Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 523-528.doi: 10.11896/j.issn.1002-137X.2016.11A.118
Previous Articles Next Articles
ZHU Zhen-yu, ZHANG Shi, JIANG Jian-min, WU Ya-zhou and YANG Qi-fan
[1] Wing J,et al.Cyber-Physical Systems Summit summary report[R].the April 2008 CPS Summit,St.Louis,MO,2008 [2] Alur R,Courcoubetis C,et al.The algorithmic analysis of hybrid systems[J].Theoretical Computer Science,1995,138:3-34 [3] Bliudze S,Sifakis J.The algebra of connectors:structuring interaction in BIP[C]∥EMSOFT.ACM,2007:11-20 [4] Eidson J C,Lee E A,Matic S,et al.Distributed Real-Time Software for Cyber-Physical Systems[J].Proceedings of the IEEE,2012,100(1):45-59 [5] Jiang J,Zhang S,et al.Configuring business process models[J].ACM SIGSOFT Software Engineering Notes,2013,38(4):1-10 [6] Jiang J,Zhu H,et al.Configuration of Services based on Virtualization[C]∥TASE.2014:178-184 [7] Tan Y,Vuran M C,Goddard S,et al.A concept lattice-based event model for cyber-physical systems[C]∥ICCPS.2010:50-60 [8] Talcott C.Cyber-Physical Systems and Events[M].Software-Intensive Systems and New Computing Paradigms.Berlin,Heidelberg:Springer-Verlag,2008:101-115 [9] Bornot S,Ga G,Sifakis G J.On the construction of live timed systems[M].Graf S,Schwartzbach M.eds.,2000:109-126 [10] Altisen K,Gssler G,Sifakis J.Scheduler modeling based on the controller synthesis paradigm[J].Journal of Real-Time Systems,Special Issue on Control Theoretical Approaches to Real-time Computing,2002,23(1/2):55-84 [11] Zhang F,Szwaykowska K,Wolf W,et al.Task scheduling for control oriented requirements for cyber physical systems[C]∥Real-Time Systems Symposium.2008:47-56 [12] Li Q.Scheduling in Cyber-Physical Systems[J].Dissertations,2012:91 [13] Li Q,Negi R.Maximal scheduling in wireless ad hoc networks with hypergraph interference models[J].IEEE Transactions on Vehicular Technology,2012,61(1):297-310 [14] Tang Q,Gupta S K S,Varsamopoulos G.A Unified Methodology for Scheduling in Distributed Cyber-Physical Systems.ACM Trans[J].Embedded Comput.Syst.,2012,11(S2):57 [15] Hennessy M,Lin H.Symbolic Bisimulations[J].Theor.Comput.Sci.,1995,138(2):353-389 [16] Jiang J,Zhang S,et al.Modeling and analyzing mixed communications in service-oriented trustworthy software[J].Science China Information Science,2012,55(12):2738-2756 [17] Lanese I,Bedogni L,Di Felice M.Internet of things:a process calculus approach[J].SAC,2013:1339-1346 [18] Winskel G,Nielsen M.Models for Concurrency,Handbook ofLogic in Computer Science,Semantic Modelling[J].Oxford Science Publications,Oxford,1995,4:1-148 [19] Jiang J,Zhang S,et al.Configuring business process models[J].ACM SIGSOFT Software Engineering Notes,2013,38(4):1-10 [20] Jiang J,Zhang S,et al.Message Dependency-Based Adaptation of Services[J].APSCC,2011:442-449 [21] Finkel A,Leroux J.Recent and simple algorithms for Petri nets[J].Software & Systems Modeling,2015,4(2):719-7251 [22] Folschette M,Paulevé L,Magnin M,et al.Sufficient Conditions for Reachability in Automata Networks with Priorities[J].Theoretical Computer Science,2015,608:66-83 |
No related articles found! |
|