Method for controlling home automation system
HS Yoon, SM Baek, KS Lee, HJ Choi - US Patent 7,251,533, 2007 - Google Patents
PCT Pub. Date: Oct. 16, 2003 A method for controlling a home automation system is (65)
Prior Publication Data disclosed, in which a PC for controlling web sites, electric home …
Prior Publication Data disclosed, in which a PC for controlling web sites, electric home …
Compatibility issues between services supporting networked appliances
In the near future general household appliances, such as televisions, refrigerators, alarm
clocks, stoves, and even lights, will be supplemented with a network interface connecting …
clocks, stoves, and even lights, will be supplemented with a network interface connecting …
Measuring behaviour interactions between product-line features
We suggest a method for measuring the degree to which features interact in feature-oriented
software development. To this end, we extend the notion of simulation between transition …
software development. To this end, we extend the notion of simulation between transition …
Dynamic service composition in home appliance networks
The proliferation of networked appliances and the complex functions they provide make it
ever harder for a specialist, let alone an ordinary home user, to configure them to provide a …
ever harder for a specialist, let alone an ordinary home user, to configure them to provide a …
[PDF][PDF] Data flow security analysis for system-of-systems in a public security incident
B Zhou, A Arabo, O Drew… - The 3rd Conference …, 2008 - researchgate.net
In any system-of-systems there is the potential for interactions between systems to occur that
affect the security of the overall system. This paper presents a scenario that highlights such …
affect the security of the overall system. This paper presents a scenario that highlights such …
System-of-systems boundary check in a public event scenario
B Zhou, O Drew, A Arabo… - … on System of …, 2010 - ieeexplore.ieee.org
In any system-of-systems the potential exists for interactions between systems to occur that
may affect the security of the overall system. We present a scenario that aims to highlight …
may affect the security of the overall system. We present a scenario that aims to highlight …
IoT end user programming models
SP Reiss - 2019 IEEE/ACM 1st International Workshop on …, 2019 - ieeexplore.ieee.org
The advent of smart devices and sensors (the Internet of Things or IoT) will create increasing
demands for the automation of devices based on sensor, time, and other inputs. This is …
demands for the automation of devices based on sensor, time, and other inputs. This is …
Understanding and avoiding interaction‐based instability in pervasive computing environments
Purpose–This paper aims to address a fundamental problem related to the interaction of rule‐
based autonomous agents in pervasive and intelligent environments. Some rules of …
based autonomous agents in pervasive and intelligent environments. Some rules of …
Early identification of problem interactions: A tool-supported approach
Abstract [Context and motivation] The principle of “divide and conquer” suggests that
complex software problems should be decomposed into simpler problems, and those …
complex software problems should be decomposed into simpler problems, and those …