暂无分享,去创建一个
[1] Alberto L. Sangiovanni-Vincentelli,et al. Security-aware mapping for CAN-based real-time distributed automotive systems , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[2] Bowen Zheng,et al. Delay-Aware Design, Analysis and Verification of Intelligent Intersection Management , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).
[3] Frank Allgöwer,et al. Stabilization of networked control systems with weakly hard real-time dropout description , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[4] Peng Deng,et al. A model-based synthesis flow for automotive CPS , 2015, ICCPS.
[5] Fumin Zhang,et al. Task Scheduling for Control Oriented Requirements for Cyber-Physical Systems , 2008, 2008 Real-Time Systems Symposium.
[6] Jong-Chan Kim,et al. Control-Scheduling Codesign Exploiting Trade-Off between Task Periods and Deadlines , 2016, Mob. Inf. Syst..
[7] Alberto L. Sangiovanni-Vincentelli,et al. Security-aware mapping for TDMA-based real-time distributed systems , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[8] Wenchao Li,et al. Formal verification of weakly-hard systems , 2019, HSCC.
[9] Peng Deng,et al. Cross-Layer Codesign for Secure Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[10] Thomas A. Henzinger,et al. Giotto: a time-triggered language for embedded programming , 2001, Proc. IEEE.
[11] Christoph M. Kirsch,et al. Giotto: a time-triggered language for embedded programming , 2003 .
[12] Peng Deng,et al. Design and verification for transportation system security , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[13] Marco Di Natale,et al. Beyond the Weakly Hard Model: Measuring the Performance Cost of Deadline Misses , 2018, ECRTS.
[14] Alan Burns,et al. Weakly Hard Real-Time Systems , 2001, IEEE Trans. Computers.