Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:52pm
networked storage system prototype
X-code-based parallel storage systems
X-code-based optimal recovery scheme
System recovery
storage management
single disk failure recovery algorithm
Reliability
redundancy coding schemes
Redundancy
recovery algorithm
Peer to peer computing
Parallel storage systems
parallel memories
optimal update complexity
optimal single-disk failure recovery
arrays
minimum-disk-read-recovery
MDRR
logical encoding scheme
Load management
encoding
double-fault tolerant coding scheme
disc storage
data communication
data centers
data availability
Complexity theory
coding theory
cloud storage
biblio
Scalable Packet Classification for Datacenter Networks
Submitted by BrandonB on Wed, 05/06/2015 - 11:58am
IP networks
VLANs
VLAN
virtual machines
telecommunication network routing
storage penalty
Software
Scalability
router architectures
packet forwarding
packet classification
Local area networks
length combinations
classification rules
Indexes
hash table
hardware parallelism
Hardware
firewalls
encoding
encoded rule expansion
Decision trees
datacenter networks
datacenter network
data structures
computer centres
biblio
High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables
Submitted by BrandonB on Wed, 05/06/2015 - 11:57am
single-dimensional searches
packet-level accounting
pipelined hash tables
Pipelines
Power demand
search engines
security of data
signal classification
signature tree
signature tree structure
packet classification
steep performance degradation
Table lookup
TCAM
ternary content addressable memory
ternary content addressable memory (TCAM)
Throughput
throughput via
traffic traces
tree data structures
high-throughput multimatch
bit rate 26.8 Gbit/s to 93.1 Gbit/s
complicated multidimensional search
content-addressable storage
Cryptography
distributed hash tables
edge-grouping
encoding
hash table
hash table lookup
asynchronous pipeline architecture
hybrid perfect hash table construction
IEEE transactions
intermediate data structure
interstage parallel access
Memory management
memory-efficient multimatch
multimatch packet classification problem
network intrusion detection
biblio
On a Hashing-Based Enhancement of Source Separation Algorithms Over Finite Fields With Network Coding Perspectives
Submitted by BrandonB on Wed, 05/06/2015 - 11:48am
per-symbol encoding
multimedia transmission
network coding
network coding perspective
nonlinear codes
nonlinear encoding
nonlinear message digest
observed mixtures
overhead cost reduction
multimedia networking
relaying linear packet combination
scaling ambiguity
Source separation
source separation algorithm
source signal recovery
throughput maximization
Vectors
video coding
encoding
BSS
channel coding
classical entropy-based separation method
combination coefficient
compressed media sources
Context
Decoding
decoding rate
blind source separation
Entropy
finite fields
Galois fields
hashing-based enhancement
independent component analysis
loss immunity
mixing process
Multimedia communication
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 11:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 10:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
A Novel ECG Data Compression Method Using Adaptive Fourier Decomposition with Security Guarantee in e-Health Applications
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Benchmark testing
Electrocardiography
encoding
encryption
Informatics
information security
Transforms
biblio
Developing a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
data encryption
unprintable text
unprintable encrypted message
matrix algebra
information security
Informatics
Higher Level of Security
Encryption and Decryption
encryption
encoding
Algorithm design and analysis
data decryption
cyclic mathematical function
Cryptography
cryptographic algorithm
computer science
binary matrices
ASCII value
ASCII conversions
ASCII Conversion
biblio
Background-Modeling-Based Adaptive Prediction for Surveillance Video Coding
Submitted by BrandonB on Fri, 05/01/2015 - 9:31am
Decoding
video surveillance
video coding
surveillance video compression ratio
Surveillance video
surveillance
Object oriented modeling
MPEG-4 advanced video coding
Image coding
high-efficiency surveillance video coding technology
foreground-background-hybrid blocks
foreground prediction efficiency
foreground coding performance
exponential growth
encoding complexity
encoding
AVC
data compression
Complexity theory
BRP
BMAP method
block classification
BDP
background-modeling-based adaptive prediction method
background reference prediction
background reference
background prediction efficiency
background pixels
background modeling
background difference prediction
background difference
biblio
Skip Decision and Reference Frame Selection for Low-Complexity H.264/AVC Surveillance Video Coding
Submitted by BrandonB on Fri, 05/01/2015 - 9:31am
static camera surveillance video encoders
Motion detection
Motion segmentation
motion-compensated prediction
multiple frames
recognition performance
reference frame selection
reference frame selection algorithm
skip decision
motion compensation
Streaming media
surveillance
video codecs
video coding
video sequence
video surveillance
video surveillance data sets
floating point computations
Cache optimization
Cameras
coding uncovered background regions
compression complexity
data compression
detection performance
distortion
encoding
bit rate savings
foreground pixels
Gaussian mixture model
Gaussian processes
H.264/advanced video coding (AVC)
H.264/advanced video coding surveillance video encoders
low-complexity H.264/AVC surveillance video coding
mixture model
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »