Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Entity title architecture extensions towards advanced quality-oriented mobility control capabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
mobile computing
wireless quality conditions
wireless communication systems
Wireless communication
Streaming media
session quality requirements
quality of service
point of attachment decision
PoA candidates
PoA
networking functions
Multimedia communication
mobility management (mobile radio)
mobile multimedia networking
Mobile handsets
mobile devices
active session flows
MATLAB
Manganese
internet
information-centric entity title architecture
handover setup
Handover
future Internet clean slate approach
FI
ETArch
entity title architecture extensions
distinct applications scenario
delays
beyond-IP networking services
advanced quality-oriented mobility control capabilities
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 2:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
biblio
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
QoS violation
wireless mesh networks
Wireless communication
traffic type
traffic sending rate
traffic regulation scheme
traffic load scale
Throughput
telecommunication traffic
telecommunication congestion control
static routers
regulation process
real-time systems
queuing delays
queueing theory
quality of service
Ad hoc networks
QoS requirements
Protocols
network state
multimedia support
mobile ad hoc networks
mesh routers
Load management
lightly loaded buffers
interval type-2 fuzzy logic system
heavy traffic load
fuzzy control
delays
dedicated QoS protocols
buffer evolution
biblio
Selfish insider attacks in IEEE 802.11s wireless mesh networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
Ad hoc networks
IEEE 802.11 Standards
IEEE 802.11s wireless mesh networks
Logic gates
Protocols
quality of service
Routing
selfish insider attacks
telecommunication security
wireless LAN
wireless mesh networks
biblio
On a Modeling Approach to Analyze Resilience of a Smart Grid Infrastructure
Submitted by BrandonB on Fri, 05/01/2015 - 7:33am
power system economics
Voltage control
Substations
Stochastic processes
Stochastic Process
stochastic model based analysis
smart power grids
Smart Grids
smart grid infrastructure resilience
SAN Formalism
renewable redistributed energy resource
quality of service
power system reliability
power system efficiency
Analytical models
power system control
modeling framework
Low voltage
Load modeling
Interdependencies
ICT functionalities
ICT control functions
Generators
Electrical Smart Grid
electrical equilibrium
critical infrastructures
critical infrastructure
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 2:59pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
Redundancy management in heterogeneous wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:58pm
query success probability
wireless sensor networks
Wireless Sensor Network
unreliable nodes detection
Tin
telecommunication network reliability
source node
signal processing
signal dissemination
Reliability
redundancy management algorithm
Redundancy
queueing theory
ad hoc network
query reliability
quality of service
probability
network efficiency
multipath routing
intrusion tolerance
Indexes
heterogeneous wireless sensor networks
geographical area
destination node
Ad hoc networks
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
IP networks
traffic control component
traffic control
traceback-based defense
trace back component
telecommunication traffic
TDFA
spoofed IP addresses
quality of service
Protocols
packet forwarding rate
packet filtering
network security problems
IP Traceback
attack packets
internet
Image edge detection
Filtering
distributed denial of service attack
Deterministic Flow Marking
detection component
DDoS flooding attacks
DDoS Attack
computer network security
Computer crime
Bandwidth
attacking traffic
« first
‹ previous
…
10
11
12
13
14
15
16
17
18