Cybermatics: A Holistic Field for Systematic Study of Cyber-Enabled New Worlds
暂无分享,去创建一个
Jianhua Ma | Jinjun Chen | Laurence T. Yang | Geyong Min | Runhe Huang | Huansheng Ning | Hong Liu | Jinjun Chen | G. Min | L. Yang | Hong Liu | Huansheng Ning | Jianhua Ma | Runhe Huang
[1] Donatella Sciuto. VHDL( VHSIC Hardware Description Language) , 1996, J. Syst. Archit..
[2] Adam Kowaltzke,et al. Media : new ways and meanings , 2008 .
[3] Dominique Genoud,et al. Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions and Opportunities , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[4] Jianhua Ma,et al. Wear-I: A New Paradigm in Wearable Computing (Invited Paper) , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[5] Joseph J. Beaman,et al. Physics and Cyber-Enabled Manufacturing Process Control , 2008 .
[6] Ma Jianhua,et al. Smart u-Things - Challenging Real World Complexity , 2005 .
[7] M. Weiser,et al. THE COMING AGE OF CALM TECHNOLOGY[1] , 1996 .
[8] Ram D. Sriram,et al. A Vision of Cyber-Physical Cloud Computing for Smart Networked Systems , 2013 .
[9] Robert M. Glorioso,et al. Engineering Cybernetics , 1975 .
[10] Cyberpatterns, Unifying Design Patterns with Security and Attack Patterns , 2014 .
[11] Roger Lipsett,et al. VHSIC Hardware Description Language , 1985, Computer.
[12] Jianhua Ma,et al. Cyber-I: Vision of the Individual's Counterpart on Cyberspace , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[13] Amitai Etzioni,et al. Privacy in a Cyber Age , 2015 .
[14] Kevin Lano,et al. Design Patterns: Applications and Open Issues , 2014, Cyberpatterns.
[15] Philippe A. Rossignol,et al. Information Assurance Cyber Ecology , 2003 .
[16] Norbert Wiener,et al. Cybernetics, Second Edition: or the Control and Communication in the Animal and the Machine , 1965 .
[17] Jianhua Ma,et al. Cyber-Individual Meets Brain Informatics , 2011, IEEE Intelligent Systems.
[18] Wayne H. Wolf,et al. Cyber-physical Systems , 2009, Computer.
[19] Arthur Saniotis,et al. Future Brains: An Exploration of Human Evolution in the 21st Century and beyond , 2009 .
[20] Carlos Busso,et al. Smart room: participant and speaker localization and identification , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[21] Dewar D Finlay. Smart environments: technology to support healthcare. , 2009, Technology and health care : official journal of the European Society for Engineering and Medicine.
[22] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[23] Reiner W. Hartenstein. Hardware Description Languages , 1987 .
[24] Jianhua Ma,et al. Digital Explosions and Digital Clones , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).
[25] Philip K. Thornton,et al. Sustainable Intensification: What Is Its Role in Climate Smart Agriculture? , 2014 .
[26] Jianhua Ma. Spacelog Concept and Issues for Novel u-Services in Smart Spaces , 2008, 2008 Second International Conference on Future Generation Communication and Networking Symposia.
[27] C. Martin. 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.
[28] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[29] Jianhua Ma,et al. Towards a smart world and ubiquitous intelligence: A walkthrough from smart things to smart hyperspaces and UbicKids , 2005, Int. J. Pervasive Comput. Commun..
[30] Liang Thow-Yick,et al. The basic entity model: a fundamental theoretical model of information and information processing , 1994 .
[31] Tosiyasu L. Kunii. The Potentials of Cyberworlds -An Axiomatic Approach- , 2004, CW.
[32] Peter P. Chen,et al. Entity-Relationship Modeling : Historical Events , Future Trends , and Lessons Learned , 2002 .
[33] Jianhua Ma,et al. Ubisafe Computing: Vision and Challenges (I) , 2006, ATC.
[34] Desmond Ball,et al. Cyber Defence and Warfare , 2013 .
[35] Giuseppe Riva,et al. Towards CyberPsychology: Mind, Cognition and Society in the Internet Age. , 2001 .
[36] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[37] J.P. Hayes,et al. Engineering cybernetics , 1976, Proceedings of the IEEE.
[38] F. H. Adler. Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .
[39] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[40] Norbert Wiener,et al. Cybernetics. , 1948, Scientific American.
[41] Diane J. Cook,et al. Smart environments - technology, protocols and applications , 2004 .
[42] Kazutoshi Sumiya,et al. Exploring Reflection of Urban Society through Cyber-Physical Crowd Behavior on Location-Based Social Network , 2012, DASFAA Workshops.
[43] Christophe Le Gal,et al. Smart Office: Design of an Intelligent Environment , 2001, IEEE Intell. Syst..
[44] Jianhua Ma,et al. Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology , 2016, Future Gener. Comput. Syst..
[45] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[46] Ii James P. Howard. Data-Driven Modeling & Scientific Computation: Methods for Complex Systems & Big Data , 2015 .