Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:52pm
networked storage system prototype
X-code-based parallel storage systems
X-code-based optimal recovery scheme
System recovery
storage management
single disk failure recovery algorithm
Reliability
redundancy coding schemes
Redundancy
recovery algorithm
Peer to peer computing
Parallel storage systems
parallel memories
optimal update complexity
optimal single-disk failure recovery
arrays
minimum-disk-read-recovery
MDRR
logical encoding scheme
Load management
encoding
double-fault tolerant coding scheme
disc storage
data communication
data centers
data availability
Complexity theory
coding theory
cloud storage
biblio
SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
ISP
VoIP service
unique sequence signatures
transport protocols
telecommunication traffic
SkyTracer
Skype UDP flow
Skype
Sequence Signature
Protocols
Payloads
optimisation
network performance optimization
Accuracy
IP networks
Internet telephony
internet
information security
host level identification
Flow-level Identification
fine grained Skype traffic identification accuracy
Educational institutions
digital signatures
Correlation-based Approach
computer network performance evaluation
Complexity theory
biblio
Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers
Submitted by BrandonB on Wed, 05/06/2015 - 10:24am
HTTP protocol
transport protocols
traffic IP-flow analysis
telecommunication traffic
Softflowd
Protocols
Payloads
NetFlow
naive Bayes algorithm
machine learning based analysis
machine learning approach
machine learning algorithms
learning (artificial intelligence)
IP networks
IP flows
hypermedia
Bayes methods
HTTP filters
flow-based network traffic
feature extraction
destructive threats
Decision trees
cyber security
computer network security
Complexity theory
command and communication protocol
Classification algorithms
C4.5 learning algorithm based classifier
C&C protocol
Botnet detection
botnet behaviour analysis
biblio
Vulnerability Assessment in Autonomic Networks and Services: A Survey
Submitted by BrandonB on Wed, 05/06/2015 - 9:51am
Computers
vulnerability management process
Vulnerability Management
vulnerability assessment
security risks
security attacks
security
Monitoring
fault tolerant computing
Autonomic computing
computer security
computer network security
Complexity theory
Business
Autonomic systems
autonomic services
autonomic networks
autonomic management plane
biblio
Moving-Target Defenses for Computer Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:15am
attack
Complexity theory
Computer crime
computer network protection
computer network security
computer security
Cyberspace
moving-target defense
moving-target defenses
MTD
network security
security approach
static target
system security
target
target tracking
biblio
Towards adapting metamodelling technique for database forensics investigation domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
DBMS
software engineering domain
Servers
security
Organizations
model
metamodelling technique
Metamodelling
Metamodel
Forensics
Digital Forensics
Complexity theory
DBF metamodel
DBF complex knowledge processes
Database systems
database system integrity protection
database system confidentiality protection
database management systems
database forensics investigation domain
Database forensic investigation
Database forensic
data privacy
biblio
Conceptual framework for high-end graphical password
Submitted by BrandonB on Tue, 05/05/2015 - 8:54am
graphical user interfaces
user performance experimental analysis
user authentication
usability
text-based alphanumerical passwords
secure password
Proposals
Human Factors
high-end graphical password
authentication
graphical password method
Graphical Password
Face
Databases
Complexity theory
Communications technology
authorisation
biblio
A framework for characterisation of complex systems and system of systems
Submitted by BrandonB on Mon, 05/04/2015 - 2:43pm
Ontologies
Unified modeling language
Systems engineering and theory
Systems
system-of-systems characterisation
system of systems
Rail transportation
quantitative characterization
programming
Ontology
ontologies (artificial intelligence)
Aggregates
Metrics
Measurement
Indexes
formal development
emergence notion
Complexity theory
complexity
complex systems characterisation
collaboration
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics
biblio
Background-Modeling-Based Adaptive Prediction for Surveillance Video Coding
Submitted by BrandonB on Fri, 05/01/2015 - 9:31am
Decoding
video surveillance
video coding
surveillance video compression ratio
Surveillance video
surveillance
Object oriented modeling
MPEG-4 advanced video coding
Image coding
high-efficiency surveillance video coding technology
foreground-background-hybrid blocks
foreground prediction efficiency
foreground coding performance
exponential growth
encoding complexity
encoding
AVC
data compression
Complexity theory
BRP
BMAP method
block classification
BDP
background-modeling-based adaptive prediction method
background reference prediction
background reference
background prediction efficiency
background pixels
background modeling
background difference prediction
background difference
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »