Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
delays
biblio
Evaluation and analysis of network coding at network layer
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
network topologies
XOR technique
wireless networks
Throughput
telecommunication network topology
Resiliency
resilience
real time performance metrics
pubcrawl
packet radio networks
packet delivery rate
composability
network layer
network coding
Metrics
end-to-end delay
encoding
delays
delay
Decoding
data communication
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
probability parameters
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
domain specific architectural language
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
probability
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
formal verification
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
biblio
Design of Boolean Chaotic Oscillator Using CMOS Technology for True Random Number Generation
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
random number generation
message authentication
Metrics
National Institute of Standards and Technology
NI ELVIS platform
Oscillators
pubcrawl
random cryptographic keys
random key generation
Logic gates
random number generators
random numbers
resilience
Resiliency
Ring oscillators
Scalability
security keys
45nm CMOS technology
Inverters
Human behavior
Generators
delays
data transmission security
Cryptography
CMOS integrated circuits
CMOS Boolean Chaotic Oscillator Design
CMOS
chaos
Capacitors
Cadence Virtuoso tool
cadence virtuoso
authentication security
application specific integrated circuits
biblio
On-Chip Jitter Measurement for True Random Number Generators
Submitted by grigby1 on Thu, 05/24/2018 - 12:15pm
Delay lines
delays
Entropy
field programmable gate arrays
Human behavior
Jitter
Metrics
pubcrawl
random key generation
resilience
Resiliency
Ring oscillators
Scalability
security
biblio
Distributed timely-throughput optimal scheduling for wireless networks
Submitted by el_wehby on Wed, 05/23/2018 - 6:08pm
Optimal scheduling
wireless sensor networks
wireless networks
Wireless communication
virtual debts
Throughput
telecommunication traffic
telecommunication scheduling
Scheduling algorithms
Schedules
reliable data delivery
radio networks
optimal transmission decision making
arrival rate vectors
maximum network throughput
maximum network capacity region
incoming traffic rate
distributed timely-throughput optimal scheduling algorithm
distributed algorithms
delays
delay deadlines
Decision Making
data communication
CSMA-type protocols
carrier sense multiple access
1446484
biblio
A highly reliable dual-arbiter PUF for lightweight authentication protocols
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
lightweight security alternative
Switches
security primitive
RFIDs
RFID
Resiliency
resilience
Reliability
radio frequency identification
PUF
pubcrawl
Protocols
authentication
lightweight authentication protocols
integrated circuit reliability
increased security
human factor
Human behavior
Hardware Security
dual arbiter PUF design
delays
Cryptographic Protocols
Constrained Devices
BER
biblio
DAS: An Efficient NoC Router for Mixed-Criticality Real-Time Systems
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
NoC router
worst-case communication latency
wormhole and store and forward technique
Wormhole
virtual channel
Switches
Store And Forward
Software
security
Router Systems Security
Router Systems
Resiliency
resilience
real-time systems
pubcrawl
Ports (Computers)
computer architecture
network-on-chip
network use rate
network routing
multiprocessing systems
multiple virtual channels
mixed-criticality systems
Metrics
MCS
low-critical flow
high-critical flows
double arbiter and switching router
delays
DAS
cycle-accurate SystemC NoC simulator
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV
biblio
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
network steganography
Traffic Coloring
steganography detection approach
steganography detection
Steganography
RTP
RTCP
real-time systems
real-time services
pubcrawl
Protocols
privacy
overt protocols
network traffic coloring
network threats
Bandwidth
Metrics
malicious control server
inter-protocol steganography
inter-protocol hiding techniques
Information hiding
Google
Electronic mail
delays
defensive systems
Data visualization
data encapsulation
Cryptographic Protocols
computer network security
composability
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »