Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system
暂无分享,去创建一个
[1] Yu Hen Hu,et al. Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks , 2005, IEEE Transactions on Signal Processing.
[2] Dan Wang,et al. Tracking with Unreliable Node Sequences , 2009, IEEE INFOCOM 2009.
[3] Pramod K. Varshney,et al. Tracking in Wireless Sensor Networks Using Particle Filtering: Physical Layer Considerations , 2009, IEEE Transactions on Signal Processing.
[4] Jiming Chen,et al. Smart community: an internet of things application , 2011, IEEE Communications Magazine.
[5] Wen-Chih Peng,et al. CarWeb: A Traffic Data Collection Platform , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[6] Yu-Chee Tseng,et al. Efficient in-network moving object tracking in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.
[7] Yu Zheng,et al. Computing with Spatial Trajectories , 2011, Computing with Spatial Trajectories.
[8] Reformatting Fighter Tactics , .
[9] Inseok Hwang,et al. Multiple-target tracking and identity management in clutter, with application to aircraft tracking , 2004, Proceedings of the 2004 American Control Conference.
[10] Wayne H. Wolf,et al. Cyber-physical Systems , 2009, Computer.
[11] Vinayak S. Naik,et al. A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.
[12] Helen Gill,et al. Cyber-Physical Systems , 2019, 2019 IEEE International Conference on Mechatronics (ICM).
[13] Ilya V. Kolmanovsky,et al. Predictive energy management of a power-split hybrid electric vehicle , 2009, 2009 American Control Conference.
[14] S. Shankar Sastry,et al. Markov Chain Monte Carlo Data Association for Multi-Target Tracking , 2009, IEEE Transactions on Automatic Control.
[15] Sangkyum Kim,et al. Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.
[16] Thomas F. La Porta,et al. IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems , 2012, SDM.
[17] David E. Culler,et al. Lessons from a Sensor Network Expedition , 2004, EWSN.
[18] Wei Hong,et al. A macroscope in the redwoods , 2005, SenSys '05.
[19] Jae-Gil Lee,et al. MoveMine: Mining moving object data for discovery of animal movement patterns , 2011, TIST.