


default search action
ACM Transactions on Cyber-Physical Systems, Volume 2
Volume 2, Number 1, February 2018
- Eduardo Tovar

, Sonia Martínez:
Introduction to the Selected Papers from ICCPS 2016. - Alessandro Biondi

, Marco Di Natale, Giorgio C. Buttazzo, Paolo Pazzaglia
:
Selecting the Transition Speeds of Engine Control Tasks to Optimize the Performance. 1:1-1:26 - Usman Ali

, Magnus Egerstedt:
Hybrid Optimal Control under Mode Switching Constraints with Applications to Pesticide Scheduling. 2:1-2:17 - Sujit Rokka Chhetri

, Arquimedes Canedo, Mohammad Abdullah Al Faruque
:
Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems. 3:1-3:25 - Achin Jain

, Francesco Smarra
, Madhur Behl, Rahul Mangharam:
Data-Driven Model Predictive Control with Regression Trees - An Application to Building Energy Management. 4:1-4:21 - Yasser Shoukry

, Michelle Chong
, Masashi Wakaiki, Pierluigi Nuzzo, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, João Pedro Hespanha, Paulo Tabuada
:
SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks. 5:1-5:27 - Walid Krichene, Mohamed Chedhli Bourguiba, Kiet Lam, Alexandre M. Bayen:

On Learning How Players Learn: Estimation of Learning Dynamics in the Routing Game. 6:1-6:23
Volume 2, Number 2, June 2018
- Wei Zhao

, Tarek F. Abdelzaher:
Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems. 7:1-7:2 - Roy Dong, Lillian J. Ratliff

, Alvaro A. Cárdenas
, Henrik Ohlsson, S. Shankar Sastry:
Quantifying the Utility-Privacy Tradeoff in the Internet of Things. 8:1-8:28 - Sze Zheng Yong, Minghui Zhu, Emilio Frazzoli:

Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems: Modeling, Resilient Estimation, and Attack Mitigation. 9:1-9:2 - Qiang Wu

, T. John Koo, Yoshihiko Susuki
:
Dynamic Security Analysis of Power Systems by a Sampling-Based Algorithm. 10:1-10:26 - Guanjun Liu

, Changjun Jiang, Mengchu Zhou:
Time-Soundness of Time Petri Nets Modelling Time-Critical Systems. 11:1-11:27 - Gerry Siegemund, Volker Turau:

A Self-Stabilizing Publish/Subscribe Middleware for IoT Applications. 12:1-12:26 - Alessandro Antonio Nacci, Vincenzo Rana, Bharathan Balaji, Paola Spoletini, Rajesh K. Gupta

, Donatella Sciuto, Yuvraj Agarwal:
BuildingRules: A Trigger-Action-Based System to Manage Complex Commercial Buildings. 13:1-13:22 - Ping Wang, Meng Ma

, Chao-Hsien Chu:
Long-Term Event Processing over Data Streams in Cyber-Physical Systems. 14:1-14:23
Volume 2, Number 3, July 2018
- Wei Zhao

, Tarek F. Abdelzaher:
Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems (Part II). 15:1-15:2 - Subhav Pradhan, Abhishek Dubey

, Shweta Khare, Saideep Nannapaneni, Aniruddha S. Gokhale
, Sankaran Mahadevan, Douglas C. Schmidt, Martin Lehofer:
CHARIOT: Goal-Driven Orchestration Middleware for Resilient IoT Systems. 16:1-16:37 - Farzad Samie

, Vasileios Tsoutsouras, Lars Bauer, Sotirios Xydis, Dimitrios Soudris, Jörg Henkel:
Distributed Trade-Based Edge Device Management in Multi-Gateway IoT. 17:1-17:25 - Jinwei Liu, Haiying Shen, Husnu S. Narman

, Wingyan Chung, Zongfang Lin:
A Survey of Mobile Crowdsensing Techniques: A Critical Component for The Internet of Things. 18:1-18:26 - Paul Martin, Andrew Symington, Mani B. Srivastava

:
SLATS: Simultaneous Localization and Time Synchronization. 19:1-19:25 - Qianyi Huang, Yan Mei, Wei Wang, Qian Zhang:

Toward Battery-Free Wearable Devices: The Synergy between Two Feet. 20:1-20:18 - Amel Bennaceur

, Thein Than Tun, Arosha K. Bandara
, Yijun Yu
, Bashar Nuseibeh
:
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. 21:1-21:25 - Lei Bu

, Wen Xiong, Chieh-Jan Mike Liang, Shi Han, Dongmei Zhang, Shan Lin, Xuandong Li:
Systematically Ensuring the Confidence of Real-Time Home Automation IoT Systems. 22:1-22:23
Volume 2, Number 4, September 2018
- Luan Viet Nguyen

, Khaza Anuarul Hoque
, Stanley Bak, Steven Drager, Taylor T. Johnson
:
Cyber-Physical Specification Mismatches. 23:1-23:26 - Rajrup Ghosh

, Yogesh Simmhan
:
Distributed Scheduling of Event Analytics across Edge and Cloud. 24:1-24:28 - Mischa Schmidt, Anett Schülke, Alberto Venturi, Roman Kurpatov, Enrique Blanco Henriquez:

Cyber-Physical System for Energy-Efficient Stadium Operation: Methodology and Experimental Validation. 25:1-25:26 - Wanli Chang

, Dip Goswami, Samarjit Chakraborty
, Arne Hamann:
OS-Aware Automotive Controller Design Using Non-Uniform Sampling. 26:1-26:22 - Xiaofeng Wang, Naira Hovakimyan, Lui Sha

:
RSimplex: A Robust Control Architecture for Cyber And Physical Failures. 27:1-27:26 - Subhash Lakshminarayana

, Zhan-Teng Teo, Rui Tan, David K. Y. Yau:
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems. 28:1-28:29
- Insup Lee, Miroslav Pajic:

Guest Editorial: Special Issue on Medical Cyber-Physical Systems. 29:1-29:2 - Pasquale Buonocunto, Andrea Giantomassi, Mauro Marinoni

, Davide Calvaresi
, Giorgio C. Buttazzo:
A Limb Tracking Platform for Tele-Rehabilitation. 30:1-30:23 - Daniela De Venuto, Valerio F. Annese

, Giovanni Mezzina, Floriano Scioscia
, Michele Ruta, Eugenio Di Sciascio, Alberto L. Sangiovanni-Vincentelli:
A Mobile Health System for Neurocognitive Impairment Evaluation Based on P300 Detection. 31:1-31:21 - Eugene Yip

, Sidharta Andalam, Partha S. Roop, Avinash Malik, Mark L. Trew, Weiwei Ai, Nitish D. Patel:
Towards the Emulation of the Cardiac Conduction System for Pacemaker Validation. 32:1-32:26 - Nicola Paoletti

, Andrea Patanè, Marta Kwiatkowska:
Closed-Loop Quantitative Verification of Rate-Adaptive Pacemakers. 33:1-33:31 - Guillaume Joerger, Juliette Rambourg, Hélène Gaspard-Boulinc, Stéphane Conversy, Barbara Bass, Brian Dunkin, Marc Garbey:

A Cyber-Physical System to Improve the Management of a Large Suite of Operating Rooms. 34:1-34:24 - Andre A. Geraldes, Luca Geretti, Davide Bresolin

, Riccardo Muradore
, Paolo Fiorini, Leonardo S. Mattos, Tiziano Villa:
Formal Verification of Medical CPS: A Laser Incision Case Study. 35:1-35:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














