Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
particle swarm optimization
weighted sum rate maximization
user grouping procedure
user association
swarm intelligence algorithms
Swarm Intelligence
Silicon carbide
Signal to noise ratio
resource management
resource allocation
Receivers
pubcrawl
PSO
power allocation
physical resource block allocation
5G
particle swarm optimisation
orthogonal clusters
nonorthogonal multiple access networks
Non-Orthogonal Multiple Access (NOMA)
NOMA networks
NOMA
multiple base stations
multi-access systems
joint user association-power allocation
Interference
Grey Wolf optimizer
Evolutionary algorithms
Compositionality
composability
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 12:32pm
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
reduced interflow competition
virtual machines
Virtual machine monitors
unequal share
transport protocols
telecommunication traffic
telecommunication congestion control
TCP sending rate
TCP receiver window
TCP connections
TCP congestion control
Switches
Scalability
Resiliency
resilience
Registers
bottleneck capacity
Receivers
pubcrawl
Proposals
operating systems (computers)
multitenant datacenters
minimally-invasive congestion management
Internet-wide benefits
internet
hypervisor control traffic
Hardware
guest OS
datacenter
Couplings
coupled congestion control
computer centres
biblio
Reinforcement Learning with Budget-Constrained Nonparametric Function Approximation for Opportunistic Spectrum Access
Submitted by grigby1 on Wed, 12/02/2020 - 1:54pm
learning (artificial intelligence)
telecommunication congestion control
state spaces
single-channel carrier-sense multiple-access
Scalability
Resiliency
resilience
reinforcement learning-based radio
Reinforcement learning
Receivers
radio spectrum management
Radio frequency
pubcrawl
opportunistic spectrum access
multichannel adversarial radio
Acceleration
kernel-based reinforcement learning approach
Kernel Method
Kernel
intrinsic state-action space
idle slots
function approximation
Dictionaries
coupled congestion control
congested bands
cognitive radio
channel access actions
carrier sense multiple access
budget-constrained sparsification technique
budget-constrained nonparametric function approximation
biblio
A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
TCP end-points
receiver sides
Receivers
resilience
Resiliency
resource allocation
Robustness
Routing protocols
Scalability
pubcrawl
TCP packet reorderings
TCP sender end-hosts
TCP traffic
telecommunication congestion control
telecommunication traffic
Transparent reordering robust TCP proxy
transport protocols
coupled congestion control
Proposals
per-packet load balancing
packet reordering problem
packet level load balancing research
Out of order
ORTA
multiple paths
mobile network providers
low computational complexity
load-balancers
Load management
internet
high bandwidth utilization
fixed network providers
end-to-end transparency
biblio
Analysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks
Submitted by grigby1 on Fri, 11/20/2020 - 1:52pm
secure connection probability
Rayleigh channels
corresponding isolated secure probability
density ratio
eavesdropper collusion
isolated security probability
legitimate user
local secure connectivity
Rayleigh fading
physical layer security
secure wireless communication
secure wireless connection
stochastic networks
stochastic wireless networks
wireless channel conditions
wireless channel fading
Stochastic Computing Security
wireless channels
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Communication system security
radio networks
Receivers
security
wireless networks
Stochastic processes
probability
Monte-Carlo simulation
Monte Carlo methods
Transmitters
fading channels
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
Ultimate Secrecy in Wireless Communications
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
attenuation
Information Reuse and Security
ultimate secrecy
secrecy benchmarks
radio frequencies
power 1.0 W to 1000.0 W
frequency reuse
frequency allocation
frequency 1.0 GHz to 1000.0 GHz
communication secrecy
bandwidth saving method
Receivers
Wireless communications
radio transmitters
Propagation losses
Compositionality
Physical layer
Bandwidth
pubcrawl
Resiliency
telecommunication security
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »