Page 85 - 《软件学报》2021年第12期
P. 85
王博 等:SSRules:让智能家居自动化规则更易于编写和检查 3749
[7] Brich J, Walch M, Rietzler M, et al. Exploring end user programming needs in home automation. ACM Trans. on Computer-
Human Interaction, 2017,24(2):11:1−11:35. [doi: 10.1145/3057858]
[8] Ghiani G, Manca M, Paternò F, et al. Personalization of context-dependent applications through trigger-action rules. ACM Trans.
on Computer-Human Interaction, 2017,24(2):14:1−14:33. [doi: 10.1145/3057861]
[9] Oswald E. IFTTT competitor stringify gets a major update. 2016. https://www.techhive.com/article/3086988/ifttt-competitor-
stringify-gets-a-major-update.html
[10] Gruber J. Codeless automation: IFTTT vs zapier vs microsoft flow. 2018. https://medium.com/better-programming/codeless-
automation-ifttt-vs-zapier-vs-microsoft-flow-57d5bc56fc0e
[11] Rahmati A, Fernandes E, Jung J, et al. IFTTT vs. zapier: A comparative study of trigger-action programming frameworks, 2017.
https://arxiv.org/abs/1709.02788
[12] Brice. Announcing SmartRules 2.0. 2016. http://smartrulesapp.com/2016/04/26/announcing-smartrules-2-0/
[13] Nacci A, Rana V, Balaji B, et al. BuildingRules: A trigger-action–based system to manage complex commercial buildings. ACM
Trans. on Cyber-Physical Systems, 2018,2(2). [doi: 10.1145/3185500]
[14] Wang Q, Datta P, Yang W, et al. Charting the attack surface of trigger-action IoT platforms. In: Proc. of the ACM Conf. on
Computer and Communications Security. New York: Association for Computing Machinery, 2019. 1439−1453. [doi: 10.1145/
3319535.3345662]
[15] Zhang L, He W, Martinez J, et al. AutoTap: Synthesizing and repairing trigger-action programs using LTL properties. In: Proc. of
the Int’l Conf. on Software Engineering. 2019. 281−291. [doi: 10.1109/ICSE.2019.00043]
[16] Bu L, Xiong W, Liang CJM, et al. Systematically ensuring the confidence of real-time home automation IoT systems. ACM Trans.
on Cyber-Physical Systems, 2018,2(3):1−23. [doi: 10.1145/3185501]
[17] Brackenbury W, Deora A, Ritchey J, et al. How users interpret bugs in trigger-action programming. In: Proc. of the Conf. on
Human Factors in Computing Systems. 2019. [doi: 10.1145/3290605.3300782]
[18] De Moura L, Bjørner N. Z3: An efficient SMT solver. In: Ramakrishnan CR, Rehof J, eds. Proc. of the Tools and Algorithms for
the Construction and Analysis of Systems. Berlin, Heidelberg: Springer, 2008. 337−340.
[19] Celik ZB, Tan G, McDaniel P. IoTGuard: Dynamic enforcement of security and safety policy in commodity IoT. In: Proc. of the
26th Annual Network and Distributed System Security Symp. 2019. [doi: 10.14722/ndss.2019.23326]
[20] Brush AJB, Lee B, Mahajan R, et al. Home automation in the wild: Challenges and opportunities. In: Proc. of the Conf. on Human
Factors in Computing Systems. New York: Association for Computing Machinery, 2011. 2115−2124. [doi: 10.1145/1978942.
1979249]
[21] Yarosh S, Zave P. Locked or not? Mental models of IoT feature interaction. In: Proc. of the Conf. on Human Factors in Computing
Systems. 2017. 2993−2997. [doi: 10.1145/3025453.3025617]
[22] Liang CJM, Bu L, Li Z, et al. Systematically debugging IoT control system correctness for building automation. In: Proc. of the 3rd
ACM Conf. on Systems for Energy-Efficient Built Environments (BuildSys 2016). 2016. 133−142. [doi: 10.1145/2993422.2993426]
[23] Dey AK, Sohn T, Streng S, et al. iCAP: Interactive prototyping of context-aware applications. LNCS 3968, 2006. 254−271. [doi:
10.1007/11748625_16]
[24] Zave P, Cheung E, Yarosh S. Toward user-centric feature composition for the Internet of things. arXiv preprint arXiv:1510.06714,
2015.
[25] Cao J, Rector K, Park TH, et al. A debugging perspective on end-user mashup programming. In: Proc. of the 2010 IEEE Symp. on
Visual Languages and Human-Centric Computing (VL/HCC 2010). 2010. 149−156. [doi: 10.1109/VLHCC.2010.29]
[26] Nandi C, Ernst MD. Automatic trigger generation for rule-based smart homes. In: Proc. of the 2016 ACM Workshop on
Programming Languages and Analysis for Security. New York: Association for Computing Machinery, 2016. 97−102. [doi: 10.
1145/2993600.2993601]
[27] Wang Q, Hassan WU, Bates A, et al. Fear and logging in the Internet of things. In: Proc. of the 22nd Network and Distributed
Security Symp. 2018. [doi: 10.14722/ndss.2018.23282]
[28] Corno F, De Russis L, Roffarello AM. EUDoptimizer: Assisting end users in composing if-then rules through optimization. IEEE
Access, 2019,7:37950−37960. [doi: 10.1109/ACCESS.2019.2905619]