Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare
暂无分享,去创建一个
[1] Deniz Erdogmus,et al. The Future of Human-in-the-Loop Cyber-Physical Systems , 2013, Computer.
[2] Insup Lee,et al. Opportunities and Obligations for Physical Computing Systems , 2005, Computer.
[3] Yuska P. C. Aguiar,et al. Refining a User Behaviour Model Based on the Observation of Emotional States , 2011 .
[4] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[5] Katherine M. Tsui,et al. “I want that”: Human-in-the-loop control of a wheelchair-mounted robotic arm , 2011 .
[6] Stefan Saroiu,et al. An Operating System for the Home , 2012, NSDI.
[7] Sirajum Munir,et al. EyePhy: Detecting Dependencies in Cyber-Physical System Apps due to Human-in-the-Loop , 2015, EAI Endorsed Trans. e Learn..
[8] John A. Stankovic,et al. Context-aware wireless sensor networks for assisted living and residential monitoring , 2008, IEEE Network.
[9] John A. Stankovic,et al. Empath: a continuous remote emotional health monitoring system for depressive illness , 2011, Wireless Health.
[10] Xinyu Song,et al. Modeling Impulsive Injections of Insulin: Towards Artificial Pancreas , 2012, SIAM J. Appl. Math..
[11] Michel C. A. Klein,et al. An Intelligent Coaching System for Therapy Adherence , 2013, IEEE Pervasive Computing.
[12] Enamul Hoque,et al. Holmes: A Comprehensive Anomaly Detection System for Daily In-home Activities , 2015, 2015 International Conference on Distributed Computing in Sensor Systems.
[13] Tarek F. Abdelzaher,et al. On real-time capacity limits of multihop wireless sensor networks , 2004, 25th IEEE International Real-Time Systems Symposium.
[14] John A. Stankovic,et al. When Sensor and Actuator Networks Cover the World , 2008 .
[15] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[16] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[17] Sang Hyuk Son,et al. Run time assurance of application-level requirements in wireless sensor networks , 2010, IPSN '10.
[18] J. Deng,et al. Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[19] Antonio Alfredo Ferreira Loureiro,et al. MANNA: a management architecture for wireless sensor networks , 2003, IEEE Commun. Mag..
[20] Sirajum Munir,et al. DepSys: Dependency aware integration of cyber-physical systems for smart homes , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[21] Sunny Consolvo,et al. Lullaby: a capture & access system for understanding the sleep environment , 2012, UbiComp.
[22] Sirajum Munir,et al. Cyber Physical System Challenges for Human-in-the-Loop Control , 2013, Feedback Computing.
[23] Hassan El Makssoud,et al. Towards a Co-contraction Muscle Control Strategy For Paraplegics , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[24] Hari Balakrishnan,et al. Memento: A Health Monitoring System for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.