Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems
暂无分享,去创建一个
[1] Bernhard Sick,et al. Learning from others: Exchange of classification rules in intelligent distributed systems , 2012, Artif. Intell..
[2] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[3] L. Beineke,et al. Topics in Structural Graph Theory , 2013 .
[4] Claudia Eckert,et al. Security Issues of Multi-Core Architectures — The Automotive Case , 2013, it Inf. Technol..
[5] Ingmar Baumgart,et al. S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.
[6] Jürgen Becker,et al. Hardware Support for Authentication in Cyber Physical Systems , 2013, it Inf. Technol..
[7] Manfred Broy,et al. Cyber-Physical Systems: Imminent Challenges , 2012, Monterey Workshop.
[8] Edward A. Lee. Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .
[9] Ingolf Krüger,et al. Rich Services — A SOA Pattern for Dynamic Change in Cyber-physical Systems , 2013, it Inf. Technol..
[10] Ralf Steinmetz,et al. Towards Benchmarking of Structured Peer-to-Peer Overlays for Network Virtual Environments , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.
[11] Andrew V. Goldberg,et al. On Implementing Push-Relabel Method for the Maximum Flow Problem , 1995, IPCO.
[12] T. C. Hu,et al. Multi-Terminal Network Flows , 1961 .
[13] Cristian S. Calude,et al. Discrete Mathematics and Theoretical Computer Science , 2003, Lecture Notes in Computer Science.
[14] Xin Yao,et al. CamSim: A Distributed Smart Camera Network Simulator , 2013, 2013 IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops.
[15] Jörg Hähner,et al. A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques , 2013, ARCS Workshops.
[16] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[17] Márk Jelasity,et al. PeerSim: A scalable P2P simulator , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[18] Arno Wacker,et al. Evaluating Connection Resilience for Self-Organized Distributed Cyber-Physical Systems , 2016, ArXiv.
[19] Tim Moors,et al. Survey of research towards robust peer-to-peer networks: Search methods , 2006, Comput. Networks.
[20] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[21] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[22] Dan S. Wallach,et al. An Analysis of BitTorrent’s Two Kademlia-Based DHTs , 2007 .
[23] Jörg Hähner,et al. Observation and Control of Organic Systems , 2011, Organic Computing.
[24] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[25] K. Menger. Zur allgemeinen Kurventheorie , 1927 .
[26] Shimon Even,et al. An Algorithm for Determining Whether the Connectivity of a Graph is at Least k , 1973, SIAM J. Comput..
[27] Bernhard Sick,et al. Multi-k-Resilience in Distributed Adaptive Cyber-Physical Systems , 2016 .
[28] David A. Bader,et al. Graph Algorithms , 2011, Encyclopedia of Parallel Computing.
[29] Raúl Jiménez,et al. Connectivity properties of Mainline BitTorrent DHT nodes , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[30] Hani Salah,et al. Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.
[31] Stefanie Roos,et al. Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulations , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).