Zobrazeno 1 - 10
of 246
pro vyhledávání: '"Bruce H. Krogh"'
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 39, Iss Proc. INFINITY 2010, Pp 33-46 (2010)
We propose an extension of the zone-based algorithmics for analyzing timed automata to handle systems where timing uncertainty is considered as probabilistic rather than set-theoretic. We study duration probabilistic automata (DPA), expressing multip
Externí odkaz:
https://doaj.org/article/86f0c13f57e745019265727811d8c482
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. :1-11
Publikováno v:
IEEE Transactions on Control Systems Technology. :1-16
Autor:
Jesse Thornburg, Bruce H. Krogh
Publikováno v:
Energy for Sustainable Development. 64:15-24
Globally, power system operators are exploring ways to leverage the capabilities of smart meters to implement fine-grained demand side management (DSM). This paper presents a new simulation tool to evaluate operating strategies for smart-meter-enable
Publikováno v:
IFAC-PapersOnLine. 53:4088-4094
Software rejuvenation has been proposed to guarantee safety of cyber-physical systems (CPSs) against cyber-attacks. Recent work has demonstrated how this method can be applied to more general control problems such as tracking control. Despite this pr
Publikováno v:
2021 60th IEEE Conference on Decision and Control (CDC).
Publikováno v:
ACC
Cyber-physical systems, which are ubiquitous in modern critical infrastructure, oftentimes rely on sending actuation commands and sensor measurements over a network, subjecting this information to potential man-in-the-middle attacks. These attacks ca
Publikováno v:
CDC
Decentralized control systems are widely used in a number of situations and applications. In order for these systems to function properly and achieve their desired goals, information must be propagated between agents. However, communication between a
Publikováno v:
ACC
Software rejuvenation has been proposed and demonstrated as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks, but the supporting theory has neglected the effects of modeling uncertainties and di
Publikováno v:
ACC
Decentralized control systems exist in many scenarios where agents have the ability to fully communicate with one another but do not do so for multiple reasons, including cost and the possibility of an adversary infiltrating the system through the co