暂无分享,去创建一个
[1] Christine Julien,et al. Efficient and Scalable Runtime Monitoring for Cyber–Physical System , 2018, IEEE Systems Journal.
[2] Jesse James Garrett. The Elements of User Experience: User-Centered Design for the Web , 2002 .
[3] Christine Julien,et al. BraceAssertion: Runtime Verification of Cyber-Physical Systems , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[4] Xiao Liu,et al. SmartVM: a SLA-aware microservice deployment framework , 2018, World Wide Web.
[5] Xiao Liu,et al. SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).
[6] Xi Zheng,et al. A survey on security issues in services communication of Microservices‐enabled fog applications , 2019, Concurr. Comput. Pract. Exp..
[7] Xiao Liu,et al. BigVM: A Multi-Layer-Microservice-Based Platform for Deploying SaaS , 2017, 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD).
[8] Xi Zheng. Physically informed assertions for cyber physical systems development and debugging , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[9] Joseph Giacomin,et al. What Is Human Centred Design? , 2014 .
[10] Xi Zheng,et al. Security analysis of modern mission critical android mobile applications , 2017, ACSW.
[11] Sungwon Kang,et al. A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.
[12] Regan L. Mandryk,et al. Using psychophysiological techniques to measure user experience with entertainment technologies , 2006, Behav. Inf. Technol..
[13] Marc Hassenzahl,et al. User experience - a research agenda , 2006, Behav. Inf. Technol..
[14] G. Boy. Introduction to Human-Machine Interaction : A Human-Centered Design Approach , 2010 .
[15] Lynn Batten,et al. Cyber security attacks to modern vehicular systems , 2017, J. Inf. Secur. Appl..