Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed processing
biblio
Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding
Submitted by grigby1 on Mon, 06/11/2018 - 3:33pm
cache management
composability
Conferences
distributed processing
information-centric network
Iron
linear network coding
Metrics
network coding
pubcrawl
resilience
Resiliency
Routing
security
ubiquitous computing
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
biblio
Application of Congestion Notifications in a Cyber-Physical System
Submitted by el_wehby on Thu, 03/29/2018 - 1:52pm
intelligent cyber control
smart-grid
smart power grids
Smart Grids
smart grid operation
real-time systems
power system stability
power system control
power engineering computing
Nominations and elections
network congestion
internet
Communication networks
intelligent control
distributed systems
distributed system reconfiguration
distributed processing
cyber-physical systems
cyber-physical system
cyber controls
control systems
control engineering computing
congestion notifications
communications congestion
1505610
biblio
Optimality of inference in hierarchical coding for distributed object-based representations
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
hierarchical sparse coding
standards
representation learning
pubcrawl
optimisation
NP-hard optimization
near-optimal codes
multiscale representation
Matching pursuit algorithms
learning (artificial intelligence)
L0-norm constraint
inference mechanisms
hierarchical systems
complex synthetic datasets
greedy inference algorithm
greedy algorithms
encoding
distributed processing
distributed object-based representations
Dictionaries
data compression
convolutional matching pursuit
Convolutional codes
convolution
Compositionality
biblio
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Scalability
Human behavior
Human Factors
power engineering computing
privacy
Privacy-preserving
privacy-preserving smart metering system
pubcrawl
resilience
Resiliency
Gaussian processes
Smart Grid Privacy
Smart Metering
smart meters
smart power grids
Transformation
wavelet perturbation algorithm
wavelet transformation
wavelet transforms
WPA
distributed processing
Aggregates
Australia
Cryptography
data aggregation
data privacy
DDP
differential privacy techniques
Distributed databases
distributed differential privacy
aggregate data queries
distributed smart meter data aggregation
ElGamal encryption mechanism
encryption
Fourier perturbation algorithm
Fourier transformation
Fourier transforms
FPA
Gaussian principles
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Ecosystems
Software
security
Robustness
Resiliency
Resilience and Robustness
resilience
quantitative assessment
pubcrawl
network performance
network environment
Mission Assurance
interrelated software services
Information Reuse
enterprise networks
Active dependency mapping
distributed systems
distributed processing
dependency relations
dependency analysis
Degradation
Data-driven approach
cyber-physical systems
cyber physical systems
Cyber Dependencies
Conferences
computer security
Automated Dependency Mapping
artificial degradation
biblio
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
health care
XACML policies
XACML
similarity analysis
Security Policies Analysis
security
secure privacy-preserved EHR systems
secure integrated systems
pubcrawl
privacy
policy-based governance
patients privacy
large scale healthcare system
hospitals
Access Control
electronic healthcare systems
electronic health records
electronic health record
distributed systems
distributed processing
Data Security
data privacy
Cryptography
computer network
collaboration
authorisation
access control policy combination
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
question answering (information retrieval)
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
large-scale English cQA data sets
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
distributed word representation learning
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
Aggregates
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
biblio
The Blockchain as a Software Connector
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
distributed software architectures
untrusted participants
transactional data sharing
Trade-off
software quality
software connector
Software Architecture
Software
Scalability
Resiliency
quality attributes
pubcrawl
Peer-to-peer computing
Online banking
architectural decision
distributed processing
design trade-offs
design
decentralized data sharing
decentralized blockchain
data handling
Cryptography
contracts
Connectors
blockchain security
blockchain
Australia
Architecture connector
biblio
A Factorial Space for a System-Based Detection of Botcloud Activity
Submitted by BrandonB on Wed, 05/06/2015 - 10:30am
factorial space
UDP-flood DDoS attacks
transport protocols
system-based detection
system metrics
source-based detection
principal component analysis
Monitoring
Measurement
malicious use
legitimate usage
legitimate activity
Intrusion Detection
botcloud activity
distributed system behavior analysis
distributed processing
distributed massive attacks
computer network security
Computer crime
collaboration
cloud service provider
Cloud Computing
botnets
botcoud behavior
botcloud detection
« first
‹ previous
1
2
3
4
5
6
next ›
last »