Page 85 - 《软件学报》2021年第12期
P. 85

王博  等:SSRules:让智能家居自动化规则更易于编写和检查                                                 3749


          [7]    Brich  J, Walch  M, Rietzler M,  et al.  Exploring  end user programming needs in home  automation. ACM Trans. on  Computer-
             Human Interaction, 2017,24(2):11:1−11:35. [doi: 10.1145/3057858]
          [8]    Ghiani G, Manca M, Paternò F, et al. Personalization of context-dependent applications through trigger-action rules. ACM Trans.
             on Computer-Human Interaction, 2017,24(2):14:1−14:33. [doi: 10.1145/3057861]
          [9]    Oswald E.  IFTTT competitor stringify  gets a major update.  2016.  https://www.techhive.com/article/3086988/ifttt-competitor-
             stringify-gets-a-major-update.html
         [10]     Gruber J.  Codeless  automation: IFTTT vs  zapier vs  microsoft flow. 2018. https://medium.com/better-programming/codeless-
             automation-ifttt-vs-zapier-vs-microsoft-flow-57d5bc56fc0e
         [11]     Rahmati A, Fernandes E, Jung J, et al. IFTTT vs. zapier: A comparative study of trigger-action programming frameworks, 2017.
             https://arxiv.org/abs/1709.02788
         [12]     Brice. Announcing SmartRules 2.0. 2016. http://smartrulesapp.com/2016/04/26/announcing-smartrules-2-0/
         [13]     Nacci A, Rana V, Balaji B, et al. BuildingRules: A trigger-action–based system to manage complex commercial buildings. ACM
             Trans. on Cyber-Physical Systems, 2018,2(2). [doi: 10.1145/3185500]
         [14]     Wang Q,  Datta  P, Yang W,  et al.  Charting  the  attack  surface of trigger-action IoT platforms.  In: Proc. of the  ACM  Conf. on
             Computer and Communications  Security. New  York: Association  for Computing Machinery,  2019.  1439−1453. [doi: 10.1145/
             3319535.3345662]
         [15]     Zhang L, He W, Martinez J, et al. AutoTap: Synthesizing and repairing trigger-action programs using LTL properties. In: Proc. of
             the Int’l Conf. on Software Engineering. 2019. 281−291. [doi: 10.1109/ICSE.2019.00043]
         [16]     Bu L, Xiong W, Liang CJM, et al. Systematically ensuring the confidence of real-time home automation IoT systems. ACM Trans.
             on Cyber-Physical Systems, 2018,2(3):1−23. [doi: 10.1145/3185501]
         [17]     Brackenbury  W, Deora  A, Ritchey J,  et al.  How users interpret bugs in trigger-action programming.  In: Proc. of the  Conf. on
             Human Factors in Computing Systems. 2019. [doi: 10.1145/3290605.3300782]
         [18]     De Moura L, Bjørner N. Z3: An efficient SMT solver. In: Ramakrishnan CR, Rehof J, eds. Proc. of the Tools and Algorithms for
             the Construction and Analysis of Systems. Berlin, Heidelberg: Springer, 2008. 337−340.
         [19]     Celik ZB, Tan G, McDaniel P. IoTGuard: Dynamic enforcement of security and safety policy in commodity IoT. In: Proc. of the
             26th Annual Network and Distributed System Security Symp. 2019. [doi: 10.14722/ndss.2019.23326]
         [20]     Brush AJB, Lee B, Mahajan R, et al. Home automation in the wild: Challenges and opportunities. In: Proc. of the Conf. on Human
             Factors  in  Computing Systems.  New York: Association for  Computing Machinery, 2011. 2115−2124. [doi: 10.1145/1978942.
             1979249]
         [21]     Yarosh S, Zave P. Locked or not? Mental models of IoT feature interaction. In: Proc. of the Conf. on Human Factors in Computing
             Systems. 2017. 2993−2997. [doi: 10.1145/3025453.3025617]
         [22]     Liang CJM, Bu L, Li Z, et al. Systematically debugging IoT control system correctness for building automation. In: Proc. of the 3rd
             ACM Conf. on Systems for Energy-Efficient Built Environments (BuildSys 2016). 2016. 133−142. [doi: 10.1145/2993422.2993426]
         [23]     Dey AK, Sohn T, Streng S, et al. iCAP: Interactive prototyping of context-aware applications. LNCS 3968, 2006. 254−271. [doi:
             10.1007/11748625_16]
         [24]     Zave P, Cheung E, Yarosh S. Toward user-centric feature composition for the Internet of things. arXiv preprint arXiv:1510.06714,
             2015.
         [25]     Cao J, Rector K, Park TH, et al. A debugging perspective on end-user mashup programming. In: Proc. of the 2010 IEEE Symp. on
             Visual Languages and Human-Centric Computing (VL/HCC 2010). 2010. 149−156. [doi: 10.1109/VLHCC.2010.29]
         [26]     Nandi  C,  Ernst  MD.  Automatic trigger generation for rule-based smart homes.  In: Proc. of  the 2016  ACM  Workshop on
             Programming Languages and Analysis for Security. New York: Association for Computing Machinery, 2016. 97−102. [doi: 10.
             1145/2993600.2993601]
         [27]     Wang Q, Hassan WU, Bates A, et al. Fear and logging in the Internet of things. In: Proc. of the 22nd Network and Distributed
             Security Symp. 2018. [doi: 10.14722/ndss.2018.23282]
         [28]     Corno F, De Russis L, Roffarello AM. EUDoptimizer: Assisting end users in composing if-then rules through optimization. IEEE
             Access, 2019,7:37950−37960. [doi: 10.1109/ACCESS.2019.2905619]
   80   81   82   83   84   85   86   87   88   89   90