Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
SECO: A Scalable Accuracy Approximate Exponential Function Via Cross-Layer Optimization
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
pubcrawl
exponential operation
exponentiation
fault tolerant control
gradient methods
intrinsic error resilience
neural nets
Nickel
Observers
optimisation
power consumption
exponential function unit
Resiliency
runtime optimization method
Scalability
scalable accuracy approximate exponential function
SECO
signal processing
signal processing applications
Silicon
spiking neuron models
Taylor expansion
Design Time
approximate computing
approximate EFU designs
approximation theory
arithmetic units
convergence
Cross-Layer Approximation
cross-layer design method
Cross-layer optimization
deep neural networks
design space
adaptive exponential integrate-fire neuron model
Dynamic Accuracy Scaling
Eigenvalues and eigenfunctions
energy-accuracy-optimal approximate multiplier
energy-efficient computing
Error analysis
error analysis method
Error Modeling
error-resilient applications
Exponential Function
biblio
Energy Management in an Islanded Microgrid: A Consensus Theory Approach
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
lambda-iteration method
transmission losses
scalability test
Resiliency
renewables
renewable energy sources
renewable energy
pubcrawl
Propagation losses
optimization problem
optimization
optimisation
multiagent system
multi-agent systems
Microgrids
micro grid.
8-bus islanded microgrid
Iterative methods
Generators
expandability performance
expandability
energy management systems
energy management optimization algorithm
energy management
Economics
distributed power generation
distributed generation
DG energy managemen
consensus theory approach
Consensus
composability
biblio
APDPk-Means: A New Differential Privacy Clustering Algorithm Based on Arithmetic Progression Privacy Budget Allocation
Submitted by aekwall on Mon, 01/06/2020 - 10:36am
k-means algorithm
Sensitivity
security of data
Scalability
resource management
Resiliency
pubcrawl
privacy protection
privacy budgets
privacy budget allocation
privacy
pattern clustering
optimisation
network information security
network data mining
APDPk-means
iterative process
Iterative methods
Human behavior
differential privacy k-means
differential privacy clustering algorithm
differential privacy
Data protection
Data mining
data clustering
composability
Clustering algorithms
Big Data
arithmetic progression privacy budget allocation
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding
Submitted by aekwall on Mon, 11/25/2019 - 2:07pm
closed-form
uncountably many linear inequalities
symmetric multilevel diversity coding
superposition coding
robust network communication
rate tuple
linear optimization problem
explicit coding rate region
encoding
distributed data storage
Closed-form solutions
Resiliency
source coding
network coding
Indexes
channel coding
optimisation
Decoding
optimization
Metrics
composability
pubcrawl
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
biblio
Energy Demand Scheduling Based on Game Theory for Microgrids
Submitted by aekwall on Mon, 06/24/2019 - 2:59pm
Resiliency
Minimization
modern grids
opportunity
optimisation
optimization
policy-based governance
pubcrawl
renewable energy sources
minimal interactions
scheduling
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
Task Analysis
total energy cost
electricity grids
constrained optimization problem
consumer demand management
consumers
consumption scheduling
demand side management
demand-side management systems
distributed energy demand scheduling approach
distributed power generation
Buildings
energy consumption
game theory
Human behavior
interesting challenges
Metrics
Microgrids
minimal information exchange
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
SDN self-healing mechanisms
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
end-to-end packet delay
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
Cyber Attacks
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
cyberattack
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
biblio
Trustworthiness Optimization of Industrial Cluster Network Platform Based on Blockchain
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
Information services
trustworthiness optimization
trustworthiness
Trusted Computing
smart contracts
small-to-medium enterprises
small and medium-sized enterprises
security of data
pubcrawl
optimization
optimisation
network platform
information trustworthiness
Analytical models
information service platform
Industries
industrial cluster network platform
industrial cluster
Economics
Distributed databases
data layer
composability
collaboration
blockchain
Application Layer
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »