ICDCSW’08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops, pages 495–500, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
ICDCSW’08: Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems Workshops
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
9
-
-
34047108801
-
Opportunistic rover science: Finding and reacting to rocks, clouds and dust devils
-
March
-
Rebecca Castano, Tara Estlin, Daniel Gaines, Andres Castano, Caroline Chouinard, Ben Bornstein, Robert C. Anderson, Steve Chien, Alex Fukunaga, and Michele Judd. Opportunistic rover science: Finding and reacting to rocks, clouds and dust devils. In IEEE Aerospace Conference, March 2006.
-
(2006)
IEEE Aerospace Conference
-
-
Castano, R.1
Estlin, T.2
Gaines, D.3
Castano, A.4
Chouinard, C.5
Bornstein, B.6
Anderson, R.C.7
Chien, S.8
Fukunaga, A.9
Judd, M.10
-
10
-
-
68049121093
-
Anomaly detection: A survey
-
Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A survey. ACM Comput. Surv., 41(3):1–58, 2009.
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
12
-
-
34848839043
-
Increased mars rover autonomy using AI planning, scheduling and execution
-
10-14 April 2007, Roma, Italy, IEEE
-
Tara A. Estlin, Daniel M. Gaines, Caroline Chouinard, Rebecca Castao, Benjamin Bornstein, Michele Judd, Issa A. D. Nesnas, and Robert C. Anderson. Increased mars rover autonomy using AI planning, scheduling and execution. In 2007 IEEE International Conference on Robotics and Automation, ICRA 2007, 10-14 April 2007, Roma, Italy, pages 4911–4918. IEEE, 2007.
-
(2007)
2007 IEEE International Conference on Robotics and Automation, ICRA 2007
, pp. 4911-4918
-
-
Estlin, T.A.1
Gaines, D.M.2
Chouinard, C.3
Castao, R.4
Bornstein, B.5
Judd, M.6
Nesnas, I.A.D.7
Anderson, R.C.8
-
13
-
-
32344449062
-
An approach to spacecraft anomaly detection problem using kernel feature space
-
New York, NY, USA, ACM
-
Ryohei Fujimaki, Takehisa Yairi, and Kazuo Machida. An approach to spacecraft anomaly detection problem using kernel feature space. In KDD ’05: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pages 401–410, New York, NY, USA, 2005. ACM.
-
(2005)
KDD ’05: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining
, pp. 401-410
-
-
Fujimaki, R.1
Yairi, T.2
Machida, K.3
-
14
-
-
77954796687
-
A testbed for secure and robust scada systems
-
Annarita Giani, Gabor Karsai, Tanya Roosta, Aakash Shah, Bruno Sinopoli, and Jon Wiley. A testbed for secure and robust scada systems. SIGBED Rev., 5(2):1–4, 2008.
-
(2008)
SIGBED Rev
, vol.5
, Issue.2
, pp. 1-4
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
16
-
-
77954615585
-
A framework for the safe interoperability of medical devices in the presence of connection failures
-
Stockholm, Sweden, April
-
Cheolgi Kim, Mu Sun, Sibin Mohan, Heechul Yun, Abdullah Al-Nayeem, Lui Sha, and Tarek Abdelzaher. A framework for the safe interoperability of medical devices in the presence of connection failures. In International Conference on Cyber-physical Systems (ICCPS), Stockholm, Sweden, April 2010.
-
(2010)
International Conference on Cyber-Physical Systems (ICCPS)
-
-
Kim, C.1
Sun, M.2
Mohan, S.3
Yun, H.4
Al-Nayeem, A.5
Sha, L.6
Abdelzaher, T.7
-
18
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Ar Lazarevic, Aysel Ozgur, Levent Ertoz, Jaideep Srivastava, and Vipin Kumar. A comparative study of anomaly detection schemes in network intrusion detection. In In Proceedings of the Third SIAM International Conference on Data Mining, 2003.
-
(2003)
Proceedings of the Third SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
20
-
-
85080347618
-
Behavior blocking software repels new viruses
-
January
-
E Messner. Behavior blocking software repels new viruses. Network World, January 2002.
-
(2002)
Network World
-
-
Messner, E.1
-
21
-
-
29744452175
-
Formal verification of flight critical software
-
August
-
Steven P. Miller, Elise A. Anderson, Lucas G. Wagner, Michael W. Whalen, and Mats P.E. Heimdahl. Formal verification of flight critical software. In Proceedings of the AIAA Guidance, Navigation and Control Conference and Exhibit, August 2005.
-
(2005)
Proceedings of the AIAA Guidance, Navigation and Control Conference and Exhibit
-
-
Miller, S.P.1
Anderson, E.A.2
Wagner, L.G.3
Whalen, M.W.4
Heimdahl, M.P.E.5
-
22
-
-
84856191079
-
Computer virus coevolution
-
January
-
Carey Nachenberg. Computer virus coevolution. Communications of the ACM, 40(1), January 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.1
-
-
Nachenberg, C.1
-
23
-
-
36349021341
-
Extending cognitive architecture with episodic memory
-
Andrew Nuxoll and John E. Laird. Extending cognitive architecture with episodic memory. In AAAI, pages 1560–1564, 2007.
-
(2007)
AAAI
, pp. 1560-1564
-
-
Nuxoll, A.1
Laird, J.E.2
-
24
-
-
84867468024
-
Lambda in motion: Controlling robots with haskell
-
John Peterson, Paul Hudak, and Conal Elliott. Lambda in motion: Controlling robots with haskell. In PADL, pages 91–105, 1999.
-
(1999)
PADL
, pp. 91-105
-
-
Peterson, J.1
Hudak, P.2
Elliott, C.3
-
28
-
-
27544461422
-
The wayfarer modular navigation payload for intelligent robot infrastructure
-
March
-
Brian Yamauchi. The wayfarer modular navigation payload for intelligent robot infrastructure. In SPIE, Vol. 5804, 85, March 2005.
-
(2005)
SPIE
, vol.5804
, pp. 85
-
-
Yamauchi, B.1
-
29
-
-
51849152291
-
Reconfigurable real-time middleware for distributed cyber-physical systems with aperiodic events
-
Washington, DC, USA, IEEE Computer Society
-
Yuanfang Zhang, Christopher Gill, and Chenyang Lu. Reconfigurable real-time middleware for distributed cyber-physical systems with aperiodic events. In ICDCS’08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, pages 581–588, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
ICDCS’08: Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems
, pp. 581-588
-
-
Zhang, Y.1
Gill, C.2
Lu, C.3
|