{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:17:44Z","timestamp":1729617464100,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/liss.2016.7854561","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:21:35Z","timestamp":1487283695000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Declarative modeling cases of cyber physical systems"],"prefix":"10.1109","author":[{"given":"Wei","family":"Ding","sequence":"first","affiliation":[]},{"given":"William","family":"Engel","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Goode","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Santostasi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/S026988890000789X"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1117\/12.500794"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.21236\/ADA455842"},{"key":"ref32","article-title":"Learning Declarative Control Rules for Constraint- Based Planning","author":"huang","year":"2000","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref31","first-page":"415","article-title":"Learning declarative control rules for constraint-based planning","year":"0","journal-title":"ICML"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/108515.108530","article-title":"Declarative control architecture","volume":"34","author":"wolf","year":"1991","journal-title":"Communications of the ACM"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1145\/1082960.1082977","article-title":"Adaptive replication of largescale multi-agent systems - towards a fault-tolerant multi-agent platform","author":"guessoum","year":"2005","journal-title":"Proc 4th Intl Workshop on Software Engineering for Large-scale Multi-agent Systems"},{"key":"ref36","first-page":"2","article-title":"Tutorial on agent-based modeling and simulation","author":"charles m","year":"2005","journal-title":"Proceedings of the 37th Conference on Winter Simulation"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2004.11.016"},{"key":"ref34","first-page":"13","article-title":"Modeling cyber-physical systems with semantic agents","author":"jing","year":"2010","journal-title":"Computer Software and Applications Conference Workshops (COMPSACW) 2010 IEEE 34th Annual"},{"key":"ref28","first-page":"382","article-title":"Hierarchical control systems for autonomous space robots","volume":"1","author":"wolf","year":"1988","journal-title":"AIAA Guidance Navigat Contr Conf"},{"key":"ref27","first-page":"2","article-title":"A Multiply Hierarchical Automaton Semantics for the IWIM Coordination Model","volume":"9","author":"banach","year":"2003","journal-title":"Journal of Universal Com Sci Springer Verlag"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.4"},{"key":"ref2","article-title":"A prototype architecture for cyber-physical systems","author":"ying","year":"2008","journal-title":"SIGBED Rev 5 1 Article 26"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref20","first-page":"175","article-title":"The design and implementation of a declarative sensor network system","author":"david","year":"2007","journal-title":"Proceedings of the 5th international conference on Embedded networked sensor systems - SenSys '07"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2629447"},{"key":"ref21","article-title":"Towards data-driven declarative networking in delay tolerant networks","author":"eiko","year":"2008","journal-title":"Proceedings of the second international conference on Distributed event-based systems - DEBS '08"},{"year":"2014","key":"ref24","article-title":"Procedural Learning During Declarative Control"},{"key":"ref23","article-title":"Declarative meta level control for logic programs","author":"clemens","year":"1995","journal-title":"Proceedings First Russian-German Symposium on Intelligent Information Technologies and Expert Systems Moscow"},{"key":"ref26","first-page":"204","article-title":"An autonomous systems control theory: An overview","author":"anil","year":"1992","journal-title":"Computer-Aided Control System Design 1992 (CACSD) 1992 IEEE Symposium on"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1988.194283"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"year":"0","key":"ref51"},{"key":"ref55","article-title":"Revising Horn theories","volume":"22","author":"delgrande","year":"2011","journal-title":"Proc of the Int Conf on Artificial Intelligence IJCAI"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/BF03037089","article-title":"Inductive logic programming","volume":"8","author":"stephen","year":"1991","journal-title":"New Generation Computing"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/9780470770931"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2015.78"},{"key":"ref10","article-title":"Declarative Network Verification","author":"wang","year":"2009","journal-title":"Proceedings of the 11th International Symposium on Practical Aspects of Declarative Languages (PADL '09)"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/1592761.1592785","article-title":"Declarative networking","volume":"52","author":"boon","year":"2009","journal-title":"Communications of the ACM"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.82"},{"key":"ref12","first-page":"125","article-title":"A Survey of Research on Deductive Database Systems. Journal of Logic Programming","volume":"23","author":"ramakrishnan","year":"1993"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2165851"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cl.2012.09.002","article-title":"Declarative secure distributed information systems","volume":"39","author":"wenchao","year":"2013","journal-title":"Computer Languages Systems & Structures"},{"key":"ref15","first-page":"1203","article-title":"Entirely declarative sensor network systems","author":"david","year":"2006","journal-title":"Proceedings of the 32nd international conference on Very large data bases"},{"key":"ref16","first-page":"75","author":"thau loo","year":"2005","journal-title":"Implementing declarative overlays SIGOPS Oper Syst Rev 39"},{"key":"ref17","first-page":"64","author":"mao","year":"2012","journal-title":"2012 MOSAIC Declarative platform for dynamic overlay composition Comput Netw 56"},{"key":"ref18","first-page":"76","article-title":"Operational semantics for declarative networking","year":"2009","journal-title":"Practical Aspects of Declarative Languages"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1860702.1860704"},{"key":"ref4","first-page":"97","article-title":"Declarative networking: language, execution and optimization","author":"boon thau","year":"2006","journal-title":"Proceedings of 2006 ACM SIGMOD international conference on Management of data"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"ref6","article-title":"Cyber-physical systems-are computing foundations adequate","volume":"2","author":"lee","year":"2006","journal-title":"Position Paper for NSF Workshop On Cyber-Physical Systems Research Motivation Techniques and Roadmap"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.85"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref7","article-title":"Cyber-physical systems: Position paper","author":"paulo","year":"2006","journal-title":"NSF Workshop on Cyber-Physical Systems"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891588"},{"key":"ref9","first-page":"44","article-title":"Spatio-temporal event model for cyber-physical systems","author":"ying","year":"2009","journal-title":"Distributed Computing Systems Workshops 2009 29th IEEE International Conference on"},{"key":"ref46","first-page":"247","article-title":"Analysis and statistical properties of critical infrastructure interdependency multiflow models","author":"svendsen","year":"2007","journal-title":"Proc IEEE Workshop Information Assurance and Security (IAW)"},{"key":"ref45","article-title":"PDDL &#x2014; the planning domain definition language","author":"mcdermott","year":"1998","journal-title":"CS Department Yale University New Haven"},{"key":"ref48","first-page":"237","article-title":"Wholes and parts in general systems methodology","author":"martin","year":"2001","journal-title":"The Character Concept in Evolutionary Biology"},{"key":"ref47","first-page":"51","article-title":"General system problem solving paradigm for qualitative modeling","year":"1991","journal-title":"Qualitative Simulation Modeling and Analysis"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989456"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/JPROC.2011.2160929","article-title":"Modeling cyber-physical systems","volume":"100","author":"patricia","year":"2012","journal-title":"Proceedings of IEEE"},{"article-title":"OpFlex: An Open Policy Protocol","year":"0","author":"whitepaper","key":"ref44"},{"article-title":"[SDN Protocols] Part 4 &#x2013; OpFlex and Declarative Networking","year":"2014","author":"oswalt","key":"ref43"}],"event":{"name":"2016 International Conference on Logistics, Informatics and Service Sciences (LISS)","start":{"date-parts":[[2016,7,24]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,7,27]]}},"container-title":["2016 International Conference on Logistics, Informatics and Service Sciences (LISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7837024\/7854323\/07854561.pdf?arnumber=7854561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T09:27:14Z","timestamp":1658654834000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7854561\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/liss.2016.7854561","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}