{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:16:03Z","timestamp":1775121363909,"version":"3.50.1"},"reference-count":271,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"Special Centennial Issue","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/jproc.2012.2189792","type":"journal-article","created":{"date-parts":[[2012,4,11]],"date-time":"2012-04-11T19:39:36Z","timestamp":1334173176000},"page":"1287-1308","source":"Crossref","is-referenced-by-count":537,"title":["Cyber\u2013Physical Systems: A Perspective at the Centennial"],"prefix":"10.1109","volume":"100","author":[{"family":"Kyoung-Dae Kim","sequence":"first","affiliation":[]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref271","year":"0","journal-title":"DOE Building Energy Data Book"},{"key":"ref270","year":"0"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2001.970772"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008009721495"},{"key":"ref171","first-page":"225","article-title":"RTZen: Highly predictable, real-time Java middleware for distributed and embedded systems","author":"raman","year":"2005","journal-title":"Proc Int Middleware Conf"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(92)90005-V"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805825"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506426"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/5.97301"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462090"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061954"},{"key":"ref168","first-page":"2119","article-title":"Design and experimental verification of real-time mechanisms for middleware for networked control","author":"kim","year":"2010","journal-title":"Proc Amer Control Conf"},{"key":"ref169","doi-asserted-by":"crossref","first-page":"261","DOI":"10.3166\/ejc.13.261-279","article-title":"A component-based approach to the design of networked control systems","volume":"13","author":"rzn","year":"2007","journal-title":"Eur J Control"},{"key":"ref39","year":"0","journal-title":"CAN History"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(66)90011-2"},{"key":"ref33","author":"astrm","year":"1994","journal-title":"Adaptive Control"},{"key":"ref32","author":"kumar","year":"1986","journal-title":"Stochastic Systems Estimation Identification and Adaptive Control"},{"key":"ref31","author":"khalil","year":"2001","journal-title":"Nonlinear Systems"},{"key":"ref30","author":"bhattacharyya","year":"2009","journal-title":"Linear Control Theory Structure Robustness and Optimization"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.54"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4070-7"},{"key":"ref268","author":"greenfield","year":"2004","journal-title":"Software Factories Assembling Applications with Patterns Models Frameworks and Tools"},{"key":"ref36","author":"iljak","year":"1991","journal-title":"Decentralized Control of Complex Systems"},{"key":"ref269","year":"0","journal-title":"Architecture Analysis & Design Language (AADL)"},{"key":"ref35","author":"fattorini","year":"2005","journal-title":"Infinite dimensional linear control systems The time optimal and norm optimal problems"},{"key":"ref34","author":"dullerud","year":"2010","journal-title":"A Course in Robust Control Theory A Convex Approach"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462070"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"key":"ref185","article-title":"Real-time QoS support in wireless sensor networks: A survey","author":"li","year":"2007","journal-title":"Proc 7th IFAC Int Conf Fieldbuses Netw Ind Embedded Syst"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2100083"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/1860093.1860099"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530772"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2005.30"},{"key":"ref188","first-page":"55","article-title":"RAP: A real-time communication architecture for large-scale wireless sensor networks","author":"lu","year":"2002","journal-title":"Proc IEEE Real-Time Embedded Technol Appl Symp"},{"key":"ref187","first-page":"46","article-title":"SPEED: A stateless protocol for real-time communication in sensor networks","author":"he","year":"2003","journal-title":"Proc Int Conf Distrib Comput Syst"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2002.1181560"},{"key":"ref28","author":"bryson","year":"1975","journal-title":"Applied Optimal Control Optimization Estimation and Control"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/0301010"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1996.563693"},{"key":"ref29","author":"michel","year":"2007","journal-title":"Stability of Dynamical Systems Continuous Discontinuous and Discrete Systems"},{"key":"ref20","article-title":"Control and the digital computer: The early years","author":"bennett","year":"2002","journal-title":"Proc Int Fed Autom Control"},{"key":"ref22","author":"pontryagin","year":"1963","journal-title":"The Mathematical Theory of Optimal Processes"},{"key":"ref21","author":"bellman","year":"1957","journal-title":"Dynamic Programming"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1959.1104873"},{"key":"ref23","first-page":"468","article-title":"Design of a self-optimizing control system","volume":"80","author":"kalman","year":"1958","journal-title":"Trans ASME"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.48.4.596"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1115\/1.3658902"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.835360"},{"key":"ref51","first-page":"1345","article-title":"Control of asynchronous dynamical systems with rate constraints on events","author":"hassibi","year":"1999","journal-title":"Proc 38th IEEE Conf Decision Control"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/9.106156"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/BF00365393"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1015345295"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1996.563715"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000027934.77900.22"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/12.57058"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.1261839"},{"key":"ref146","first-page":"181","article-title":"Solutions for some practical problems in prioritized preemptive scheduling","author":"sha","year":"1986","journal-title":"Proc IEEE Real-Time Syst Symp"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/12.368008"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/12.368008"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/BF00360340"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080508"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1971.8488"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/0306011"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.03.011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055455"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2004.08.009"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/37.898794"},{"key":"ref40","first-page":"77","article-title":"Fieldbus: The foundation for field control systems","volume":"41","author":"chatha","year":"1994","journal-title":"Control Eng"},{"key":"ref167","author":"gamma","year":"1994","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/37.924797"},{"key":"ref165","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/S0140-3664(97)00165-5","article-title":"The design of the TAO real-time object request broker","volume":"21","author":"schmidt","year":"1998","journal-title":"Comput Commun"},{"key":"ref164","year":"0","journal-title":"CORBA The Object Management Group (OMG)"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502044"},{"key":"ref162","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1145\/1272998.1273026","article-title":"Adaptive control of virtualized resources in utility computing environments","volume":"41","author":"padala","year":"2007","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022267"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/71.980028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/37.506394"},{"key":"ref3","author":"mindell","year":"2002","journal-title":"Between Human and Machine Feedback Control and Computing Before Cybernetics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"ref5","author":"eckert","year":"1946","journal-title":"Outline of Plans for Development of Electronic Computers"},{"key":"ref8","year":"1998","journal-title":"Proceedings of the First International Workshop on Hybrid Systems Computation and Control"},{"key":"ref159","first-page":"150","article-title":"Resource kernels: A resource-centric approach to real-time and multimedia systems","author":"rajkumar","year":"1998","journal-title":"Proc SPIE\/ACM Conf Multimedia Comput Netw"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000045315.61234.1e"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(03)00186-9"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/RTTAS.2001.929867"},{"key":"ref9","year":"0","journal-title":"A history of the ARPANET The first decade"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2004.15"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/87.998034"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/37.898792"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1997.650600"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2000.878601"},{"key":"ref42","article-title":"The self triggered task model for real-time control systems","author":"velasco","year":"2003","journal-title":"Work-in-Progress Session 24th IEEE Real-Time Syst Symp"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/CDC.2002.1184824","article-title":"Comparison of Riemann and Lebesgue sampling for first order stochastic systems","volume":"2","author":"astrom","year":"2002","journal-title":"Proc 41st IEEE Conf Decision Control"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2042980"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2009.2012973"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.878169"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161099"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2068590"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2010887"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021303"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161478"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/18.556671"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834103"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834119"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2006.11.003"},{"key":"ref60","author":"borkar","year":"1997","journal-title":"Communications Computation Control and Signal Processing A Tribute to Thomas Kailath"},{"key":"ref62","article-title":"Feedback designs for controlling device arrays with communication channel bandwidth constraints","author":"baillieul","year":"1999","journal-title":"Proc ARO Workshop Smart Structures"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/9.763226"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/9.867021"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/9.948466"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.831187"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.831102"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6911(00)00037-2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1137\/S0363012902402116"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.871940"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1050689601"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138128"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"ref193","year":"0"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.22"},{"key":"ref195","first-page":"547","author":"gupta","year":"1998","journal-title":"Stochastic Analysis Control Optimization and Applications A Volume in Honor of W H Fleming"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/S0890-5401(03)00067-1"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1996.561342"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"key":"ref93","first-page":"250","article-title":"Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems","author":"alur","year":"1993","journal-title":"Proc ACM Hybrid Syst Comput Control"},{"key":"ref191","first-page":"109","article-title":"Wireless sensor network design for wildfire monitoring","author":"li","year":"2006","journal-title":"Proc 6th World Congr Intell Control Autom"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2012009"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"ref91","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0017-8","author":"liberzon","year":"2003","journal-title":"Switching in Systems and Control Systems and Control Foundations and Applications"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"ref98","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14509-4","author":"platzer","year":"2010","journal-title":"Logical Analysis of Hybrid Systems Logical Analysis of Hybrid Systems Proving Theorems for Complex Dynamics"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050008"},{"key":"ref96","author":"kaynar","year":"2005","journal-title":"The Theory of Timed I\/O Automata"},{"key":"ref97","author":"mitra","year":"2007","journal-title":"A verification framework for hybrid systems"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(97)00170-2"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2080150"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2005.1582263"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1996.573619"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1429625"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887290"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2004.836043"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717159"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1978.1101704"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1504\/IJSCC.2010.031157"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225162"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)00202-T"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.15"},{"key":"ref203","author":"levis","year":"2004","journal-title":"Ambient Intelligence"},{"key":"ref204","article-title":"TinyOS: Operating system design for wireless sensor networks","author":"culler","year":"2006","journal-title":"SENSORS"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062724"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368893"},{"key":"ref207","year":"0"},{"key":"ref208","year":"0"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814620"},{"key":"ref206","year":"0"},{"key":"ref211","year":"0","journal-title":"The Wireless Embedded Internet"},{"key":"ref210","year":"0"},{"key":"ref212","author":"culler","year":"0","journal-title":"6loWPAN Tutorial IP on IEEE 802 15 4 Low-Power Wireless Networks"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4944"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1429378"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874414"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.377325"},{"key":"ref218","first-page":"609","article-title":"Global synchronization in sensornets","author":"karp","year":"2004","journal-title":"Proc 6th Latin Amer Symp Theor Inf"},{"key":"ref219","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-642-14849-1_8","author":"giridhar","year":"2011","journal-title":"Theoretical Aspects of Distributed Computing in Sensor Networks"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/800135.804414"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055607"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/SCT.1991.160273"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513431"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/ITWKSPS.2010.5503141"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513436"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2095070"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.843543"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/18.915643"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/18.532875"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/1967701.1967719","article-title":"Computing bounded <ref_formula><tex Notation=\"TeX\">$\\epsilon$<\/tex><\/ref_formula>-reach set with finite precision computations for a class of linear hybrid automata","author":"kim","year":"2011","journal-title":"Proc ACM Hybrid Syst Comput Control"},{"key":"ref126","first-page":"90","article-title":"Guaranteed overapproximations of unsafe sets for continuous and hybrid systems: Solving the Hamilton-Jacobi equation using viability techniques","volume":"2289","author":"bayen","year":"2002","journal-title":"Proc ACM Hybrid Syst Comput Control"},{"key":"ref125","first-page":"310","article-title":"Level set methods for computation in hybrid systems","author":"ian","year":"2000","journal-title":"Proc ACM Hybrid Syst Comput Control"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-540-31954-2_19","article-title":"Reachability of uncertain linear systems using zonotopes","volume":"3414","author":"girard","year":"2005","journal-title":"Proc ACM Hybrid Syst Comput Control"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/3-540-36577-X_14","article-title":"Verification of hybrid systems based on counterexample guided abstraction refinement","author":"clarke","year":"2003","journal-title":"Proc 9th Int Conf Tools Algorithms Constr Anal Syst"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0224-5"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/1132357.1132363"},{"key":"ref133","author":"baliga","year":"2005","journal-title":"A Middleware Framework for Networked Control Systems"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2009.2022094"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/5.871304"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-007-0044-3"},{"key":"ref232","first-page":"60","author":"gamal","year":"1987","journal-title":"Reliable Communication of Highly Distributed Information"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/18.2626"},{"key":"ref230","first-page":"51","article-title":"Two-terminal distributed source coding with alternating messages for function computation","author":"ma","year":"2008","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205926"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2168902"},{"key":"ref238","first-page":"1056","article-title":"A tight lower bound for parity in noisy communication networks","author":"dutta","year":"2008","journal-title":"Proc 19th Annu ACM-SIAM Symp Discrete Algorithms"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00002-8"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480103434063"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557101"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909156"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2107584"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.877472"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.49"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/1552297.1552300"},{"key":"ref139","first-page":"42","article-title":"Adaptive cruise control: Hybrid, distributed, and now formally verified","author":"loos","year":"2011","journal-title":"Proc 17th Int Symp Formal Methods"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/1967701.1967713"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/2.7053"},{"key":"ref142","author":"buttazzo","year":"2004","journal-title":"Hard Real-Time Computing Systems Predictable Scheduling Algorithms and Applications"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1214341"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0034"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1963.2441"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/BF01995675"},{"key":"ref241","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-540-24606-0_21","article-title":"Lessons from a sensor network expedition","volume":"2920","author":"szewczyk","year":"2004","journal-title":"Wireless Sensor Netw"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1145\/570743.570747"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref244","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-540-30143-1_4","article-title":"Fast detection of scanning worm infections","author":"schechter","year":"2004","journal-title":"Proc 7th Int Symp Recent Adv Intrusion Detection"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.904785"},{"key":"ref248","author":"falliere","year":"2011","journal-title":"W32 stuxnet Dossier"},{"key":"ref247","article-title":"Hackers penetrate water system computers","author":"esposito","year":"2006","journal-title":"ABC News"},{"key":"ref246","article-title":"Hackers cut cities' power","author":"greenberg","year":"2008","journal-title":"Forbes"},{"key":"ref245","article-title":"Polish teen derails tram after hacking train network","author":"leyden","year":"2008","journal-title":"The Register"},{"key":"ref249","article-title":"Siemens: Stuxnet worm hit industrial systems","author":"mcmillan","year":"2010","journal-title":"ComputerWorld"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1215\/S0012-7094-96-08416-1"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511525919"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009858"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.895849"},{"key":"ref105","author":"jr","year":"1999","journal-title":"Model checking"},{"key":"ref104","author":"milner","year":"1989","journal-title":"Communication and Concurrency"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0017309"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2002.806655"},{"key":"ref112","first-page":"21","article-title":"Approximate reachability analysis of piecewise-linear dynamical systems","volume":"1790","author":"asarin","year":"2000","journal-title":"Proc ACM Hybrid Syst Comput Control"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/32.489079"},{"key":"ref250","article-title":"How Stuxnet is rewriting the cyberterrorism playbook","author":"cherry","year":"2010","journal-title":"ComputerWorld"},{"key":"ref251","article-title":"Challenges in security for cyber-physical systems","author":"neuman","year":"2009","journal-title":"Proc S&T Workshop Future Directions Cyber-Physical Syst Security"},{"key":"ref254","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"crdenas","year":"2011","journal-title":"Proc 6th ACM Symp Inf Comput Commun Security"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref253","article-title":"Challenges for securing cyber physical systems","author":"crdenas","year":"2009","journal-title":"Proc Workshop Future Directions Cyber-Physical Syst Security"},{"key":"ref257","year":"0","journal-title":"Critical Infrastructure Protection"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120187"},{"key":"ref259","year":"0","journal-title":"ISA99 Industrial Automation and Control System Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1478462.1478502"},{"key":"ref258","author":"stouffer","year":"0","journal-title":"Guide to supervisory control and data acquisition (SCADA) and industrial control systems security"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/PROC.1987.13702","article-title":"the darpa packet radio network protocols","volume":"75","author":"jubin","year":"1987","journal-title":"Proceedings of the IEEE"},{"key":"ref12","year":"1996","journal-title":"Talk IISINCGARS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/35.620533"},{"key":"ref14","article-title":"Mobile networking for smart dust","author":"kahn","year":"1999","journal-title":"Proc ACM\/IEEE Int Conf Mobile Comput Netw"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1934.5056493"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1932.tb02344.x"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/s100090050010","article-title":"UPPAAL in a nutshell","volume":"1","author":"larsen","year":"1997","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"ref17","author":"bode","year":"1952","journal-title":"Network Analysis and Feedback Amplifier Design"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.884957"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1950.5060121"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1115\/1.2899060"},{"key":"ref119","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s10009-007-0062-x","article-title":"PHAVer: Algorithmic verification of hybrid systems past HyTech","volume":"10","author":"frehse","year":"2008","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.02.021"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/9.989067"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.886494"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.925824"},{"key":"ref120","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22110-1_30","article-title":"Spaceex: Scalable verification of hybrid systems","author":"frehse","year":"2011","journal-title":"Proc 23rd Int Conf Comput Aided Verif"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2009.03.002"},{"key":"ref122","first-page":"566","article-title":"PESSOA: A tool for embedded controller synthesis","author":"mazo","year":"2010","journal-title":"Proc 22nd Int Conf Comput Aided Verif"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.887900"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134292"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1231146"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1231149"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.14"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/2.585163"},{"key":"ref265","year":"0","journal-title":"Model-Driven Architecture"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805824"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5\/6259910\/06176187.pdf?arnumber=6176187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T03:04:30Z","timestamp":1713841470000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6176187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":271,"journal-issue":{"issue":"Special Centennial Issue"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2012.2189792","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5]]}}}