Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed processing
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
biblio
Context Aware Ubiquitous Biometrics in Edge of Military Things
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
operational context data collection
Internet of Things
iobt
IoMT
message authentication
military computing
military equipment
military personnel
military-battlefield applications
internet of military/battlefield things
pubcrawl
resilience
Resiliency
Scalability
soldier psychophysical condition continuous monitoring
static biometrics
ubiquitous computing
ubiquitous sensing
context-adaptive authentication
battlefield-level biometric monitoring
biometrics (access control)
Cloud Computing
computer architecture
computing devices
Conferences
context aware biometrics
context aware ubiquitous biometrics
authentication
Context-aware services
dedicated edge computing architecture
distributed processing
dynamic biometrics
edge of military things
Human Factors
Internet of battlefield things
Internet of military Things
biblio
“Combat Cloud-Fog” Network Architecture for Internet of Battlefield Things and Load Balancing Technology
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
military computing
Internet of battlefield things
Internet of Things
Internet of Things technology
iobt
load balancing strategy
load balancing technology
Load management
load-balancing
military communication
Internef ot Battlefield Things
pubcrawl
resilience
Resiliency
resource allocation
Scalability
Task Analysis
task response latency
the-Internet-of-Battlefield-Things
Distributed databases
battlefield information
Cloud Computing
combat cloud network
combat cloud- fog network architecture
combat cloud-fog network system
combat-cloud-fog
computer architecture
computing capability
distributed computing load balancing problem
battlefield environment
distributed generalized diffusion strategy
distributed processing
edge computing
edge network equipment close
fog computing layer
fog equipment
fog-computing
Human Factors
biblio
Security and privacy for IoT and fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
heterogeneous ecosystem
Trust management
smart objects
security challenges
Scalability
risk-based trust management model
Resiliency
pubcrawl
Protocols
privacy issues
privacy
IoT
Internet of Things
human privacy
authentication
fog computing paradigm
Fog Computing and Security
Fog computing
edge computing
distributed processing
Data Security
data privacy
computing clouds
computer network security
Computational modeling
Cloud Computing
cameras etc
biblio
Data security storage model for fog computing in large-scale IoT application
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
for fog computing
storage resources
storage management
security of data
security management
security
Scalability
Resiliency
pubcrawl
large-scale IoT application
IoT application
Internet of Things
geographical distributed storage system
Big Data
fog computing system
fog computing nodes
Fog Computing and Security
Fog computing
FCS
FCDSSM
distributed processing
data synchronization
data security storage model
Cloud Computing
big data security storage
biblio
A New Lower Bound of Privacy Budget for Distributed Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:57am
Human behavior
unconditional aggregation sensitivity
Sensitivity
security of data
Scalability
Resiliency
pubcrawl
privacy preservation
privacy budget
privacy
Mathematical model
malicious collusion attacks
low data utility
local differential privacy
composability
global privacy performance
global differential privacy
distributed processing
distributed differential privacy
Distributed databases
distributed data aggregation system
distributed data aggregation
distributed computing
differential privacy
data privacy
data curator
data aggregation
biblio
Estimating Target Distribution in security assessment models
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
pubcrawl
Vulnerability
target distribution
Standards organizations
security of data
security monitoring system
security assessment
security
Resiliency
resilience
real-time systems
real-time system configuration
business data processing
Organizations
network security assessment models
Monitoring
information security
distributed processing
distributed computing
Databases
Damage Assessment
cyber-attacks
Computers
Computational modeling
biblio
CoRAL: Confined Recovery in Distributed Asynchronous Graph Processing
Submitted by grigby1 on Thu, 08/23/2018 - 11:59am
privacy
cyber-physical systems
pubcrawl
Resiliency
composability
distributed processing
resilience
fault tolerance
graph processing
confinement
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
« first
‹ previous
1
2
3
4
5
6
next ›
last »