Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Research on the Simulation Algorithm of Object-Oriented Language
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
write-back cache
visualization
system analysis and design
static protection
simulation algorithm
security model
safety-critical software
Resiliency
resilience
pure object oriented language
pubcrawl
process language
object-oriented programming
cache storage
Object-Oriented Language
object oriented security
Object oriented modeling
mixed object oriented language
Metrics
low-energy independence complexity theory
Local area networks
inheritance
GUT
Extraterrestrial measurements
dynamic protection
composability
Complexity theory
biblio
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking
Submitted by grigby1 on Mon, 04/06/2020 - 2:22pm
Proposals
network node
O2CEMF
off-path cache exploration
off-path cached content
off-path cached copies
off-path caches
On-demand exploration
original content publisher
network coding
pubcrawl
reachability information
Receivers
resilience
Resiliency
Routing
telecommunication network routing
cache storage
NC-NDN
named data networking
multiple on-path routes
multipath forwarding strategy
multipath forwarding
Metrics
internet
in-network caching
in-network caches
cyber physical systems
content delivery performance
computer networks
computer network security
composability
Complexity theory
biblio
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
DIP-generation attack
pattern locks
SigAttack
SAT-resilient encryptions
piracy
logic encryption design
key-revealing signature
high-level SAT-based attack
hardware protection technique
Electronics packaging
distinguishing input pattern generation
Scalability
Error analysis
logic design
Logic gates
Complexity theory
attacks
pubcrawl
Human behavior
Resiliency
Hardware
Cryptography
biblio
Privacy-Enabled Recommendations for Software Vulnerabilities
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
vulnerability profiles
vulnerability prioritization data
software vulnerabilities
software reliability
Software
slow process
SGX
security of data
security
Scalability
Resiliency
Complexity theory
recommender system
recommender
pubcrawl
privacy-enabled recommendations
privacy
Organizations
malicious operator
Human Factors
data privacy
data integrity
costly process
biblio
Incremental Abstraction for Diagnosability Verification of Modular Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
fault diagnosis
uncertain loops
simple detector automata
scalable production system
polynomial complexity
parallel lines
nonblocking
Modular systems
modular system
incremental abstraction
forbidden loops
Discrete-Event Systems
diagnosability verification
diagnosability
abstraction
scalable verification
Detectors
verification
formal verification
Compositionality
Predictive Metrics
Production systems
Scalability
automata
Complexity theory
computational complexity
control systems
feedback
Synchronization
pubcrawl
Resiliency
biblio
Input Elimination Transformations for Scalable Verification and Trace Reconstruction
Submitted by aekwall on Mon, 03/16/2020 - 10:38am
2QBF variant
verification scalability
verification complexity
trace reconstruction
scalable verification
netlist transformations
merging
input reparameterization
input elimination transformations
fast- lossy preprocess
Cost accounting
connectivity verification
Resiliency
model checking
formal verification
Registers
Compositionality
Predictive Metrics
Scalability
Logic gates
Complexity theory
computational complexity
pubcrawl
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Deliberative and Affective Reasoning: a Bayesian Dual-Process Model
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
Intelligent Agents
affective reasoning
Artificial agents
BayesAct agents
Bayesian dual-process model
computationally tractable model
decision theoretic reasoning
emotional level
free energy
human experience
human social networks
affective alignment
intelligent computational agents
plausible model
social experiences
social order
social sciences computing
social-psychological Bayesian affect control theory
social-psychological theory
socio-technical system
sociological theory
technological agents
inference mechanisms
Bayes methods
pubcrawl
Computational modeling
multi-agent systems
collaboration
chatbots
Complexity theory
cognition
Human Factors
Markov Decision Process
Scalability
Artificial Intelligence
Biological system modeling
affective computing
human interaction
social interactions
psychology
Social Agents
active inference
affect control theory
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
multiplication
Task Analysis
subtraction
Scalability
Resiliency
residual classes
residual class system
Redundancy
pubcrawl
positive number
number theory
no-fault operations
negative number
natural redundancy
natural number
addition
Mathematical model
integer arithmetic operations
exponentiation
digital arithmetic
Data processing
data compression
Conferences
computer systems and components
computer systems
Complexity theory
artificial redundancy
arithmetic operations
arbitrary power
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »