00769nlm2 22002539z-450 99644844660331620211221104355.020130505c1934---- -u- -engUSdrcnu<<1.:>> <<The>> settlementsCharles M. AndrewsNew HavenLondonYale university press1934Testo elettronico (PDF) (XIV, 551 p. )Base dati testuale001996448446703316<<The>> colonial period of American historyColonie inglesiAmerica settentrionaleStoriaSec. 17.-18.BNCF973.2ANDREWS,Charles88584996448446603316EBERSettlements2558331UNISA04039nam 2200985z- 450 991055753170332120220111(CKB)5400000000044261(oapen)https://directory.doabooks.org/handle/20.500.12854/76545(oapen)doab76545(EXLCZ)99540000000004426120202201d2021 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierTrustworthiness in Mobile Cyber Physical SystemsBasel, SwitzerlandMDPI - Multidisciplinary Digital Publishing Institute20211 online resource (190 p.)3-0365-1086-9 3-0365-1087-7 Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the 'cyberworld' of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.Technology: general issuesbicsscadversarial robustnessadversarial trainingauthenticationauthenticityAUTOSARbootstrappingcontrol-scheduling codesigncontroller area network busDAGdata qualitydeep neural networkdistillationDVFSdynamic signal controlembedded systemevent-based systemsformal verificationforward privacygroup mobilityhigh-dimensionalityin-vehicle networkindustryIntelligent Transportation System (ITS)intersection safetylagrange multiplierlarge-scalelinear discriminant analysismixed-criticalitymobile cyber physical systemsMobile Cyber-Physical Systems (MCPS)Mobile Sink Groups (MSG)model checkingmodel compressionn/aPEKSpower-awarerandom projectionreal-time data deliveryreal-time schedulingRed Light Runner (RLR)resiliencyrunnable schedulingsearchable encryptionsecure AIsecurity flawssecurity taxonomiesSGXsustainabilitytrusted execution environmentweight pruningTechnology: general issuesKang Kyungtaeedt1293426Son JunggabedtSuh Hyo-JoongedtKang KyungtaeothSon JunggabothSuh Hyo-JoongothBOOK9910557531703321Trustworthiness in Mobile Cyber Physical Systems3022613UNINA