


default search action
SysCon 2021: Vancouver, BC, Canada
- IEEE International Systems Conference, SysCon 2021, Vancouver, BC, Canada, April 15 - May 15, 2021. IEEE 2021, ISBN 978-1-6654-4439-2

- Vikram Mittal, Samuel Herbert, Gene Lesinski, James R. Enos

:
System Design of the Rifleman of the Future. 1-8 - Abdullah Yasin Nur

:
Combating DDoS Attacks with Fair Rate Throttling. 1-8 - Sylvia Melzer, Stefan Thiemann

, Ralf Möller:
Modeling and Simulating Federated Databases for early Validation of Federated Searches using the Broker-based SysML Toolbox. 1-6 - Juan C. Avendano, Luis Daniel Otero, Carlos E. Otero:

Application of Statistical Machine Learning Algorithms for Classification of Bridge Deformation Data Sets. 1-7 - Gabriel T. Jesus

, Milton F. Chagas Júnior:
The roles of modeling and simulation in assessing spacecraft Integration Readiness Levels. 1-5 - Marcus Haferkamp, Benjamin Sliwa, Christian Wietfeld

:
A Low Cost Modular Radio Tomography System for Bicycle and Vehicle Detection and Classification. 1-7 - Rakesh Veerabhadrappa

, Imali T. Hettiarachchi, Asim Bhatti:
Using Recurrence Quantification Analysis to Quantify the Physiological Synchrony in Dyadic ECG Data. 1-8 - Jonathan Timmins, Scott Knight, Brian Lachine:

Offensive Cyber Security Trainer for Platform Management Systems. 1-8 - Walber Lima Pinto Junior, Luiz Eugênio Santos Araújo Filho

, Cairo Lúcio Nascimento Júnior, Sergio Ronaldo Barros dos Santos, Wagner Chiepa Cunha:
Planning of the Coordination of Multiple Quadrotors Applied to the Transport of Materials. 1-7 - Francesco Bedini

, Ralph Maschotta, Armin Zimmermann:
A generative Approach for creating Eclipse Sirius Editors for generic Systems. 1-8 - Adam Baker, Kara Pepe, Nicole Hutchison, Hoong Yan See Tao, Russell Peak, Mark R. Blackburn, Rabia Khan, Clifford A. Whitcomb:

Enabling the Digital Transformation of the Workforce: A Digital Engineering Competency Framework. 1-8 - Shamsnaz Virani Bhada, Casey Inez Canfield

, Alexander M. Wyglinski
:
A Transdisciplinary Socio-Technical Systems Approach: Wireless Solutions for the Digital Divide. 1-5 - Thomas Li, Akramul Azim:

Wireless and autonomous safety-critical system utilizing feedback. 1-8 - Newton Carlos Will, Tiago Heinrich

, Amanda B. Viescinski, Carlos Alberto Maziero:
Trusted Inter-Process Communication Using Hardware Enclaves. 1-7 - Abdullah Yasin Nur

:
K-Shell Decomposition of AS Level Multigraphs. 1-8 - André R. Fonseca, Michel C. R. Leles, Mariana G. Moreira, Adriano S. Vale-Cardoso, Marcos V. L. Pereira

, Elton Felipe Sbruzzi, Cairo L. Nascimento Jr.
:
Testing the Application of Support Vector Machine (SVM) to Technical Trading Rules. 1-8 - Leandro Batista, Bruno Monsuez:

Design Strategies for Integrating Artificial Intelligence into Systems Engineering Environment. 1-6 - Daniel Dunbar, Mo Mansouri:

Themed Entertainment in the Age of Coronavirus. 1-7 - Aditya Akundi, Viviana Lopez, Tzu-Liang Bill Tseng:

Identifying the Thematic Trends of Model Based Systems Engineering in Manufacturing and Production Engineering Domains. 1-4 - Farnaz Sarhangian, Rasha Kashef, Muhammad Jaseemuddin:

Efficient Traffic Classification Using Hybrid Deep Learning. 1-8 - Larissa de Souza Pinto, Luiz Eugênio Santos Araújo Filho

, Leonardo Mariga, Cairo Lúcio Nascimento Júnior, Wagner Chiepa Cunha:
EKF-SLAM with Autonomous Exploration using a Low Cost Robot. 1-7 - Aditya Akundi, Tzu-Liang Bill Tseng, Carmen Noemi Almeraz, Rocio J. Lopez-Terrazas, Hebin Luan:

A Novel Approach to Behavior Design for Model Based Systems Engineering Application Using Design Structure Matrix. 1-7 - Jingwei Huang

, Wael Khallouli, Holly A. H. Handley, William W. Edmonson, Trisha Ahmed, Nadew Kibret:
Semantic Mapping from SysML to FRP: to Enable Executable and Verifiable Systems Design. 1-7 - Farzana Alam, Rasha Kashef, Muhammad Jaseemuddin:

Enhancing The Performance of Network Traffic Classification Methods Using Efficient Feature Selection Models. 1-6 - Juan C. Avendano, Luis Daniel Otero, Carlos E. Otero:

Optimization of Sensor Placement in a Bridge Structural Health Monitoring System. 1-5 - Rob Oshana, Mitchell A. Thornton

, Eric C. Larson, Xavier Roumegue:
Real-Time Edge Processing Detection of Malicious Attacks Using Machine Learning and Processor Core Events. 1-8 - Milton F. Chagas Júnior, Gabriel T. Jesus

, Irineu S. Yassuda, Feliciano Silva, Marcos Nóbrega, Pedro M. Sousa:
A proposal for success criteria and categorization system to a technology introduction program for Oil and Gas innovation projects. 1-8 - Nelson Vithayathil Varghese, Qusay H. Mahmoud:

Optimization of Deep Reinforcement Learning with Hybrid Multi-Task Learning. 1-8 - Marian Mistler, Nadine Schlüter, Manuel Löwer:

Analysis of software tools for model-based Generic Systems Engineering for organizations based on e-DeCoDe. 1-8 - Jean Araujo

, Carlos Melo, Felipe Oliveira, Paulo Pereira, Rúbens de Souza Matos Júnior:
A Software Maintenance Methodology: An Approach Applied to Software Aging. 1-8 - Christos Kotronis

, Anargyros Tsadimas
, Mara Nikolaidou:
Providing Designers with Automated Decision-Making within SysML Models to Promote Efficient Model-Based Systems Design. 1-8 - Hua Fan, Huajiang Xie, Jiangmin Mao, Jianming Liu, Xiaopeng Diao, Qi Wei, Quanyuan Feng:

Modelling of Using Hall Magnetic Sensor for Environmental Monitor of Micrometer-Sized Magnetite Particles. 1-4 - Mathieu Muzellec, Paul Vivot, Rob A. Vingerhoeds, Pierre de Saqui-Sannes:

Towards a combination of MARTE and ECOA. 1-8 - Burak Celen

, Ayse Cisel Aras, Markus Dohr, Thyagesh Sivaraman:
Equivalent Circuit Modeling of All-Solid-State Battery by using DC-IR Data. 1-6 - Dean Beale, Theo Tryfonas:

An Initial Set of Heuristics for Handling Organizational Complexity. 1-8 - Ronald E. Giachetti, Warren K. Vaneman:

Requirements for a System Model in the Context of Digital Engineering. 1-7 - Moeen Mostafavi, Maria Phillips, Yichen Jiang, Michael D. Porter

, Paul Freedman:
A tale of two metrics: Polling and financial contributions as a measure of performance. 1-6 - Joe Cecil, Sam Kauffman, Avinash Gupta, Vern McKinney, Miguel Pirela-Cruz:

Design of a Human Centered Computing (HCC) based Virtual Reality Simulator to train First Responders Involved in the COVID-19 Pandemic. 1-7 - Paola Di Maio

:
System Level Knowledge Representation for Complexity. 1-6 - Admilson de Ribamar Lima Ribeiro, Reneilson Yves Carvalho Santos, Anderson Clayton Alves Nascimento:

Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms. 1-7 - Ana Farhat, Ka C. Cheok:

Novel Approach in Labeling Data for Classification of Warning Level While Driving. 1-7 - Yue Guan, Naser Ezzati-Jivan:

Malware System Calls Detection Using Hybrid System. 1-8 - Lauren Kiser, Luis Daniel Otero:

Using AHP to Choose Optimal Nuclear Power Plant Design. 1-6 - Pierre-Alain Yvars, Laurent Zimmer:

Integration of Constraint Programming and Model-Based Approach for System Synthesis. 1-8 - Thiago H. Sato, Sergio Ronaldo Barros dos Santos, André Marcorin de Oliveira, Fábio A. M. Cappabianco, Sidney N. Givigi:

Experimental Validation of a Steering Control System using an Adaptive Fuzzy Controller and Computer Vision. 1-8 - Joel Muteba Kande, Rami S. Abielmona, Moufid Harb, Jean Berger, Rafael Falcon, Emil M. Petriu:

Multi-Objective Heterogeneous Multi-Asset Collection Scheduling Optimization with High-Level Information Fusion. 1-8 - Imtiaz Ullah

, Qusay H. Mahmoud:
Network Traffic Flow Based Machine Learning Technique for IoT Device Identification. 1-8 - Charles A. Meehan, John S. Baras:

Model-Based Systems Engineering Applied to the Detection and Correction of Object Slippage within a Dexterous Robotic Hand. 1-13 - Ryan Duke, Alex Doboli:

diaLogic: Interaction-Focused Speaker Diarization. 1-8 - Sepehr Keykhaie, Samuel Pierre:

A Generic Model for Privacy-Preserving Authentication on Smartphones. 1-7 - Diogo Lages, Eric Borba

, Jean Araujo
, Eduardo Tavares, Erica Sousa:
Energy Consumption Evaluation of LPWAN: A Stochastic Modeling Approach for IoT Systems. 1-8 - Talysson Manoel de Oliveira Santos

, Jordão Natal de Oliveira Júnior, Michel Bessani
, Carlos Dias Maciel:
CO2 Emissions Forecasting in Multi-Source Power Generation Systems Using Dynamic Bayesian Network. 1-8 - Holly A. H. Handley, Wael Khallouli, Jingwei Huang

, William Edmonson, Nadew Kibret:
Maintaining the Consistency of SysML Model Exports to XML Metadata Interchange (XMI). 1-8 - Jacqueline Heaton, Sidney Givigi:

Systems Design for EEG Signal Classification of Sensorimotor Activity Using Machine Learning. 1-7 - Vitor A. M. Jorge, Pedro Daniel de Cerqueira Gava, Juan Ramon Belchior de França Silva, Thais Mancilha, Waldir Vieira, Geraldo José Adabo, Cairo L. Nascimento Jr.

:
VITA1: An Unmanned Underwater Vehicle Prototype for Operation in Underwater Tunnels. 1-8 - Ying Li, Chunchao Liang:

Energy-aware Trajectory Planning Model for Mission-oriented Drone Networks. 1-7 - Deepak Saggu, Akramul Azim:

Transfer Learning on the Edge Networks. 1-8 - Jasser Alharbi, Siddhartha Bhattacharyya:

Machine Learning with System/Software Engineering in Selection and Integration of Intelligent Algorithms. 1-7 - Maryam Shirbeigi, Bardia Safaei, Ali Asghar Mohammad Salehi, Amir Mahdi Hosseini Monazzah

, Jörg Henkel, Alireza Ejlali:
A Cluster-Based and Drop-aware Extension of RPL to Provide Reliability in IoT Applications. 1-7 - Fabiana Figueira Sanches Flores, Silvio Romero de Lemos Meira:

(UN)Ethical Software Engineering : A critical review about Software Engineering in face of Security Requirements in the IoT/ IoE Society. 1-8 - Majid Afshar, Saeed Samet, Hamid Usefi:

Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning. 1-8 - William Brooks, V. Chandrasekar, Greg Pratt, Robert Cifelli:

A Model Based Systems Engineering Approach for Behavioral Responses to Advanced Quantitative Precipitation Information. 1-6 - Michael Lescisin, Qusay H. Mahmoud:

SocialSDN: Design and Implementation of a Secure Internet Protocol Tunnel Between Social Connections. 1-8 - Zaeem Anwaar, Muhammad Rashid

, Farooque Azam, Muhammad Waseem Anwar
, Yawar Rasheed
, Maryum Humdani:
A Model Based Neurorehabilitation (MBN) Framework using Kinect. 1-6 - Arvind Kumar, Rakesh Matam, Mithun Mukherjee:

Time Optimal Concurrent Data collection Trees for IoT Applications. 1-7 - Cinda Chullen, Roshanak Nilchiani:

Infusion Complexity: Understanding the Need to Measure Infusion Success of Advanced Technologies into Complex Systems. 1-8 - Francis Giraldeau, Naser Ezzati-Jivan, Michel R. Dagenais:

System execution path profiling using hardware performance counters. 1-8 - Paul C. Hershey:

Method for Self-Healing Course of Action Revision (SCOAR). 1-6 - Nitin Naik:

Performance Evaluation of Distributed Systems in Multiple Clouds using Docker Swarm. 1-6 - Moneeb Abbas, Muhammad Rashid

, Farooque Azam, Yawar Rasheed
, Muhammad Waseem Anwar
, Maryum Humdani:
A Model-Driven Framework for Security Labs using Blockchain Methodology. 1-7 - Abdullah Yasin Nur

, Mehmet Engin Tozal:
Single Packet AS Traceback against DoS Attacks. 1-8 - Ramakrishnan Raman

, Natasha Yogananda Jeppu:
Does The Complex SoS Have Negative Emergent Behavior? Looking For Violations Formally. 1-7 - Stephan Baumgart, Yin Chen, Rasmus Hamrén, Sasikumar Punnekkat:

A Model-Based Approach to Document Software Toolchains for Supporting a Safety Analysis. 1-7 - Riley Magee, Sidney Givigi:

A System For P300 Detection Applied To Vehicle Navigation. 1-8 - Jeremy Straub:

Evaluating the Use of Technology Readiness Levels (TRLs) for Cybersecurity Systems. 1-6 - Muhammad Usman Farooq, Muhammad Rashid

, Farooque Azam, Yawar Rasheed
, Muhammad Waseem Anwar
, Zohaib Shahid:
A Model-Driven Framework for the Prevention of DoS Attacks in Software Defined Networking (SDN). 1-7 - Kádna Camboim, João Ferreira, Carlos Melo, Jean Araujo

, Fernanda M. R. Alencar, Paulo Romero Martins Maciel:
Dependability and Sustainability Evaluation of Data Center Electrical Architectures. 1-8 - M. H. K. R. Rathnayaka, W. K. C. R. Watawala, M. G. Manamendra, S. R. R. M. Silva, Dharshana Kasthurirathna, Thilini Jayalath:

Cognitive Rehabilitation based Personalized Solution for Dementia Patients using Reinforcement Learning. 1-6 - Trevor Robin Smith

, Spencer Ploeger
, Benjamin Dyer:
Investigation of Real-Time Task Scheduling on Robot Fleets with Reconfigurable Actuators. 1-5 - Hua Fan, Zonglin Li, Quanyuan Feng, Qi Wei:

Strengthening the Practical Capacity of Students: an Educational Case Study about Teaching Feedback in Electronics Circuit. 1-5 - Michael F. Marchini

:
Distributed Ledgers in Developing Large-Scale Integrated Systems. 1-8 - Moeen Mostafavi, Michael D. Porter

:
How emoji and word embedding helps to unveil emotional transitions during online messaging. 1-8 - Dina Nawara

, Rasha Kashef:
Deploying Different Clustering Techniques on a Collaborative-based Movie Recommender. 1-6 - Jean-Charles Chaudemar

, Pierre de Saqui-Sannes:
MBSE and MDAO for Early Validation of Design Decisions: a Bibliography Survey. 1-8 - Mohammad S. Jassas, Qusay H. Mahmoud:

A Failure Prediction Model for Large Scale Cloud Applications using Deep Learning. 1-8 - Manuel Patchou, Benjamin Sliwa, Christian Wietfeld

:
Flying Robots for Safe and Efficient Parcel Delivery Within the COVID-19 Pandemic. 1-7 - Alfredo Menezes Vieira, Rúbens de Souza Matos Júnior, Admilson de Ribamar Lima Ribeiro:

Systematic Mapping on Prevention of DDoS Attacks on Software Defined Networks. 1-8 - Michael D. Prendergast:

Automated Extraction and Classification of Slot Machine Requirements from Gaming Regulations. 1-6 - Ronierison Maciel, Jean Araujo

, Carlos Melo, Paulo Pereira, Jamilson Dantas, Júlio Mendonça
, Paulo Maciel:
Impact Evaluation of DDoS Attacks Using IoT Devices. 1-8 - Jennifer Dawson, Divya Garikapati

:
Extending ISO26262 to an Operationally Complex System. 1-7 - Imali T. Hettiarachchi, Samer Hanoun, Rakesh Veerabhadrappa

, Dawei Jia, Simon Hosking
, Asim Bhatti:
Performance Quantification and Heart Rate Analysis in A Repeated-trial Simulation-based Training Task. 1-7 - Hen-Geul Yeh

, Donald C. D. Chang:
Multi Base Stations to Multi Mobile Units: Green Communication Systems via A Wavefront Multiplexing Technique. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














