Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
Simplified Calculation of Bhattacharyya Parameters in Polar Codes
Submitted by aekwall on Mon, 03/15/2021 - 11:55am
error probability
Reliable channel
nonsystematic polar code
N polarizing channels
memoryless systems
K most reliable polarizing channels
complementary channel condition
code construction
channel reliability
calculated complexity
binary erasure channel
Bhattacharyya parameters
Bhattacharyya Parameter method
Bhattacharyya parameter
BEC channel
Maximum likelihood decoding
Resiliency
block codes
telecommunication network reliability
polar codes
error correction codes
encoding
Complexity theory
computational complexity
error statistics
channel coding
channel capacity
Reliability
Metrics
composability
pubcrawl
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 3:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Can We Predict the Quality of Spectrum-based Fault Localization?
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
fault diagnosis
work factor metrics
static test suite
static test metrics
spectrum-based fault localization
prediction model
potential effectiveness
fault-related metrics
fault localization techniques
fault localization effectiveness
effective fault localization
dynamic test suite
dynamic test metrics
debugging
automated fault localization
Scalability
Couplings
software fault tolerance
software metrics
program debugging
Predictive models
Complexity theory
Measurement
machine learning
program testing
tools
Metrics
pubcrawl
Resiliency
Electronic mail
biblio
POLANCO: Enforcing Natural Language Network Policies
Submitted by aekwall on Mon, 02/22/2021 - 1:39pm
campus network
public university Websites
printers
policy language for campus operations
POLANCO
network policy
Natural languages
natural language policies
natural language network policies
human-readable network policy definition language
high-level language
high-level human-readable natural language
high-level human readable language
high level languages
campus networks
computer network security
Educational institutions
Software Defined Networks
Complexity theory
SDN
natural language processing
pubcrawl
Human behavior
Resiliency
software defined networking
Software
security
authorisation
Servers
Scalability
biblio
Modeling of Trust Within a Human-Robot Collaboration Framework
Submitted by grigby1 on Wed, 02/03/2021 - 1:45pm
Physical performance
trust
Task Analysis
simulation
robots
Robot Trust
Resiliency
resilience
pubcrawl
Predictive models
Cognitive performance
Mathematical model
Human-Robot Collaboration (HRC)
human-machine teaming
Human Factors
Human behavior
dynamic model
Complexity theory
collaboration
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
pubcrawl
wireless transmission
Temperature measurement
Software algorithms
Software
smart phones
Scalability
RSA
Resiliency
resilience
android encryption
Metrics
Human behavior
Energy Efficiency
encryption
Diffie-Hellman algorithm
Cybersecurity
computer security
Complexity theory
asymmetric encryption/decryption algorithm
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »