Default Cover Image

2016 IEEE 4th International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)

Oct. 6 2016 to Oct. 7 2016

Nagoya, Japan

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-vi
Message from the CPSNA 2016 Conference ChairsFreely available from IEEE.pp. vii-vii
CPSNA 2016 Conference OrganizersFreely available from IEEE.pp. viii-viii
CPSNA 2016 Steering CommitteeFreely available from IEEE.pp. ix-ix
CPSNA 2016 Program CommitteeFreely available from IEEE.pp. x-x
Experimental Validation of Encrypted Controller Implemented on Raspberry PiFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Pure Pursuit Revisited: Field Testing of Autonomous Vehicles in Urban AreasFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
A Hybrid V2X System for Safety-Critical Applications in VANETFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Filling Demand-Supply Gap by Adjusting Electricity Selling Prices under Stochastic AcceptanceFull-text access may be available. Sign in or learn about subscription options.pp. 25-28
Power Demand Forecasting Using Meteorological Data and Human Congestion InformationFull-text access may be available. Sign in or learn about subscription options.pp. 29-32
Controllability of Aggregate Demand Response Systems for Real-Time PricingFull-text access may be available. Sign in or learn about subscription options.pp. 33-34
Optimal Real-Time Pricing of Electricity Based on Switched Markov Chain Models and Welfare MaximizationFull-text access may be available. Sign in or learn about subscription options.pp. 35-39
Control of Large-Scale Cyber-Physical Systems with Agents via a Representative ModelFull-text access may be available. Sign in or learn about subscription options.pp. 40-43
Masking Method for Local Information on Distributed Optimization with ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Adaptive Transient Fault Model for Sensor Attack DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 59-65
Distributed QoS Aware Meta-Routing for IoT/CPSFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Lightweight Ruby Framework for Improving Embedded Software EfficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
Priority and Synchronization Support for ROSFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
HLBS: Heterogeneous Laxity-Based Scheduling Algorithm for DAG-Based Real-Time ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Parallel Responsive Task on Dependable Responsive Multithreaded Processor IIFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Componentizing an Operating System Feature Using a TECS PluginFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
Author IndexFreely available from IEEE.pp. 100-100
Publisher's InformationFreely available from IEEE.pp. 102-102
Showing 29 out of 29