{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:52:19Z","timestamp":1769273539647,"version":"3.49.0"},"reference-count":75,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,12,25]],"date-time":"2019-12-25T00:00:00Z","timestamp":1577232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["LHT"],"published-print":{"date-parts":[[2019,12,25]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to review the current research on theoretical foundations and applications for CPS from 2017 to 2019 including the applications in library.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This paper is designed in six parts as Introduction, Literature review, Theoretical foundations of CPS, Applications of CPS, CPS\u2019s application in library and Conclusion. The authors review 70 papers and classify them as the above six parts. The authors collected 70 papers from 2017 to 2019 in the academic databases.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This paper reviews 70 papers regarding theoretical foundations and applications for CPS from 2017 to 2019 in the academic databases aiming to provide scholars and practitioners with a comprehensive overview. The contents of the papers in each research category are summarized from theoretical foundations and applications including the CPS applications in library.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>A main contribution of this review paper is that it summarizes the current state-of-the-art theoretical foundations and applications for CPS and in libraries systematically.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/lht-11-2017-0230","type":"journal-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T07:45:08Z","timestamp":1578037508000},"page":"95-104","source":"Crossref","is-referenced-by-count":19,"title":["Theoretical foundations and applications of cyber-physical systems: a literature review"],"prefix":"10.1108","volume":"38","author":[{"given":"Caiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3419-1496","authenticated-orcid":false,"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"11","key":"key2020040611353115200_ref001","doi-asserted-by":"crossref","first-page":"2732","DOI":"10.1109\/TCAD.2018.2857319","article-title":"Priority neuron a resource-aware neural network for cyber-physical systems","volume":"37","year":"2018","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"key2020040611353115200_ref002","doi-asserted-by":"crossref","first-page":"73603","DOI":"10.1109\/ACCESS.2018.2878681","article-title":"Big data meet cyber-physical systems: a panoramic survey","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"key2020040611353115200_ref003","doi-asserted-by":"crossref","first-page":"72030","DOI":"10.1109\/ACCESS.2019.2920317","article-title":"Soft computing techniques for dependable cyber-physical systems","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"7","key":"key2020040611353115200_ref004","doi-asserted-by":"crossref","first-page":"2753","DOI":"10.1109\/TCOMM.2017.2698480","article-title":"Error correction coding meets cyber-physical systems message-passing analysis of self-healing interdependent networks","volume":"65","year":"2017","journal-title":"IEEE Transactions on Communications"},{"issue":"6","key":"key2020040611353115200_ref005","first-page":"512","article-title":"A PVS-simulink integrated environment for model-based analysis of cyber-physical systems","volume":"44","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"key2020040611353115200_ref006","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/JPROC.2017.2780172","article-title":"Wireless communication and security issues for cyber\u2013physical systems and the internet-of-things","volume":"106","year":"2018","journal-title":"Proceedings of the IEEE"},{"issue":"14","key":"key2020040611353115200_ref007","doi-asserted-by":"crossref","first-page":"3814","DOI":"10.1109\/TSP.2018.2831623","article-title":"Zero MAC latency sensor networking for cyber-physical systems","volume":"66","year":"2018","journal-title":"IEEE Transactions on Signal Processing"},{"key":"key2020040611353115200_ref008","doi-asserted-by":"crossref","first-page":"52455","DOI":"10.1109\/ACCESS.2019.2911979","article-title":"Implementation of a large-scale platform for cyber-physical system real-time monitoring","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"key2020040611353115200_ref009","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TDMR.2019.2898882","article-title":"Performance monitor counters Interplay between safety and security in complex cyber-physical systems","volume":"19","year":"2019","journal-title":"IEEE Transactions on Device and Materials Reliability"},{"issue":"3","key":"key2020040611353115200_ref010","first-page":"1750012-1","article-title":"Applications of cyber-physical system: a literature review","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"issue":"3","key":"key2020040611353115200_ref011","first-page":"1750013-1","article-title":"Theoretical foundations for cyber-physical systems: a literature review","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"key":"key2020040611353115200_ref012","doi-asserted-by":"crossref","first-page":"23127","DOI":"10.1109\/ACCESS.2019.2897712","article-title":"Energy internet access equipment integrating cyber-physical systems concepts, key technologies, system development, and application prospects","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"key2020040611353115200_ref013","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/COMST.2016.2627399","article-title":"A survey on smart grid cyber-physical system testbeds","volume":"19","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"key2020040611353115200_ref014","doi-asserted-by":"crossref","first-page":"20207","DOI":"10.1109\/ACCESS.2017.2756855","article-title":"A multi-step source localization method with narrowing velocity interval of cyber-physical systems in buildings","volume":"5","year":"2017","journal-title":"IEEE Access"},{"issue":"2","key":"key2020040611353115200_ref015","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/TNET.2018.2797107","article-title":"Proactive doppler shift compensation in vehicular cyber-physical systems","volume":"26","year":"2018","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"6","key":"key2020040611353115200_ref016","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1109\/TMECH.2018.2852719","article-title":"Cyber-physical system optimization techniques in mechatronic redundant accelerometer array devices (RAAD)","volume":"23","year":"2018","journal-title":"IEEE Asme Transactions on Mechatronics"},{"key":"key2020040611353115200_ref017","doi-asserted-by":"crossref","first-page":"10000","DOI":"10.1109\/ACCESS.2017.2707597","article-title":"Congestion control in molecularcyber-physical systems","volume":"5","year":"2017","journal-title":"IEEE Access"},{"issue":"9","key":"key2020040611353115200_ref018","first-page":"1551","article-title":"Design of distributed cyber-physical systems for connected and automated vehicles with implementing methodologies","volume":"14","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"key2020040611353115200_ref019","first-page":"174","article-title":"Formal interpretation of cyber-physical system performance with temporal logic","volume":"4","year":"2018","journal-title":"Cyber-Physical Systems"},{"issue":"4","key":"key2020040611353115200_ref020","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/MDAT.2017.2709310","article-title":"Security and privacy in cyber-physical systems a survey of surveys","volume":"34","year":"2017","journal-title":"IEEE Design and Test"},{"issue":"4","key":"key2020040611353115200_ref021","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1109\/TII.2017.2690939","article-title":"Scheduling algorithms of flat semi-dormant multi controllers for a cyber-physical system","volume":"13","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"key2020040611353115200_ref022","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/TETC.2015.2508382","article-title":"Cost efficient resource management in fog computing supported medical cyber-physical system","volume":"5","year":"2017","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"key2020040611353115200_ref023","doi-asserted-by":"crossref","first-page":"34834","DOI":"10.1109\/ACCESS.2018.2850039","article-title":"A cyber-physical system framework for early detection of paroxysmal diseases","volume":"6","year":"2018","journal-title":"IEEE Acceess"},{"key":"key2020040611353115200_ref024","first-page":"12360","article-title":"Mobile cyber physical systems: current challenges and future networking applications","volume":"6","year":"2017","journal-title":"IEEE Access"},{"issue":"3","key":"key2020040611353115200_ref025","first-page":"14","article-title":"A systematic review to merge discourses: interoperability, integration and cyber-physical systems","volume":"9","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"key":"key2020040611353115200_ref026","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.jii.2016.09.002","article-title":"Making interoperability visible: data visualization of cyber-physical systems development tool chains","volume":"4","year":"2016","journal-title":"Journal of Industrial Information Integration"},{"issue":"4","key":"key2020040611353115200_ref027","first-page":"17","article-title":"Using information-flowmethods to analyzethe security of cyber-physical systems","volume":"50","year":"2017","journal-title":"Cyber-Physical Systems of Computer"},{"key":"key2020040611353115200_ref028","doi-asserted-by":"crossref","first-page":"57631","DOI":"10.1109\/ACCESS.2018.2873751","article-title":"CPS-agent oriented construction and implementation for cyber physical systems","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"10","key":"key2020040611353115200_ref029","first-page":"8153","article-title":"Assessing the physical impact of cyber-attacks on industrial cyber-physicalsystems","volume":"65","year":"2017","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"6","key":"key2020040611353115200_ref030","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security \u2013 a survey","volume":"4","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611353115200_ref032","doi-asserted-by":"crossref","first-page":"47374","DOI":"10.1109\/ACCESS.2018.2866403","article-title":"Data-driven monitoring and safety control of industrial cyber-physical systems basics and beyond","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"4","key":"key2020040611353115200_ref031","doi-asserted-by":"crossref","first-page":"1900","DOI":"10.1109\/TII.2016.2573762","article-title":"Data-centered runtime verification of wireless medical cyber-physical system","volume":"13","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2020040611353115200_ref033","doi-asserted-by":"crossref","first-page":"1855","DOI":"10.1109\/ACCESS.2017.2780321","article-title":"Distributed dynamic scheduling for cyber-physical production systems based on a multi-agent system","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"11","key":"key2020040611353115200_ref034","doi-asserted-by":"crossref","first-page":"6058","DOI":"10.1109\/TAC.2017.2652127","article-title":"An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems","volume":"62","year":"2017","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"6","key":"key2020040611353115200_ref035","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MNET.2018.1800101","article-title":"SeDaTiVe SDN-enabled deep learning architecture for network traffic control in vehicular cyber-physical systems","volume":"32","year":"2018","journal-title":"IEEE Network"},{"issue":"5","key":"key2020040611353115200_ref036","first-page":"3800","article-title":"Geometry-based localization for GPS outage in vehicular cyber physical systems","volume":"67","year":"2017","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"key2020040611353115200_ref037","first-page":"10","article-title":"Awareness of library in Andhra Pradesh","volume":"1","year":"2007","journal-title":"A Journal of Library and Information Science"},{"issue":"4","key":"key2020040611353115200_ref038","first-page":"2478","article-title":"Resilient end-to-end message protection for cyber-physical system communications","volume":"9","year":"2016","journal-title":"IEEE Transactions on Smart Grid 2016"},{"issue":"1","key":"key2020040611353115200_ref039","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/JSYST.2015.2437201","article-title":"Cloud-assisted context-aware vehicularcyber-physical system for PHEVs in smart grid","volume":"11","year":"2017","journal-title":"IEEE Systems Journal"},{"key":"key2020040611353115200_ref040","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","article-title":"A cyber-physical systems architecture for industry 4.0-based manufacturing systems","volume":"3","year":"2015","journal-title":"Manufacturing Letters"},{"issue":"7","key":"key2020040611353115200_ref041","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1109\/TC.2018.2889456","article-title":"Maintaining data freshness in distributed cyber-physical systems","volume":"68","year":"2019","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"key2020040611353115200_ref042","doi-asserted-by":"crossref","first-page":"2299","DOI":"10.1109\/JIOT.2019.2906157","article-title":"Distributed consensus algorithm for events detection in cyber physical systems","volume":"6","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020040611353115200_ref043","doi-asserted-by":"crossref","first-page":"76754","DOI":"10.1109\/ACCESS.2019.2921716","article-title":"Multi-objective optimization for cyber-physical-social systems: a case study of electric vehicles charging and discharging","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"key2020040611353115200_ref044","article-title":"The application of CPS in library management: a survey","volume":"27","year":"2018","journal-title":"Library Hi Tech"},{"issue":"1","key":"key2020040611353115200_ref045","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/JSYST.2015.2440431","article-title":"Personalized multimedia recommendations for cloud-integrated cyber-physical systems","volume":"11","year":"2017","journal-title":"IEEE Systems Journal"},{"issue":"6","key":"key2020040611353115200_ref046","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIS.2018.111144927","article-title":"UIO-based test bed augmentation for simulating cyber-physical systems","volume":"33","year":"2018","journal-title":"IEEE Intelligent Systems"},{"issue":"6","key":"key2020040611353115200_ref047","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1109\/TAC.2017.2751999","article-title":"Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service","volume":"63","year":"2018","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"3","key":"key2020040611353115200_ref048","first-page":"1750014-1","article-title":"Cyber physical system (CPS)-based industry 4.0: a survey","volume":"2","year":"2017","journal-title":"Journal of Industrial Integration and Management"},{"issue":"4","key":"key2020040611353115200_ref049","doi-asserted-by":"crossref","first-page":"2965","DOI":"10.1109\/TIE.2018.2850031","article-title":"Driving-style-based codesign optimization of an automated electric vehicle a cyber-physical system approach","volume":"66","year":"2019","journal-title":"IEEE Transaction on Industrial Electronics"},{"issue":"2","key":"key2020040611353115200_ref050","first-page":"98","article-title":"A cyber-physical systems approach for implementing the receding horizon optimal power flow in smart grids","volume":"3","year":"2017","journal-title":"IEEE Transactions on Sustainable Computing"},{"issue":"1","key":"key2020040611353115200_ref051","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TCNS.2016.2573039","article-title":"Coding schemes for securing cyber-physical systems against stealthy data injection attacks","volume":"4","year":"2017","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"key2020040611353115200_ref052","doi-asserted-by":"crossref","first-page":"33741","DOI":"10.1109\/ACCESS.2019.2903153","article-title":"Predictive formal analysis of resilience","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"5","key":"key2020040611353115200_ref053","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/MWC.2017.1600399","article-title":"Dependable information exchange for the next generation mobile cyber-physical systems","volume":"24","year":"2017","journal-title":"IEEE Wireless Communications"},{"issue":"4","key":"key2020040611353115200_ref054","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/MNET.2017.1600222","article-title":"Cyber physical systems for intelligent disaster response networks conceptual proposal and field experiment","volume":"31","year":"2017","journal-title":"IEEE Network"},{"key":"key2020040611353115200_ref055","doi-asserted-by":"publisher","article-title":"Engineering events in CPS \u2013 experiences and lessons learned","year":"2017","DOI":"10.1109\/SEsCPS.2017.1"},{"issue":"1","key":"key2020040611353115200_ref056","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/JAS.2017.7510760","article-title":"Cyber-physical-social system between a humanoid robot and a virtual human through a shared platform for adaptive agent ecology","volume":"5","year":"2018","journal-title":"IEEE CAA Journal of Automatica Sinica"},{"issue":"2","key":"key2020040611353115200_ref057","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1109\/JSYST.2015.2507577","article-title":"Learning automata-based data aggregation tree construction framework for cyber-physical systems","volume":"12","year":"2018","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"key2020040611353115200_ref058","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1109\/JPROC.2017.2779456","article-title":"Semantics-preserving cosynthesis of cyber\u2013physical systems","volume":"106","year":"2018","journal-title":"Proceedings of the IEEE"},{"issue":"88","key":"key2020040611353115200_ref059","first-page":"27","article-title":"A cloud-integrated, multilayered, agentbased cyber-physical system architecture","volume":"4","year":"2017","journal-title":"Multi-scale Computing Systems"},{"issue":"2","key":"key2020040611353115200_ref060","first-page":"219","article-title":"Dynamic watermarking active defense of networked cyber\u2013physical systems","volume":"105","year":"2016","journal-title":"Proceedings of the IEEE"},{"issue":"9","key":"key2020040611353115200_ref061","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.1109\/TCAD.2016.2633961","article-title":"Design automation of cyber-physical systems challenges, advances, and opportunities","volume":"36","year":"2017","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"7","key":"key2020040611353115200_ref062","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.1109\/TMC.2018.2863296","article-title":"Persistent traffic measurement through vehicle-to-infrastructure communications in cyber-physical road systems","volume":"18","year":"2019","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"9","key":"key2020040611353115200_ref063","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/JPROC.2018.2838530","article-title":"Model and tool integration platforms for cyber-physical system design","volume":"106","year":"2018","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"key2020040611353115200_ref064","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TCNS.2018.2873229","article-title":"Time-varying sensor and actuator selection for uncertain cyber-physical systems","volume":"6","year":"2019","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"key2020040611353115200_ref065","doi-asserted-by":"crossref","first-page":"21828","DOI":"10.1109\/ACCESS.2018.2800684","article-title":"Leakage models and inference attacks on searchable encryption for cyber-physical social systems","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"key2020040611353115200_ref066","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1109\/JIOT.2018.2822677","article-title":"Trust quantification for networked cyber-physical systems","volume":"5","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"key2020040611353115200_ref067","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TII.2011.2167156","article-title":"Enterprise systems: state-of-the-art and future trends","volume":"7","year":"2011","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"key2020040611353115200_ref068","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: a survey","volume":"10","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"8","key":"key2020040611353115200_ref069","doi-asserted-by":"crossref","first-page":"2941","DOI":"10.1080\/00207543.2018.1444806","article-title":"Industry 4.0: state of the art and future trends","volume":"56","year":"2018","journal-title":"International Journal of Production Research"},{"issue":"7","key":"key2020040611353115200_ref070","first-page":"48","article-title":"Research on the new generation of smart library information system","volume":"6","year":"2018","journal-title":"Journal of the National Library of China"},{"issue":"4","key":"key2020040611353115200_ref071","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1109\/TCST.2017.2709266","article-title":"Formation control of teleoperating cyber-physical system with time delay and actuator saturation","volume":"26","year":"2018","journal-title":"IEEE Transactions on Control Systems Technology"},{"issue":"6","key":"key2020040611353115200_ref072","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1109\/JIOT.2017.2765243","article-title":"Employing cyber-physical systems dynamic traffic light control at road intersections","volume":"4","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"key2020040611353115200_ref073","first-page":"1932","article-title":"Health-CPS Healthcare cyber-physical system assisted by cloud and big data","volume":"11","year":"2017","journal-title":"IEEE Systems Journal"},{"issue":"4","key":"key2020040611353115200_ref074","doi-asserted-by":"crossref","first-page":"2614","DOI":"10.1109\/JSYST.2015.2496293","article-title":"Perceptions on the state of the art in verification and validation in cyber-physical systems","volume":"11","year":"2017","journal-title":"IEEE Systems Journal"},{"issue":"9","key":"key2020040611353115200_ref075","first-page":"1483","article-title":"Codesign methodologies and tools for cyber-physical systems","volume":"106","year":"2018","journal-title":"Proceedings of the IEEE"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-11-2017-0230\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-11-2017-0230\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:15:25Z","timestamp":1753395325000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/38\/1\/95-104\/259459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,25]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12,25]]}},"alternative-id":["10.1108\/LHT-11-2017-0230"],"URL":"https:\/\/doi.org\/10.1108\/lht-11-2017-0230","relation":{},"ISSN":["0737-8831"],"issn-type":[{"value":"0737-8831","type":"print"}],"subject":[],"published":{"date-parts":[[2019,12,25]]}}}