Cyber-Physical Systems: Imminent Challenges
暂无分享,去创建一个
[1] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[2] Richard Fikes,et al. STRIPS: A New Approach to the Application of Theorem Proving to Problem Solving , 1971, IJCAI.
[3] C. Marchetti,et al. Society as a Learning System : Discovery, Invention, and Innovation Cycles Revisited : Technological Forecasting and Social Change , 1980 .
[4] B. Latour. Science in action : how to follow scientists and engineers through society , 1989 .
[5] A. Kleinknecht. Are There Schumpeterian Waves of Innovations , 1990 .
[6] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[7] Nancy G. Leveson,et al. Safeware: System Safety and Computers , 1995 .
[8] Jon Damon Reese,et al. Analyzing Software Specifications for Mode Confusion Potential , 1998 .
[9] Ian Sommerville,et al. Requirements Engineering: Processes and Techniques , 1998 .
[10] Michael A. Cusumano,et al. Thinking Beyond Lean: How Multi Project Management is Transforming Product Development at Toyota and Other Companies , 1998 .
[11] R. Bell,et al. IEC 61508: functional safety of electrical/electronic/ programme electronic safety-related systems: overview , 1999 .
[12] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[13] Gerhard Weiss,et al. Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .
[14] B. Verspagen,et al. Breaking the waves: a Poisson regression approach to Schumpeterian clustering of basic innovations. , 2000 .
[15] Stefan Bussmann,et al. Self-organizing manufacturing control: an industrial application of agent technology , 2000, Proceedings Fourth International Conference on MultiAgent Systems.
[16] Michael Wooldridge,et al. Introduction to multiagent systems , 2001 .
[17] Andrew P. Sage,et al. On the Systems Engineering and Management of Systems of Systems and Federations of Systems , 2001, Inf. Knowl. Syst. Manag..
[18] Stefan Bussmann,et al. Einführung der Agententechnologie in einem produzierenden Unternehmen — ein Erfahrungsbericht , 2001, Wirtsch..
[19] Werner Rammert,et al. Technik und Handeln - wenn soziales Handeln sich auf menschliches Verhalten und technische Artefakte verteilt , 2002 .
[20] Lui Sha,et al. Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.
[21] Mica R. Endsley,et al. Designing for Situation Awareness : An Approach to User-Centered Design , 2003 .
[22] Fahiem Bacchus,et al. Reasoning with Conditional Plans in the Presence of Incomplete Knowledge , 2003 .
[23] Werner Rammert. Technik in Aktion: verteiltes Handeln in soziotechnischen Konstellationen. , 2003 .
[24] M. Hönig. Total vernetzt - Szenarien einer informatisierten Welt , 2003 .
[25] Martin J. Osborne,et al. An Introduction to Game Theory , 2003 .
[26] Siani Pearson,et al. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[27] Yannis Kalfoglou,et al. Ontology mapping: the state of the art , 2003, The Knowledge Engineering Review.
[28] M. Kettner,et al. Vernetzt gespalten: Der Digital Divide in ethischer Perspektive , 2004 .
[29] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[30] Klaus Pohl,et al. Software Product Line Engineering , 2005 .
[31] Thomas Malsch,et al. Socionics - Scalability of Complex Social Systems , 2005, Socionics.
[32] Klaus Pohl,et al. Software Product Line Engineering - Foundations, Principles, and Techniques , 2005 .
[33] Vincent Hilaire,et al. Applications of Self-Organising Multi-Agent Systems: An Initial Framework for Comparison , 2006, Informatica.
[34] Christopher G Chute,et al. National Center for Biomedical Ontology: advancing biomedicine through structured organization of scientific knowledge. , 2006, Omics : a journal of integrative biology.
[35] Johannes Weyer. Die Zukunft des Autos - das Auto der Zukunft: Wird der Computer den Menschen ersetzen? , 2006 .
[36] László Monostori,et al. Agent-based systems for manufacturing , 2006 .
[37] Christopher W. Geib,et al. Object Action Complexes as an Interface for Planning and Robot Control , 2006 .
[38] Mike Bond,et al. Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.
[39] R. Garside,et al. Integrating modular avionics: A new role emerges , 2007, IEEE Aerospace and Electronic Systems Magazine.
[40] Ulrich Dolata,et al. Gesellschaft und die Macht der Technik: Sozioökonomischer und institutioneller Wandel durch Technisierung , 2007 .
[41] Peter Schaar. Das Ende der Privatsphäre - Der Weg in die Überwachungsgesellschaft , 2007 .
[42] Bianca Scholten,et al. The Hitchhiker's Guide to Manufacturing Operations Management: ISA-95 Best Practices Book 1.0 , 2007 .
[43] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[44] Manfred Broy,et al. Ein Requirements-Engineering-Referenzmodell , 2007, Informatik-Spektrum.
[45] Bernhard Schätz,et al. Modellbasierte Anforderungsanalyse mit AutoRAID , 2007, Informatik - Forschung und Entwicklung.
[46] Thomas Malsch,et al. Socionics: Sociological Concepts for Social Systems of Artificial (and Human) Agents , 2007, J. Artif. Soc. Soc. Simul..
[47] Eva Geisberger,et al. Requirements Engineering Reference Model (REM) , 2007, Softwaretechnik-Trends.
[48] Jan M. Rabaey. A brand new wireless day , 2008, 2008 Asia and South Pacific Design Automation Conference.
[49] Kranthimanoj Nagothu,et al. Applications and prototype for system of systems swarm robotics , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.
[50] Dietmar Pfahl,et al. Making Globally Distributed Software Development a Success Story, International Conference on Software Process, ICSP 2008, Leipzig, Germany, May 10-11, 2008, Proceedings , 2008, ICSP.
[51] Juan Li,et al. Requirement-Centric Traceability for Change Impact Analysis: A Case Study , 2008, ICSP.
[52] Andreas Pfitzmann,et al. Datenschutz-Schutzziele — revisited , 2009, Datenschutz und Datensicherheit - DuD.
[53] Didar Zowghi,et al. Towards a Classification of Requirements Relationships , 2009, SEKE.
[54] John A. Stankovic,et al. Security of Distributed, Ubiquitous, and Embedded Computing Platforms , 2009 .
[55] Matthias Damm,et al. OPC Unified Architecture , 2009, Autom..
[56] K. Beetz,et al. Nationale Roadmap Embedded Systems , 2010 .
[57] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[58] Christian Thiel,et al. Multiple Classifier Systems Incorporating Uncertainty , 2011 .
[59] Peter Schaar,et al. Privacy by Design , 2010 .
[60] Michael Weber,et al. Towards Territorial Privacy in Smart Environments , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.
[61] Olaf Sauer,et al. Interoperabilität von Manufacturing Execution Systems (MES) , 2011, Autom..
[62] Fariba Sadri,et al. Logic-Based Approaches to Intention Recognition , 2011 .
[63] Wolfgang Mahnke,et al. OPC Unified Architecture , 2009, Autom..
[64] G. Schuh,et al. Integrative Produktionstechnik für Hochlohnländer , 2011 .
[65] Margaret Martonosi,et al. SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory , 2011, MobiSys '11.
[66] Jun-Da Huang. Kinerehab: a kinect-based system for physical rehabilitation: a pilot study for young adults with motor disabilities , 2011, ASSETS '11.
[67] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[68] Marjorie Skubic,et al. Evaluation of an inexpensive depth camera for passive in-home fall risk assessment , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[69] Martin Rost,et al. Privacy By Design und die Neuen Schutzziele , 2011, Datenschutz und Datensicherheit - DuD.
[70] Wolfgang Wahlster,et al. Internet der Dienste , 2011 .
[71] Kai Rannenberg,et al. Privacy and Identity Management for Life , 2011, Privacy and Identity Management for Life.
[72] Marit Hansen,et al. Cyber-Physical Systems und Privatsphärenschutz , 2012, Datenschutz und Datensicherheit - DuD.
[73] Michael A. Cusumano,et al. Staying power : six enduring principles for managing strategy and innovation in an uncertain world (lessons from Microsoft, Apple, Intel, Google, Toyota and more) , 2012 .