Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
massive topology degradation
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
equipment failure
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
network topology
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
pubcrawl
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
biblio
Robots that Take Advantage of Human Trust
Submitted by grigby1 on Tue, 12/01/2020 - 1:24pm
optimal actions
uncertain human
robust trust
Robot Trust
robot actions
Resiliency
resilience
rational-intelligent robots
pubcrawl
optimisation
communicative robot behavior
mobile robots
learning (artificial intelligence)
intelligent robots
human-robot interaction
human trust
Human Factors
Human behavior
game theory
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
parallel optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
asynchronous parallel surrogate optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
Adaptation models
uncertainty handling
parallel algorithms
approximation theory
inference mechanisms
ensemble model
optimisation
Load modeling
Stochastic processes
Computational modeling
Scalability
optimization
Resiliency
resilience
pubcrawl
Predictive models
biblio
Misinformation Control in the Internet of Battlefield Things: A Multiclass Mean-Field Game
Submitted by grigby1 on Tue, 11/17/2020 - 3:00pm
pubcrawl
military computing
misinformation attack
misinformation control
misinformation propagation
multiclass agents
optimal probability
optimisation
probability
Mean-field game
QoI
quality of information
resilience
Resiliency
Scalability
Steady-state
telecommunication control
Human Factors
considered model
convergence
Curing
false information
finite IoBT case
forward backward sweep method
game theory
Games
Computational modeling
infection cost
Internet of Battlefield Things system
Internet of Things
iobt
IoBT node
massive heterogeneous IoBT system
mean-field equilibrium
biblio
A Context-Aware, Confidence-Disclosing and Fail-Operational Dynamic Risk Assessment Architecture
Submitted by aekwall on Mon, 11/16/2020 - 2:50pm
vehicle dynamics
Resilient Security Architectures
Resiliency
safety perspective
manually controlled stand-alone systems
fail-operational Dynamic Risk Assessment architecture
Dynamic Risk Management
Dynamic Risk Assessment
confidence-disclosure
confidence-disclosing risk assessment architecture
automotive collision risk metrics
acceptable risk
Safety
context-awareness
automotive systems
Automotive engineering
resilience
Measurement
optimisation
risk management
collision avoidance
pubcrawl
computer architecture
security of data
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
Prevention Techniques Employed in Wireless Ad-Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
optimisation
wireless sensor networks
Wireless communication
Wireless Ad-Hoc Networks
vehicular ad hoc networks
VANET
telecommunication security
telecommunication network routing
Routing
Resiliency
resilience
pubcrawl
Ad hoc networks
Metrics
manet attack prevention
MANET
genetic algorithm
fabrication
Compositionality
Communication system security
Black hole attack
Artificial Bee Colony
Ad-hoc wireless networks
biblio
MILP Modeling of Targeted False Load Data Injection Cyberattacks to Overflow Transmission Lines in Smart Grids
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
optimal power flow constraints
Transmission line measurements
False Data Detection
power system state estimation
attack model
bad data detection constraints
bi-level mixed integer linear programming optimization model
IEEE 118-bus power system
MILP modeling
Mixed Integer Linear Programming (MILP)
cyber physical systems
optimal power flow problem
optimized false data injections
overflow transmission lines
targeted false load data injection cyberattacks
targeted load buses
targeted transmission line
Transmission Line Congestion
upper level optimization problem
composability
security
pubcrawl
Human behavior
resilience
Resiliency
Data models
power system security
smart power grids
security of data
Load modeling
Smart Grids
optimisation
power transmission lines
Load flow
power system simulation
cyberattack
False Data Injection
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resiliency
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
gradient methods
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
channel coding
encoding
emerging cloud based computation model
distributed computation
Decoding
Computing Theory
computationally expensive tasks
computationally effective manner
Computational modeling
computational burden
Complexity theory
coding theory
coding methods
coded computation technique
coded computation scheme
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »