Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed processing
biblio
An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
parallel processing
faster query execution
high memory footprint
in-memory indexes
K-NN search
MatDot codes
matrix multiplication
model parallelism
model-parallel architecture
MRPT
multiple random projection trees
nearest neighbor estimation
fast k-nearest neighbors
query response time
query time
single compute node
single processing node
storage constraints
storage-optimal MatDot Codes
storage-optimal recovery threshold
straggler and failure tolerance
straggler-prone environment
Systematics
worker nodes
nearest neighbor search
Indexes
Data models
Computational modeling
Big Data
trees (mathematics)
Metrics
Measurement
nearest neighbour methods
data storage
query processing
mathematics computing
pubcrawl
high-dimensional data
Approximation algorithms
approximate nearest neighbor algorithms
candidate points
coded computing
coded matrix multiplication
computation efforts
computation strategy
distributed computing cluster
distributed processing
Euclidean distance calculations
biblio
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
edge computing
Human Factors
Pervasive Computing Security
wide area network
process modules
process control
platform controller
IoT platform
edge nodes
distributed processing
data-processing flows
container-based virtualization technology
container technology
encryption
Containers
IoT
Human behavior
resilience
Resiliency
Metrics
pubcrawl
Virtualization
virtualisation
Scalability
computer network security
Internet of Things
biblio
PatMat: A Distributed Pattern Matching Engine with Cypher
Submitted by grigby1 on Tue, 01/21/2020 - 12:04pm
cyber physical systems
Cypher
distributed processing
graph database
graph pattern matching
join optimization
Lightweight Ciphers
pubcrawl
resilience
Resiliency
Scalability
biblio
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
security of data
internet
knowledge graph
pubcrawl
resilience
Resiliency
Scalability
SCTD
security knowledge-based defense mechanism
information-centric networking
semantic obfuscation
semantic reasoning
semantic relations
Semantics
smart based defense mechanism
smart reasoning algorithms
smart reasoning based content threat defense
subscription-based naming mechanism
Extranets
cognition
computer architecture
content semantic awareness
content threats
content-based defense mechanism
context communication content
distributed processing
edge computing
blacklisting
fog computing based defense mechanism
ICN edge defense system
ICN protocols
ICN semantic features
inference mechanisms
Information Centric Network
Information Centric Networks
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
biblio
A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Submitted by aekwall on Mon, 12/30/2019 - 12:15pm
UBP
privacy
pubcrawl
Resiliency
Scalability
secure vehicular platform
security mechanism
Traffic congestion
traffic engineering computing
Prediction algorithms
user behavior profiling
VANET
VCC
vehicle computing service requests
vehicle storing service requests
vehicular cloud computing
vehicular cloud servers
Vehicular fog computing
edge computing
security
Cloud Computing
computer architecture
data privacy
Data processing
data servers
Decoy technology
distributed processing
Fog computing
encryption
energy consumption reduction
Fog Computing and Security
fog computing architecture
fog computing system
Monitoring
power aware computing
biblio
Pedigree-Ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments
Submitted by grigby1 on Wed, 03/06/2019 - 4:26pm
Data-driven big Data privacy
target big data repositories
summary data representatives
security-inspired protocols
security of data
pubcrawl
Protocols
protocol checking
Proposals
distributed processing
distributed environments
Distributed databases
data-driven privacy-preserving big data management
Big Data
data-driven aggregate-provenance privacy preserving big multidimensional data
data privacy
Data models
data analysis
computational overheads
Cloud Computing
Big Multidimensional Data
Big Distributed Data
Big Data Systems
big data privacy
Big Data Applications
biblio
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
security of data
Pervasive Computing Security
pubcrawl
resilience
Resiliency
security
security analytics
security events
security information and event management system
persists event data
security operator
security-related event logs
security-related events
SIEM
storage management
Storms
Throughput
tuning options
distribution frameworks
Big Data
Big Data challenge
composability
custom-built distribution solution
cyber-attacks
Distributed databases
distributed processing
distributed SIEM platform
Autonomic Security
event processing
in memory database
in-memory database
in-memory platform
malicious activities
normalization
persistence speed
biblio
Program-flow attestation of IoT systems software
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
malware
TrustZone
static attestation phase
static
software modification
security of data
security
Runtime
Resiliency
remote software-based attestation mechanisms
Remote Attestation
pubcrawl
programming
program-flow attestation
Program-Flow
Memory management
application program flow
IoT systems software
IoT
Internet of Things
impractical constraints
Human behavior
hardware devices
Hardware
dynamic attestation technique
dynamic
Dual Attestation
distributed processing
device integrity measurement
data integrity
composability
attestation
biblio
Evolving Risk Management Against Advanced Persistent Threats in Fog Computing
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
evolutionary computation
advanced persistent threats
advanced persistent threats attack
Advanced Persistent Threats attacks
cyber risk management
cyber-insurace
cyber-insurance
cyberattack
defense computing resources
probability
evolutionary subgame
Fog computing
fog computing provider
Insurance
neutralizing cyber risks
purchases ratio
Stackelberg game
Virtualization
mobile computing
edge computing
game theory
distributed processing
Scalability
Resiliency
Metrics
Human behavior
pubcrawl
Games
Computational modeling
optimisation
security of data
risk management
optimization
« first
‹ previous
1
2
3
4
5
6
next ›
last »