Open Cyber-Architecture for electrical energy markets
暂无分享,去创建一个
Kostas E. Bekris | Frederick C. Harris | Murat Yuksel | M. Sami Fadali | Mehmet Hadi Gunes | Cansin Yaman Evrenosoglu | Mehdi Etezadi-Amoli | M. H. Gunes | M. Yuksel | M. Fadali | C. Evrenosoglu | M. Etezadi-Amoli | F. Harris
[1] Birgit Pfitzmann,et al. The PERSEUS System Architecture , 2001 .
[2] Jean-Pierre Seifert,et al. Model-based behavioral attestation , 2008, SACMAT '08.
[3] M. Jamshidi. Large-Scale Systems: Modeling, Control and Fuzzy Logic , 1996 .
[4] Michio Sugeno,et al. On stability of fuzzy systems expressed by fuzzy rules with singleton consequents , 1999, IEEE Trans. Fuzzy Syst..
[5] J. D. Guy. Security Constrained Unit Commitment , 1971 .
[6] J. Carpentier,et al. Optimal Power Flows , 1979, VSC-FACTS-HVDC.
[7] Christer Carlsson,et al. Optimization under fuzzy linguistic rule constraints , 1999 .
[8] Dragoslav D. Šiljak,et al. Decentralized control of complex systems , 2012 .
[9] Anjan Bose,et al. Input-output Processing Of On-line Contingency Analysis , 1979 .
[10] O. Alsac,et al. Optimal Load Flow with Steady-State Security , 1974 .
[11] Li-Xin Wang,et al. A Course In Fuzzy Systems and Control , 1996 .
[12] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[13] Petros G. Voulgaris,et al. A convex characterization of distributed control problems in spatially invariant systems with communication constraints , 2005, Syst. Control. Lett..
[14] Ward Whitt,et al. Value‐Based Routing and Preference‐Based Routing in Customer Contact Centers , 2007 .
[15] Francesco Borrelli,et al. Distributed LQR Design for Identical Dynamically Decoupled Systems , 2008, IEEE Transactions on Automatic Control.
[16] A. Gomez Exposito,et al. Distributed contingency analysis: practical issues , 1999 .
[17] Eduardo N. Asada,et al. Critical evaluation of direct and iterative methods for solving Ax=b systems in power flow calculations and contingency analysis , 1999 .
[18] O. Alsaç,et al. Generalized state estimation , 1998 .
[19] Balho H. Kim,et al. A fast distributed implementation of optimal power flow , 1999 .
[20] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[21] M H Gunes,et al. Blind processing: Securing data against system administrators , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.
[22] Pramod K. Varshney,et al. Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.
[23] M. Sami Fadali,et al. Stability Analysis of Discrete TSK Type II/III Systems , 2006, IEEE Transactions on Fuzzy Systems.
[24] Michael Margaliot,et al. New Approaches to Fuzzy Modeling and Control - Design and Analysis , 2000, Series in Machine Perception and Artificial Intelligence.
[25] Mary Baker,et al. Peer-to-Peer Caching Schemes to Address Flash Crowds , 2002, IPTPS.
[26] M. Sami Fadali,et al. TSK fuzzy systems types II and III stability analysis: continuous case , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[27] D. M. Goldschlag,et al. Security issues in networks with Internet access , 1997 .
[28] Nicholas R. Jennings,et al. Prioritised fuzzy constraint satisfaction problems: axioms, instantiation and validation , 2003, Fuzzy Sets Syst..