The document was issued by academy or academy organization.
video
Submitted by Chris Gill on Tue, 12/02/2014 - 4:09pm
video
Submitted by Tolga Soyata on Tue, 12/02/2014 - 3:50pm
video
Submitted by jessygrizzle on Tue, 12/02/2014 - 3:45pm
video
Submitted by poovendran on Tue, 12/02/2014 - 3:39pm
video
Submitted by ssikdar on Tue, 12/02/2014 - 3:27pm
file
Abstract:
This project aims to enable cyber--physical systems that can be worn on the body in order to one day allow their users to touch, feel, and manipulate computationally simulated three--dimensional objects or digital data in physically realistic ways, using the whole hand. It will do this by precisely measuring touch and movement--induced displacements of the skin in the hand, and by reproducing these signals interactively, via new technologies to be developed in the project.
file
Abstract:
The electric power CPS faces an alarmingly high risk of catastrophic damage from cyber--attacks. However, modeling cyber--attacks, evaluating consequences, and developing appropriate countermeasures require a detailed, realistic, and tractable model of electric power CPS operations. The primary barrier is the lack of access to models for the complex legacy proprietary systems that the electric power grid has relied on for decades.
file
Abstract:
The use of deductive techniques, such as theorem provers, has several advantages in safety verification of hybrid systems. State-of-the-art theorem provers, however, suffer from a significant lack of automation.