Auswahl der wissenschaftlichen Literatur zum Thema „Specification of cyberphysical systems“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Specification of cyberphysical systems" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Specification of cyberphysical systems"

1

Meshcheryakov, Roman, Andrey Iskhakov und Oleg Evsutin. „Analysis of Modern Methods to Ensure Data Integrity in Cyber-Physical System Management Protocols“. Informatics and Automation 19, Nr. 5 (13.10.2020): 1089–122. http://dx.doi.org/10.15622/ia.2020.19.5.7.

Der volle Inhalt der Quelle
Annotation:
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, the security of application layer protocols is of paramount importance, as these protocols are the basis for interaction between applications and services running on different devices, as well as in cloud infrastructures. With the constant interaction of the systems under study with the real physical infrastructure, the challenge is to determine effective measures to ensure the integrity of the transferred control commands, as disruption of the performed critical processes can affect human life and health. The paper provides an analytical review of the main methods of data integrity assurance in management protocol of cyberphysical systems, as well as an overview of application layer protocols vulnerabilities widely used in cyberphysical systems of different types. Classical methods of data integrity assurance, new methods, in particular, blockchain, as well as the main directions of increasing the efficiency of data integrity protocols in cyberphysical systems are considered. Analysis of application layer vulnerabilities is carried out on the example of the most popular MQTT, CoAP, AMQP, DDS, XMPP specifications and their implementations. It is established that despite the presence of basic security mechanisms in all these protocols, researchers continue to regularly identify vulnerabilities in popular implementations, that often endangers critical infrastructure services. In the course of preparing the review of the existing methods of data integrity assurance for the examined class of systems, the key problems of these methods integration and ways of their solution were defined.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jaïdi, Faouzi, Faten Labbene Ayachi und Adel Bouhoula. „A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures“. Security and Communication Networks 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/7142170.

Der volle Inhalt der Quelle
Annotation:
Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our systemSVIRVROthat allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kulynych, Pavlo. „Digitalization of land relations and law in Ukraine: methodological and theoretical aspects.“ Yearly journal of scientific articles “Pravova derzhava”, Nr. 32 (2021): 257–67. http://dx.doi.org/10.33663/0869-2491-2021-32-257-267.

Der volle Inhalt der Quelle
Annotation:
The article examines the methodological and theoretical issues of the formation of legal support for the digitalization of land relations in Ukraine. The author points out that the digitalization of land relations causes "profound" changes in their legal regulation and determines the clarification of the basic principles of land law of Ukraine. Thus, with the adoption of the Law "On National Infrastructure of Geospatial Data" laid the beginning of the formation in the land legislation of Ukraine the principle of availability of public data on land, which symbolizes the beginning of the era of digitalization of land relations. The essence of this principle is that all information provided by law and created in the process of maintaining the relevant state registers of land and related natural and other resources (geospatial data) as a multifaceted object of land and other legal relations are available to subjects of such legal relations in real time in the official form and to the extent that such access is provided by the computer equipment and software used by such subjects. As stated in the Concept of Development of the Digital Economy and Society of Ukraine for 2018–2020, digitization is the saturation of the physical world with electronic-digital devices, tools, systems and electronic communication between them, which actually allows integrated interaction of virtual and physical, ie creates cyberphysical space. In our opinion, this definition of digitization cannot be considered as correct. Firstly, saturation of the physical world with electronic-digital devices, means, systems and the establishment of electronic-communication exchange between them is neither the essence nor the purpose of digitalization, but is only a way to implement it. After all, the saturation of the physical world with electronic-digital devices can lead to any social result – both positive and negative. Secondly, the provision of integrated interaction of virtual and physical - the creation of cyberphysical space does not indicate how such cyberphysical space differs from ordinary physical space, in which social relations arise and are regulated by law. Therefore, the concept of digitalization needs to be clarified taking into account the specifics of the legal regulation of land relations. It is proved that the legal norms regulating the digitalization of public relations are an integral part of the administrative, civil, land and other branches of law. The conclusion is substantiated that the legal infrastructure of digitalization of land relations includes legal support for: 1) collection and formation of a system of information about the land using its remote sensing; 2) formation of promptly updated land databases; 3) the formation of a system of registers, portals and other service mechanisms that guarantee and provide access to such databases and the use of information about land in land legal relations. The author proves that legal support for digitalization of land relations is their legal regulation, the basic basis of which is information about the land (data-based legal regulation), which with the help of appropriate software includes the dynamics of qualitative and quantitative state of land in the mechanism of legal regulation of land relations, transforming this dynamic in such dynamics of land legal relations at which negative and positive changes in a condition of the earths automatically cause emergence, change, specification of the rights and duties of their subjects and form preconditions for application of the legal influence provided by the legislation on those subjects whose activity or inaction caused negative consequences in the condition of the lands. Finaly analysis of the modern system of land information required to ensure the digitization of land relations, gives grounds to identify such key components of its legal infrastructure as: 1) collection and formation of a system of such information through remote sensing of land (remote sensing); 2) formation of operatively updated land databases; 3) formation of a system of registers, portals and other service mechanisms, which guarantee and provide access to such databases and the use of information about land in land relations. Each of the selected elements of the system of information use in the process of digitization of land relations has a special legal mechanism.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Watanabe, Yuhei, Hideki Yamamoto und Hirotaka Yoshida. „Lightweight Crypto Stack for TPMS Using Lesamnta-LW“. Security and Communication Networks 2020 (24.09.2020): 1–12. http://dx.doi.org/10.1155/2020/5738215.

Der volle Inhalt der Quelle
Annotation:
Modern vehicles which have internal sensor networks are one of the examples of a cyberphysical system (CPS). The tire pressure monitoring system (TPMS) is used to monitor the pressure of the tires and to inform the driver of them. This system is mandatory for vehicles in the US and EU. To ensure the security of TPMS, it is important to reduce the cost of the cryptographic mechanisms implemented in resource-constrained devices. To address this problem, previous works have proposed countermeasures employing lightweight block ciphers such as PRESENT, SPECK, or KATAN. However, it is not clear to us that any of these works have addressed the issues of software optimization that considers TPMS packet protection as well as session key updates for architectures consisting of the vehicle TPMS ECU and four low-cost TPMS sensors equipped with the tires. In this paper, we propose the application of ISO/IEC 29192-5 lightweight hash function Lesamnta-LW to address these issues. When we apply cryptographic mechanisms to a practical system, we consider the lightweight crypto stack which contains cryptographic mechanisms, specifications for the implementation, and performance evaluation. Our approach is to apply the known method of converting Lesamnta-LW to multiple independent pseudorandom functions (PRFs) in TPMS. In our case, we generate five PRFs this way and then use one PRF for MAC generation and four for key derivation. We use the internal AES-based block cipher of Lesamnta-LW for encryption. Although we follow the NIST SP 800-108 framework of converting PRFs to key derivation functions, we confirm the significant advantage of Lesamnta-LW-based PRFs over HMAC-SHA-256 by evaluating the performance on AVR 8-bit microcontrollers, on which we consider simulating TPMS sensors. We expect that our method to achieve multiple purposes with a single cryptographic primitive will help us to reduce the total implementation cost required for TPMS security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Sirjani, Marjan, Edward A. Lee und Ehsan Khamespanah. „Verification of Cyberphysical Systems“. Mathematics 8, Nr. 7 (02.07.2020): 1068. http://dx.doi.org/10.3390/math8071068.

Der volle Inhalt der Quelle
Annotation:
The value of verification of cyberphysical systems depends on the relationship between the state of the software and the state of the physical system. This relationship can be complex because of the real-time nature and different timelines of the physical plant, the sensors and actuators, and the software that is almost always concurrent and distributed. In this paper, we study different ways to construct a transition system model for the distributed and concurrent software components of a CPS. The purpose of the transition system model is to enable model checking, an established and widely used verification technique. We describe a logical-time-based transition system model, which is commonly used for verifying programs written in synchronous languages, and derive the conditions under which such a model faithfully reflects physical states. When these conditions are not met (a common situation), a finer-grained event-based transition system model may be required. We propose an approach for formal verification of cyberphysical systems using Lingua Franca, a language designed for programming cyberphysical systems, and Rebeca, an actor-based language designed for model checking distributed event-driven systems. We focus on the cyber part and model a faithful interface to the physical part. Our method relies on the assumption that the alignment of different timelines during the execution of the system is the responsibility of the underlying platforms. We make those assumptions explicit and clear.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Braeken, An, Madhusanka Liyanage, Salil S. Kanhere und Sudhir Dixit. „Blockchain and Cyberphysical Systems“. Computer 53, Nr. 9 (September 2020): 31–35. http://dx.doi.org/10.1109/mc.2020.3005112.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Horowitz, Barry M. „Cyberattack-Resilient Cyberphysical Systems“. IEEE Security & Privacy 18, Nr. 1 (Januar 2020): 55–60. http://dx.doi.org/10.1109/msec.2019.2947123.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sergeyeva, O. Yu. „Cyberphysical systems as technologysubsidiarian administration.“ Nanotechnologies in Construction: A Scientific Internet-Journal 10, Nr. 3 (30.06.2018): 94–106. http://dx.doi.org/10.15828/2075-8545-2018-10-3-94-106.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Platzer, André. „Verification of Cyberphysical Transportation Systems“. IEEE Intelligent Systems 24, Nr. 4 (Juli 2009): 10–13. http://dx.doi.org/10.1109/mis.2009.81.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Hurlburt, George, und Jeffrey Voas. „Beyond the Cloud: Cyberphysical Systems“. IT Professional 15, Nr. 2 (März 2013): 2–4. http://dx.doi.org/10.1109/mitp.2013.24.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Specification of cyberphysical systems"

1

Junek, Martin. „Metody specifikace kyberfyzikálních systémů“. Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-442854.

Der volle Inhalt der Quelle
Annotation:
The aim of this diploma thesis is to analyse the advantages and disadvantages of different types of description of cyberphysical systems. It also concerns a description of the selected method that meets most of the current requirements for CPS design. In the practical part, attention is paid to the elaboration of an example for the specification of a selected cyberphysical system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Chabukswar, Rohan. „Secure Detection in Cyberphysical Control Systems“. Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/326.

Der volle Inhalt der Quelle
Annotation:
A SCADA system employing the distributed networks of sensors and actuators that interact with the physical environment is vulnerable to attacks that target the interface between the cyber and physical subsystems. An attack that hijacks the sensors in an attempt to provide false readings to the controller (for example, the Stuxnet worm that targeted Iran’s nuclear centrifuges) can be used to feign normal system operation for the control system, while the attacker can hijack the actuators to send the system beyond its safety range. This thesis extends the results of a previously proposed method. The original method proposed addition of a randomized “watermarking” signal and checking for the presence of this signal and its effects in the received sensor measurements. Since the control inputs traverse the cyberphysical boundary and make their effects apparent in the sensor measurements, they are employed to carry this watermarking signal through to the system and back to the SCADA controller. The sensor measurements are compared to the expected measurements (calculated using a suitably delayed model of the system within the controller). This methodology is based on using the statistics of the linear system and its controller. The inclusion of a randomized signal on the control inputs induces an increase in the performance cost of the physical system. This thesis proposes a method of optimization of the watermarking signal based on the trade-off between this performance cost and the attack detection rate, by leveraging the distribution the watermarking signal over multiple inputs and multiple outputs. It is further proved that regardless of the number of inputs and outputs in the system, only one watermarking signal needs to be generated. This optimization, and its necessity in improving the effectiveness of the detector without detriment to the performance cost, are demonstrated on a simulated chemical plant. The thesis also proposes another methodology that does not rely on these statistics, but is instead based on calculating the correlation between the received sensor measurements and the expected measurements accrued from the model inside the controller. Generalizing the form of attack even further to attacks that target the integrity of the data sent to the actuators and received from the sensors, this thesis demonstrates the effect of such integrity attack on electricity market operations, where the attacker successfully uses a vulnerability in the Global Position System to break synchronicity among dispersed phasor measurements to gain a competitive advantage over other bidders in the electricity market. In an effort to make state estimation robust against integrity attacks, the sensors and states are modeled as binary variables. Sensor networks use binary measurements and state estimations for several reasons, including communication and processing overheads. Such a state estimator is vulnerable to attackers that can hijack a subset of the sensors in an effort to change the state estimate. This thesis proposes a method for designing the estimators using the concept of invariant sets. This methodology relies on identifying the sets of measurement vectors for which no amount of manipulation by the attacker can change estimate, and maximizing the probability that the sensor measurement vector lies in this set. Although the problem of finding the best possible invariant sets for a general set of sensors has double-exponential complexity, by using some simplifications on the types of sensors, this can be reduced significantly. For the problem that employs all sensors of the same type, this method reduces to a linear search. For sensors that can be classified into two types, this complexity reduces to a search over a two-dimensional space, which is still tractable. Further increase in the confidence of the estimate can be achieved by considering the correlation between the sensor measurements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Magnússon, Sindri. „Bandwidth Limited Distributed Optimization with Applications to Networked Cyberphysical Systems“. Doctoral thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205682.

Der volle Inhalt der Quelle
Annotation:
The emerging technology of Cyberphysical systems consists of networked computing, sensing, and actuator devices used to monitor, connect, and control physical phenomena. In order to economically and sustainably operate Cyberphysical systems, their devices need to cooperate over a communication network to solve optimization problems. For example, in smart power grids, smart meters cooperatively optimize the grid performance, and in wireless sensor networks a number of sensors cooperate to find optimal estimators of real-world parameters. A challenging aspect in the design of distributed solution algorithms to these optimization problems is that while the technology advances and the networks grow larger, the communication bandwidth available to coordinate the solution remains limited. Motivated by this challenge, this thesis investigates the convergence of distributed solution methods for resource allocation optimization problems, where gradient information is communicated at every iteration, using limited communication. This problem is approached from three different perspectives, each presented in a separate paper.  The investigation of the three papers demonstrate promises and limits of solving distributed resource allocation problems using limited communication bandwidth. Future work will consider how even more general problems can be solved using limited communication bandwidth and also study different communication constraints.

QC 20170424

APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ehikioya, Sylvanus Agbonifoh. „Specification of transaction systems protocols“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/nq23597.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hunter, Timothy Jason. „Large-Scale, Low-Latency State Estimation Of Cyberphysical Systems With An Application To Traffic Estimation“. Thesis, University of California, Berkeley, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3686329.

Der volle Inhalt der Quelle
Annotation:

Large physical systems are increasingly prevalent, and designing estimation strategies for them has become both a practical necessity and a complicated problem. Their sensing infrastructure is usually ad-hoc, and the estimate of interest is often a complex function of the data. At the same time, computing power is rapidly becoming a commodity. We show with the study of two estimation tasks in urban transportation how the proper design of algorithms can lead to significant gains in scalability compared to existing solutions.

A common problem in trip planning is to make a given deadline such as arriving at the airport within an hour. Existing routing services optimize for the expected time of arrival, but do not provide the most reliable route, which accounts for the variability in travel times. Providing statistical information is even harder for trips in cities which undergo a lot of variability. This thesis aims at building scalable algorithms for inferring statistical distributions of travel time over very large road networks, using GPS points from vehicles in real-time. We consider two complementary algorithms that differ in the characteristics of the GPS data input, and in the complexity of the model: a simpler streaming Expectation-Maximization algorithm that leverages very large volumes of extremely noisy data, and a novel Markov Model-Gaussian Markov Random Field that extracts global statistical correlations from high-frequency, privacy-preserving trajectories.

These two algorithms have been implemented and deployed in a pipeline that takes streams of GPS data as input, and produces distributions of travel times accessible as output. This pipeline is shown to scale on a large cluster of machines and can process tens of millions of GPS observations from an area that comprises hundreds of thousands of road segments. This is to our knowledge the first research framework that considers in an integrated fashion the problem of statistical estimation of traffic at a very large scale from streams of GPS data.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Miranda, Paul Nicholas. „HD4AR: High-Precision Mobile Augmented Reality Using Image-Based Localization“. Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/77013.

Der volle Inhalt der Quelle
Annotation:
Construction projects require large amounts of cyber-information, such as 3D models, in order to achieve success. Unfortunately, this information is typically difficult for construction field personnel to access and use on-site, due to the highly mobile nature of the job and hazardous work environments. Field personnel rely on carrying around large stacks of construction drawings, diagrams, and specifications, or traveling to a trailer to look up information electronically, reducing potential project efficiency. This thesis details my work on Hybrid 4-Dimensional Augmented Reality, known as HD4AR, a mobile augmented reality system for construction projects that provides high-precision visualization of semantically-rich 3D cyber-information over real-world imagery. The thesis examines the challenges related to augmenting reality on a construction site, describes how HD4AR overcomes these challenges, and empirically evaluates the capabilities of HD4AR.
Master of Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Reynolds, Graham J. „Configurable graphics systems : modelling and specification“. Thesis, University of East Anglia, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293731.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Donnelly, Ronald Patrick. „Modelling and specification of payload systems“. Thesis, University of Southampton, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.261668.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Davies, Jim. „Specification and proof in real-time systems“. Thesis, University of Oxford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.279830.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ebner, Michael. „UML-based Test Specification for Communication Systems“. Doctoral thesis, [S.l.] : [s.n.], 2004. http://hdl.handle.net/11858/00-1735-0000-0006-B3B4-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Specification of cyberphysical systems"

1

Voros, Nikolaos S., und Christos P. Antonopoulos, Hrsg. Cyberphysical Systems for Epilepsy and Related Brain Disorders. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20049-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Broy, Manfred, Stephan Merz und Katharina Spies, Hrsg. Formal Systems Specification. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0024423.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

K, Periyasamy, Hrsg. Specification of software systems. 2. Aufl. New York: Springer, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alagar, Vangalur S. Specification of software systems. New York: Springer, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Alagar, V. S. Specification of Software Systems. New York, NY: Springer New York, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Alagar, V. S., und K. Periyasamy. Specification of Software Systems. London: Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-277-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Alagar, V. S., und K. Periyasamy. Specification of Software Systems. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2920-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Astesiano, Egidio. Algebraic Foundations of Systems Specification. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Arends, N. W. A. A systems engineering specification formalism. Eindhoven: Eindhoven University, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

T, Harwood W., und Jackson M. I, Hrsg. The Specification of Complex Systems. Wokingham, England: Addison-Wesley, 1986.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Specification of cyberphysical systems"

1

Buenaposada, José M., und Luis Baumela. „Boosting Object Detection in Cyberphysical Systems“. In Understanding the Brain Function and Emotions, 309–18. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19591-5_32.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Fortino, Giancarlo, Anna Rovella, Wilma Russo und Claudio Savaglio. „Including Cyberphysical Smart Objects into Digital Libraries“. In Internet and Distributed Computing Systems, 147–58. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11692-1_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hill, Gillian. „Formal Specification“. In Systems: Theory and Practice, 13–32. Vienna: Springer Vienna, 1998. http://dx.doi.org/10.1007/978-3-7091-6451-8_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Mellin, Jonas, und Mikael Berndtsson. „Event Specification“. In Encyclopedia of Database Systems, 1389–93. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_505.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Chomicki, Jan. „Preference Specification“. In Encyclopedia of Database Systems, 2787–91. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_80707.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Mellin, Jonas, und Mikael Berndtsson. „Event Specification“. In Encyclopedia of Database Systems, 1059–63. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_505.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chomicki, Jan. „Preference Specification“. In Encyclopedia of Database Systems, 1–5. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4899-7993-3_80707-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mellin, Jonas, und Mikael Berndtsson. „Event Specification“. In Encyclopedia of Database Systems, 1–5. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_505-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Alagar, V. S., und K. Periyasamy. „Specification Activities“. In Specification of Software Systems, 13–21. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2920-7_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Alagar, V. S., und K. Periyasamy. „Specification Qualities“. In Specification of Software Systems, 23–30. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2920-7_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Specification of cyberphysical systems"

1

„Hybrid Iterative System Specification of Cyberphysical Systems: Neurocognitive Behavior Application“. In 2020 Spring Simulation Conference. Society for Modeling and Simulation International (SCS), 2020. http://dx.doi.org/10.22360/springsim.2020.tms.006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Althubaity, Areej, Tao Gong, Kim-Kwang Raymond, Mark Nixon, Reda Ammar und Song Han. „Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks“. In 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS). IEEE, 2020. http://dx.doi.org/10.1109/icps48405.2020.9274726.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Samad, Tariq. „Infrastructure cyberphysical systems and their users“. In 2016 American Control Conference (ACC). IEEE, 2016. http://dx.doi.org/10.1109/acc.2016.7525317.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Tippenhauer, Nils Ole. „Session details: Session 5A: Cyberphysical Systems“. In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3285877.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

„Session details: Session 5A: Cyberphysical Systems“. In the 2018 ACM SIGSAC Conference, chair Nils Ole Tippenhauer. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3243734.3285877.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sirjani, Marjan, Edward A. Lee und Ehsan Khamespanah. „Model Checking Software in Cyberphysical Systems“. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2020. http://dx.doi.org/10.1109/compsac48688.2020.0-138.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Fujita, Masahiro. „Simulation-Based Analysis of Cyberphysical Systems“. In 2012 15th Euromicro Conference on Digital System Design (DSD). IEEE, 2012. http://dx.doi.org/10.1109/dsd.2012.119.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Saltaformaggio, Brendan. „Session details: Session 1E: Cyberphysical Systems“. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3432961.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

„CyberPhysical Systems for Deformable Object Manipulation“. In 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS). IEEE, 2021. http://dx.doi.org/10.1109/icps49255.2021.9468159.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ibrahim, Mohamed, und Krishnendu Chakrabarty. „Cyberphysical adaptation in digital-microfluidic biochips“. In 2016 IEEE Biomedical Circuits and Systems Conference (BioCAS). IEEE, 2016. http://dx.doi.org/10.1109/biocas.2016.7833827.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Specification of cyberphysical systems"

1

Sweet, Nathan, Timothy P. Bielek, John D. Matthews, Henry John Coakley und Len Pan. GFF Specification for SAR Systems. Office of Scientific and Technical Information (OSTI), August 2014. http://dx.doi.org/10.2172/1171563.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mulvenna, Gerard. IGOSS-industrygovernment open systems specification. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.500-217.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Khaw, J., Hrsg. Technical specification for vacuum systems. Office of Scientific and Technical Information (OSTI), Januar 1987. http://dx.doi.org/10.2172/6580012.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Andes, Robert C., und William B. Rouse. Specification of Adaptive Aiding Systems. Fort Belvoir, VA: Defense Technical Information Center, März 1992. http://dx.doi.org/10.21236/ada254537.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Flater, David. Specification of interactions in integrated manufacturing systems. Gaithersburg, MD: National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.ir.6484.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Field, Bruce F., Edward F. Kelley und R. Michael McCabe. Specification for interoperability between ballistic imaging systems:. Gaithersburg, MD: National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5855.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sprock, Timothy, George Thiers, Leon F. McGinnis und Conrad Bock. Theory of Discrete Event Logistics Systems (DELS) specification. Gaithersburg, MD: National Institute of Standards and Technology, Juni 2020. http://dx.doi.org/10.6028/nist.ir.8262.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Place, Patrick R., William G. Wood und Mike Tudball. Survey of Formal Specification Techniques for Reactive Systems. Fort Belvoir, VA: Defense Technical Information Center, Mai 1990. http://dx.doi.org/10.21236/ada232045.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Thomas, WKT. Generic Guide Specification for Geothermal Heat Pump Systems. Office of Scientific and Technical Information (OSTI), April 2000. http://dx.doi.org/10.2172/814081.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Edwards, Michael, und Steven L. Howell. A Methodology for Systems Requirements Specification and Traceability for Large Real Time Complex Systems. Fort Belvoir, VA: Defense Technical Information Center, September 1991. http://dx.doi.org/10.21236/ada254738.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie