Academic literature on the topic 'Specification of cyberphysical systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Specification of cyberphysical systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Specification of cyberphysical systems"

1

Meshcheryakov, Roman, Andrey Iskhakov, and Oleg Evsutin. "Analysis of Modern Methods to Ensure Data Integrity in Cyber-Physical System Management Protocols." Informatics and Automation 19, no. 5 (October 13, 2020): 1089–122. http://dx.doi.org/10.15622/ia.2020.19.5.7.

Full text
Abstract:
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, the security of application layer protocols is of paramount importance, as these protocols are the basis for interaction between applications and services running on different devices, as well as in cloud infrastructures. With the constant interaction of the systems under study with the real physical infrastructure, the challenge is to determine effective measures to ensure the integrity of the transferred control commands, as disruption of the performed critical processes can affect human life and health. The paper provides an analytical review of the main methods of data integrity assurance in management protocol of cyberphysical systems, as well as an overview of application layer protocols vulnerabilities widely used in cyberphysical systems of different types. Classical methods of data integrity assurance, new methods, in particular, blockchain, as well as the main directions of increasing the efficiency of data integrity protocols in cyberphysical systems are considered. Analysis of application layer vulnerabilities is carried out on the example of the most popular MQTT, CoAP, AMQP, DDS, XMPP specifications and their implementations. It is established that despite the presence of basic security mechanisms in all these protocols, researchers continue to regularly identify vulnerabilities in popular implementations, that often endangers critical infrastructure services. In the course of preparing the review of the existing methods of data integrity assurance for the examined class of systems, the key problems of these methods integration and ways of their solution were defined.
APA, Harvard, Vancouver, ISO, and other styles
2

Jaïdi, Faouzi, Faten Labbene Ayachi, and Adel Bouhoula. "A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures." Security and Communication Networks 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/7142170.

Full text
Abstract:
Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our systemSVIRVROthat allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.
APA, Harvard, Vancouver, ISO, and other styles
3

Kulynych, Pavlo. "Digitalization of land relations and law in Ukraine: methodological and theoretical aspects." Yearly journal of scientific articles “Pravova derzhava”, no. 32 (2021): 257–67. http://dx.doi.org/10.33663/0869-2491-2021-32-257-267.

Full text
Abstract:
The article examines the methodological and theoretical issues of the formation of legal support for the digitalization of land relations in Ukraine. The author points out that the digitalization of land relations causes "profound" changes in their legal regulation and determines the clarification of the basic principles of land law of Ukraine. Thus, with the adoption of the Law "On National Infrastructure of Geospatial Data" laid the beginning of the formation in the land legislation of Ukraine the principle of availability of public data on land, which symbolizes the beginning of the era of digitalization of land relations. The essence of this principle is that all information provided by law and created in the process of maintaining the relevant state registers of land and related natural and other resources (geospatial data) as a multifaceted object of land and other legal relations are available to subjects of such legal relations in real time in the official form and to the extent that such access is provided by the computer equipment and software used by such subjects. As stated in the Concept of Development of the Digital Economy and Society of Ukraine for 2018–2020, digitization is the saturation of the physical world with electronic-digital devices, tools, systems and electronic communication between them, which actually allows integrated interaction of virtual and physical, ie creates cyberphysical space. In our opinion, this definition of digitization cannot be considered as correct. Firstly, saturation of the physical world with electronic-digital devices, means, systems and the establishment of electronic-communication exchange between them is neither the essence nor the purpose of digitalization, but is only a way to implement it. After all, the saturation of the physical world with electronic-digital devices can lead to any social result – both positive and negative. Secondly, the provision of integrated interaction of virtual and physical - the creation of cyberphysical space does not indicate how such cyberphysical space differs from ordinary physical space, in which social relations arise and are regulated by law. Therefore, the concept of digitalization needs to be clarified taking into account the specifics of the legal regulation of land relations. It is proved that the legal norms regulating the digitalization of public relations are an integral part of the administrative, civil, land and other branches of law. The conclusion is substantiated that the legal infrastructure of digitalization of land relations includes legal support for: 1) collection and formation of a system of information about the land using its remote sensing; 2) formation of promptly updated land databases; 3) the formation of a system of registers, portals and other service mechanisms that guarantee and provide access to such databases and the use of information about land in land legal relations. The author proves that legal support for digitalization of land relations is their legal regulation, the basic basis of which is information about the land (data-based legal regulation), which with the help of appropriate software includes the dynamics of qualitative and quantitative state of land in the mechanism of legal regulation of land relations, transforming this dynamic in such dynamics of land legal relations at which negative and positive changes in a condition of the earths automatically cause emergence, change, specification of the rights and duties of their subjects and form preconditions for application of the legal influence provided by the legislation on those subjects whose activity or inaction caused negative consequences in the condition of the lands. Finaly analysis of the modern system of land information required to ensure the digitization of land relations, gives grounds to identify such key components of its legal infrastructure as: 1) collection and formation of a system of such information through remote sensing of land (remote sensing); 2) formation of operatively updated land databases; 3) formation of a system of registers, portals and other service mechanisms, which guarantee and provide access to such databases and the use of information about land in land relations. Each of the selected elements of the system of information use in the process of digitization of land relations has a special legal mechanism.
APA, Harvard, Vancouver, ISO, and other styles
4

Watanabe, Yuhei, Hideki Yamamoto, and Hirotaka Yoshida. "Lightweight Crypto Stack for TPMS Using Lesamnta-LW." Security and Communication Networks 2020 (September 24, 2020): 1–12. http://dx.doi.org/10.1155/2020/5738215.

Full text
Abstract:
Modern vehicles which have internal sensor networks are one of the examples of a cyberphysical system (CPS). The tire pressure monitoring system (TPMS) is used to monitor the pressure of the tires and to inform the driver of them. This system is mandatory for vehicles in the US and EU. To ensure the security of TPMS, it is important to reduce the cost of the cryptographic mechanisms implemented in resource-constrained devices. To address this problem, previous works have proposed countermeasures employing lightweight block ciphers such as PRESENT, SPECK, or KATAN. However, it is not clear to us that any of these works have addressed the issues of software optimization that considers TPMS packet protection as well as session key updates for architectures consisting of the vehicle TPMS ECU and four low-cost TPMS sensors equipped with the tires. In this paper, we propose the application of ISO/IEC 29192-5 lightweight hash function Lesamnta-LW to address these issues. When we apply cryptographic mechanisms to a practical system, we consider the lightweight crypto stack which contains cryptographic mechanisms, specifications for the implementation, and performance evaluation. Our approach is to apply the known method of converting Lesamnta-LW to multiple independent pseudorandom functions (PRFs) in TPMS. In our case, we generate five PRFs this way and then use one PRF for MAC generation and four for key derivation. We use the internal AES-based block cipher of Lesamnta-LW for encryption. Although we follow the NIST SP 800-108 framework of converting PRFs to key derivation functions, we confirm the significant advantage of Lesamnta-LW-based PRFs over HMAC-SHA-256 by evaluating the performance on AVR 8-bit microcontrollers, on which we consider simulating TPMS sensors. We expect that our method to achieve multiple purposes with a single cryptographic primitive will help us to reduce the total implementation cost required for TPMS security.
APA, Harvard, Vancouver, ISO, and other styles
5

Sirjani, Marjan, Edward A. Lee, and Ehsan Khamespanah. "Verification of Cyberphysical Systems." Mathematics 8, no. 7 (July 2, 2020): 1068. http://dx.doi.org/10.3390/math8071068.

Full text
Abstract:
The value of verification of cyberphysical systems depends on the relationship between the state of the software and the state of the physical system. This relationship can be complex because of the real-time nature and different timelines of the physical plant, the sensors and actuators, and the software that is almost always concurrent and distributed. In this paper, we study different ways to construct a transition system model for the distributed and concurrent software components of a CPS. The purpose of the transition system model is to enable model checking, an established and widely used verification technique. We describe a logical-time-based transition system model, which is commonly used for verifying programs written in synchronous languages, and derive the conditions under which such a model faithfully reflects physical states. When these conditions are not met (a common situation), a finer-grained event-based transition system model may be required. We propose an approach for formal verification of cyberphysical systems using Lingua Franca, a language designed for programming cyberphysical systems, and Rebeca, an actor-based language designed for model checking distributed event-driven systems. We focus on the cyber part and model a faithful interface to the physical part. Our method relies on the assumption that the alignment of different timelines during the execution of the system is the responsibility of the underlying platforms. We make those assumptions explicit and clear.
APA, Harvard, Vancouver, ISO, and other styles
6

Braeken, An, Madhusanka Liyanage, Salil S. Kanhere, and Sudhir Dixit. "Blockchain and Cyberphysical Systems." Computer 53, no. 9 (September 2020): 31–35. http://dx.doi.org/10.1109/mc.2020.3005112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Horowitz, Barry M. "Cyberattack-Resilient Cyberphysical Systems." IEEE Security & Privacy 18, no. 1 (January 2020): 55–60. http://dx.doi.org/10.1109/msec.2019.2947123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sergeyeva, O. Yu. "Cyberphysical systems as technologysubsidiarian administration." Nanotechnologies in Construction: A Scientific Internet-Journal 10, no. 3 (June 30, 2018): 94–106. http://dx.doi.org/10.15828/2075-8545-2018-10-3-94-106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Platzer, André. "Verification of Cyberphysical Transportation Systems." IEEE Intelligent Systems 24, no. 4 (July 2009): 10–13. http://dx.doi.org/10.1109/mis.2009.81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hurlburt, George, and Jeffrey Voas. "Beyond the Cloud: Cyberphysical Systems." IT Professional 15, no. 2 (March 2013): 2–4. http://dx.doi.org/10.1109/mitp.2013.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Specification of cyberphysical systems"

1

Junek, Martin. "Metody specifikace kyberfyzikálních systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-442854.

Full text
Abstract:
The aim of this diploma thesis is to analyse the advantages and disadvantages of different types of description of cyberphysical systems. It also concerns a description of the selected method that meets most of the current requirements for CPS design. In the practical part, attention is paid to the elaboration of an example for the specification of a selected cyberphysical system.
APA, Harvard, Vancouver, ISO, and other styles
2

Chabukswar, Rohan. "Secure Detection in Cyberphysical Control Systems." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/326.

Full text
Abstract:
A SCADA system employing the distributed networks of sensors and actuators that interact with the physical environment is vulnerable to attacks that target the interface between the cyber and physical subsystems. An attack that hijacks the sensors in an attempt to provide false readings to the controller (for example, the Stuxnet worm that targeted Iran’s nuclear centrifuges) can be used to feign normal system operation for the control system, while the attacker can hijack the actuators to send the system beyond its safety range. This thesis extends the results of a previously proposed method. The original method proposed addition of a randomized “watermarking” signal and checking for the presence of this signal and its effects in the received sensor measurements. Since the control inputs traverse the cyberphysical boundary and make their effects apparent in the sensor measurements, they are employed to carry this watermarking signal through to the system and back to the SCADA controller. The sensor measurements are compared to the expected measurements (calculated using a suitably delayed model of the system within the controller). This methodology is based on using the statistics of the linear system and its controller. The inclusion of a randomized signal on the control inputs induces an increase in the performance cost of the physical system. This thesis proposes a method of optimization of the watermarking signal based on the trade-off between this performance cost and the attack detection rate, by leveraging the distribution the watermarking signal over multiple inputs and multiple outputs. It is further proved that regardless of the number of inputs and outputs in the system, only one watermarking signal needs to be generated. This optimization, and its necessity in improving the effectiveness of the detector without detriment to the performance cost, are demonstrated on a simulated chemical plant. The thesis also proposes another methodology that does not rely on these statistics, but is instead based on calculating the correlation between the received sensor measurements and the expected measurements accrued from the model inside the controller. Generalizing the form of attack even further to attacks that target the integrity of the data sent to the actuators and received from the sensors, this thesis demonstrates the effect of such integrity attack on electricity market operations, where the attacker successfully uses a vulnerability in the Global Position System to break synchronicity among dispersed phasor measurements to gain a competitive advantage over other bidders in the electricity market. In an effort to make state estimation robust against integrity attacks, the sensors and states are modeled as binary variables. Sensor networks use binary measurements and state estimations for several reasons, including communication and processing overheads. Such a state estimator is vulnerable to attackers that can hijack a subset of the sensors in an effort to change the state estimate. This thesis proposes a method for designing the estimators using the concept of invariant sets. This methodology relies on identifying the sets of measurement vectors for which no amount of manipulation by the attacker can change estimate, and maximizing the probability that the sensor measurement vector lies in this set. Although the problem of finding the best possible invariant sets for a general set of sensors has double-exponential complexity, by using some simplifications on the types of sensors, this can be reduced significantly. For the problem that employs all sensors of the same type, this method reduces to a linear search. For sensors that can be classified into two types, this complexity reduces to a search over a two-dimensional space, which is still tractable. Further increase in the confidence of the estimate can be achieved by considering the correlation between the sensor measurements.
APA, Harvard, Vancouver, ISO, and other styles
3

Magnússon, Sindri. "Bandwidth Limited Distributed Optimization with Applications to Networked Cyberphysical Systems." Doctoral thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205682.

Full text
Abstract:
The emerging technology of Cyberphysical systems consists of networked computing, sensing, and actuator devices used to monitor, connect, and control physical phenomena. In order to economically and sustainably operate Cyberphysical systems, their devices need to cooperate over a communication network to solve optimization problems. For example, in smart power grids, smart meters cooperatively optimize the grid performance, and in wireless sensor networks a number of sensors cooperate to find optimal estimators of real-world parameters. A challenging aspect in the design of distributed solution algorithms to these optimization problems is that while the technology advances and the networks grow larger, the communication bandwidth available to coordinate the solution remains limited. Motivated by this challenge, this thesis investigates the convergence of distributed solution methods for resource allocation optimization problems, where gradient information is communicated at every iteration, using limited communication. This problem is approached from three different perspectives, each presented in a separate paper.  The investigation of the three papers demonstrate promises and limits of solving distributed resource allocation problems using limited communication bandwidth. Future work will consider how even more general problems can be solved using limited communication bandwidth and also study different communication constraints.

QC 20170424

APA, Harvard, Vancouver, ISO, and other styles
4

Ehikioya, Sylvanus Agbonifoh. "Specification of transaction systems protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/nq23597.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hunter, Timothy Jason. "Large-Scale, Low-Latency State Estimation Of Cyberphysical Systems With An Application To Traffic Estimation." Thesis, University of California, Berkeley, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3686329.

Full text
Abstract:

Large physical systems are increasingly prevalent, and designing estimation strategies for them has become both a practical necessity and a complicated problem. Their sensing infrastructure is usually ad-hoc, and the estimate of interest is often a complex function of the data. At the same time, computing power is rapidly becoming a commodity. We show with the study of two estimation tasks in urban transportation how the proper design of algorithms can lead to significant gains in scalability compared to existing solutions.

A common problem in trip planning is to make a given deadline such as arriving at the airport within an hour. Existing routing services optimize for the expected time of arrival, but do not provide the most reliable route, which accounts for the variability in travel times. Providing statistical information is even harder for trips in cities which undergo a lot of variability. This thesis aims at building scalable algorithms for inferring statistical distributions of travel time over very large road networks, using GPS points from vehicles in real-time. We consider two complementary algorithms that differ in the characteristics of the GPS data input, and in the complexity of the model: a simpler streaming Expectation-Maximization algorithm that leverages very large volumes of extremely noisy data, and a novel Markov Model-Gaussian Markov Random Field that extracts global statistical correlations from high-frequency, privacy-preserving trajectories.

These two algorithms have been implemented and deployed in a pipeline that takes streams of GPS data as input, and produces distributions of travel times accessible as output. This pipeline is shown to scale on a large cluster of machines and can process tens of millions of GPS observations from an area that comprises hundreds of thousands of road segments. This is to our knowledge the first research framework that considers in an integrated fashion the problem of statistical estimation of traffic at a very large scale from streams of GPS data.

APA, Harvard, Vancouver, ISO, and other styles
6

Miranda, Paul Nicholas. "HD4AR: High-Precision Mobile Augmented Reality Using Image-Based Localization." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/77013.

Full text
Abstract:
Construction projects require large amounts of cyber-information, such as 3D models, in order to achieve success. Unfortunately, this information is typically difficult for construction field personnel to access and use on-site, due to the highly mobile nature of the job and hazardous work environments. Field personnel rely on carrying around large stacks of construction drawings, diagrams, and specifications, or traveling to a trailer to look up information electronically, reducing potential project efficiency. This thesis details my work on Hybrid 4-Dimensional Augmented Reality, known as HD4AR, a mobile augmented reality system for construction projects that provides high-precision visualization of semantically-rich 3D cyber-information over real-world imagery. The thesis examines the challenges related to augmenting reality on a construction site, describes how HD4AR overcomes these challenges, and empirically evaluates the capabilities of HD4AR.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Reynolds, Graham J. "Configurable graphics systems : modelling and specification." Thesis, University of East Anglia, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Donnelly, Ronald Patrick. "Modelling and specification of payload systems." Thesis, University of Southampton, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.261668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Davies, Jim. "Specification and proof in real-time systems." Thesis, University of Oxford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.279830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ebner, Michael. "UML-based Test Specification for Communication Systems." Doctoral thesis, [S.l.] : [s.n.], 2004. http://hdl.handle.net/11858/00-1735-0000-0006-B3B4-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Specification of cyberphysical systems"

1

Voros, Nikolaos S., and Christos P. Antonopoulos, eds. Cyberphysical Systems for Epilepsy and Related Brain Disorders. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20049-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Broy, Manfred, Stephan Merz, and Katharina Spies, eds. Formal Systems Specification. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0024423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

K, Periyasamy, ed. Specification of software systems. 2nd ed. New York: Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alagar, Vangalur S. Specification of software systems. New York: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alagar, V. S. Specification of Software Systems. New York, NY: Springer New York, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alagar, V. S., and K. Periyasamy. Specification of Software Systems. London: Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-277-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alagar, V. S., and K. Periyasamy. Specification of Software Systems. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2920-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Astesiano, Egidio. Algebraic Foundations of Systems Specification. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arends, N. W. A. A systems engineering specification formalism. Eindhoven: Eindhoven University, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

T, Harwood W., and Jackson M. I, eds. The Specification of Complex Systems. Wokingham, England: Addison-Wesley, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Specification of cyberphysical systems"

1

Buenaposada, José M., and Luis Baumela. "Boosting Object Detection in Cyberphysical Systems." In Understanding the Brain Function and Emotions, 309–18. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19591-5_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fortino, Giancarlo, Anna Rovella, Wilma Russo, and Claudio Savaglio. "Including Cyberphysical Smart Objects into Digital Libraries." In Internet and Distributed Computing Systems, 147–58. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11692-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hill, Gillian. "Formal Specification." In Systems: Theory and Practice, 13–32. Vienna: Springer Vienna, 1998. http://dx.doi.org/10.1007/978-3-7091-6451-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mellin, Jonas, and Mikael Berndtsson. "Event Specification." In Encyclopedia of Database Systems, 1389–93. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chomicki, Jan. "Preference Specification." In Encyclopedia of Database Systems, 2787–91. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_80707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mellin, Jonas, and Mikael Berndtsson. "Event Specification." In Encyclopedia of Database Systems, 1059–63. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chomicki, Jan. "Preference Specification." In Encyclopedia of Database Systems, 1–5. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4899-7993-3_80707-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mellin, Jonas, and Mikael Berndtsson. "Event Specification." In Encyclopedia of Database Systems, 1–5. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_505-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alagar, V. S., and K. Periyasamy. "Specification Activities." In Specification of Software Systems, 13–21. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2920-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alagar, V. S., and K. Periyasamy. "Specification Qualities." In Specification of Software Systems, 23–30. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2920-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Specification of cyberphysical systems"

1

"Hybrid Iterative System Specification of Cyberphysical Systems: Neurocognitive Behavior Application." In 2020 Spring Simulation Conference. Society for Modeling and Simulation International (SCS), 2020. http://dx.doi.org/10.22360/springsim.2020.tms.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Althubaity, Areej, Tao Gong, Kim-Kwang Raymond, Mark Nixon, Reda Ammar, and Song Han. "Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks." In 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS). IEEE, 2020. http://dx.doi.org/10.1109/icps48405.2020.9274726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Samad, Tariq. "Infrastructure cyberphysical systems and their users." In 2016 American Control Conference (ACC). IEEE, 2016. http://dx.doi.org/10.1109/acc.2016.7525317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tippenhauer, Nils Ole. "Session details: Session 5A: Cyberphysical Systems." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3285877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Session details: Session 5A: Cyberphysical Systems." In the 2018 ACM SIGSAC Conference, chair Nils Ole Tippenhauer. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3243734.3285877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sirjani, Marjan, Edward A. Lee, and Ehsan Khamespanah. "Model Checking Software in Cyberphysical Systems." In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2020. http://dx.doi.org/10.1109/compsac48688.2020.0-138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fujita, Masahiro. "Simulation-Based Analysis of Cyberphysical Systems." In 2012 15th Euromicro Conference on Digital System Design (DSD). IEEE, 2012. http://dx.doi.org/10.1109/dsd.2012.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saltaformaggio, Brendan. "Session details: Session 1E: Cyberphysical Systems." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3432961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"CyberPhysical Systems for Deformable Object Manipulation." In 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS). IEEE, 2021. http://dx.doi.org/10.1109/icps49255.2021.9468159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ibrahim, Mohamed, and Krishnendu Chakrabarty. "Cyberphysical adaptation in digital-microfluidic biochips." In 2016 IEEE Biomedical Circuits and Systems Conference (BioCAS). IEEE, 2016. http://dx.doi.org/10.1109/biocas.2016.7833827.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Specification of cyberphysical systems"

1

Sweet, Nathan, Timothy P. Bielek, John D. Matthews, Henry John Coakley, and Len Pan. GFF Specification for SAR Systems. Office of Scientific and Technical Information (OSTI), August 2014. http://dx.doi.org/10.2172/1171563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mulvenna, Gerard. IGOSS-industrygovernment open systems specification. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.500-217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khaw, J., ed. Technical specification for vacuum systems. Office of Scientific and Technical Information (OSTI), January 1987. http://dx.doi.org/10.2172/6580012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Andes, Robert C., and William B. Rouse. Specification of Adaptive Aiding Systems. Fort Belvoir, VA: Defense Technical Information Center, March 1992. http://dx.doi.org/10.21236/ada254537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Flater, David. Specification of interactions in integrated manufacturing systems. Gaithersburg, MD: National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.ir.6484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Field, Bruce F., Edward F. Kelley, and R. Michael McCabe. Specification for interoperability between ballistic imaging systems:. Gaithersburg, MD: National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sprock, Timothy, George Thiers, Leon F. McGinnis, and Conrad Bock. Theory of Discrete Event Logistics Systems (DELS) specification. Gaithersburg, MD: National Institute of Standards and Technology, June 2020. http://dx.doi.org/10.6028/nist.ir.8262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Place, Patrick R., William G. Wood, and Mike Tudball. Survey of Formal Specification Techniques for Reactive Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada232045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, WKT. Generic Guide Specification for Geothermal Heat Pump Systems. Office of Scientific and Technical Information (OSTI), April 2000. http://dx.doi.org/10.2172/814081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Edwards, Michael, and Steven L. Howell. A Methodology for Systems Requirements Specification and Traceability for Large Real Time Complex Systems. Fort Belvoir, VA: Defense Technical Information Center, September 1991. http://dx.doi.org/10.21236/ada254738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography