Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Citation
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos. "Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks". IEEE Transactions on Network Science and Engineering, 2017; (Under review).

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon
    Koutsoukos. <a
    href="http://www.cps-forces.org/pubs/242.html"
    >Scheduling Resource-Bounded Monitoring Devices for Event
    Detection and Isolation in Networks</a>, <i>IEEE
    Transactions on Network Science and Engineering</i>, 
    2017; (Under review).
  • Plain text
    Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon
    Koutsoukos. "Scheduling Resource-Bounded Monitoring
    Devices for Event Detection and Isolation in Networks".
    <i>IEEE Transactions on Network Science and
    Engineering</i>,  2017; (Under review).
  • BibTeX
    @article{AbbasLaszkaVorobeychikKoutsoukos17_SchedulingResourceBoundedMonitoringDevicesForEventDetection,
        author = {Waseem Abbas and Aron Laszka and Yevgeniy
                  Vorobeychik and Xenofon Koutsoukos},
        title = {Scheduling Resource-Bounded Monitoring Devices for
                  Event Detection and Isolation in Networks},
        journal = {IEEE Transactions on Network Science and
                  Engineering},
        year = {2017},
        note = {(Under review)},
        abstract = {(No abstract.)},
        URL = {http://cps-forces.org/pubs/242.html}
    }
    

Posted by Waseem Abbas on 2 Mar 2017.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.