Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resiliency
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
gradient methods
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
channel coding
encoding
emerging cloud based computation model
distributed computation
Decoding
Computing Theory
computationally expensive tasks
computationally effective manner
Computational modeling
computational burden
Complexity theory
coding theory
coding methods
coded computation technique
coded computation scheme
Cloud Computing
biblio
Learning Compositional Sparse Bimodal Models
Submitted by grigby1 on Mon, 10/05/2020 - 2:02pm
human-robot interaction
visualization
tabletop robotics
tabletop building-blocks setting
symbol grounding
Semantics
Robot sensing systems
red squares
pubcrawl
Poles and towers
Multimodal learning
learning compositional sparse bimodal models
learning (artificial intelligence)
image representation
image colour analysis
Artificial Intelligence
human evaluation studies
encoding
Dictionaries
Compositionality
compositional structure
compositional semantics
compositional learning
compositional elements
compositional basis
colored shapes
blue triangles
bimodal sparse representation
bimodal perceptual domain modeling
bimodal dataset
biblio
Matrices From Topological Graphic Coding of Network Security
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Topology
vertex splitting operations
Topsnut-gpws
Topological graphic coding
topological coding matrices
topcode-matrices
splitting labellings
mathematical models
encrypted networks
edge splitting operations
coding theory
Labeling
Cryptography
graph theory
password
Compositionality
Metrics
network security
encoding
matrix algebra
Resiliency
resilience
pubcrawl
security
biblio
The LDPC Code and Rateless Code for Wireless Sensor Network
Submitted by aekwall on Tue, 09/08/2020 - 10:06am
pubcrawl
WSN environment
WSN
wireless sensor networks
Sparse matrices
Resiliency
Rayleigh channels
rayleigh channel
rateless code
Raptor code
channel coding
parity check codes
Metrics
LT code
LDPC code
encoding algorithm
encoding
decoding algorithm
Decoding
composability
biblio
Robust Chaos-Based Information Masking Polar Coding Scheme for Wiretap Channel in Practical Wireless Systems
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
flat-fading Rayleigh channels
polar codes
telecommunication network reliability
Channel models
bit-channels
secure polar coding scheme
legitimate users
polar coding scheme
eavesdropping channel conditions
channel polarization
legitimate channels
realistic channel conditions
reliability performances
robust chaos-based information masking
security performances
transmission conditions
wireless communication systems
telecommunication security
Rayleigh channels
AWGN channels
wireless channels
chaotic communication
encoding
wiretap channel
channel coding
Reliability
Decoding
Metrics
Wireless communication
composability
pubcrawl
Resiliency
security
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
An Evaluation of Information Connection in Augmented Reality for 3D Scenes with Occlusion
Submitted by grigby1 on Fri, 08/28/2020 - 12:31pm
occlusion
visualization
visual interruptions
virtual information display
Three-dimensional displays
spatial overlays
security requirements
Scalability
resilience
pubcrawl
proximity
privacy
perception
partial occlusion connection lines
3D scenes
maintenance engineering
Information systems
information connection evaluation
industrial augmented reality applications
Human behavior
Engines
encoding
data visualisation
Context
Color
augmented reality
anchors
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »