Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
A High Speed SM3 Algorithm Implementation for Security Chip
Submitted by grigby1 on Mon, 02/07/2022 - 4:43pm
composability
Microelectronics Security
SM3 Algorithm
high speed crypto chip
high performance hash algorithm
Frequency synthesizers
crypto
Microelectronics
Clocks
pubcrawl
information technology
Cryptography
optimization
Throughput
Conferences
Resiliency
resilience
Metrics
biblio
Optimizing the Performance of Web Applications in Mobile Cloud Computing
Submitted by grigby1 on Mon, 01/31/2022 - 5:42pm
Wireless communication
Redis caching
mobile cloud computing
Docker Containers
Web Caching
Kubernetes
Mobile handsets
web applications
Bandwidth
Cloud Computing
Scalability
performance evaluation
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Analysis of Wireless Mesh Security to Minimize Privacy and Security Breach
Submitted by aekwall on Mon, 01/31/2022 - 4:14pm
manet privacy
Analytical models
Communication system security
composability
MESH network
Metrics
pubcrawl
Resiliency
Throughput
timing
Wireless communication
wireless mesh networks
wireless sensor networks
Wires
WMNs
biblio
Securing Distributed Database Using Elongated RSA Algorithm
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
Fish
Throughput
RSA algorithm
Resiliency
query processing
pubcrawl
Metrics
Measurement
Human behavior
Asymmetric Encryption
encryption
encoding
Elongated RSA
Distributed databases
decryption
Database Security
Compositionality
Classification algorithms
biblio
6LoWPAN Performance Analysis of IoT Software-Defined-Network-Based Using Mininet-Io
Submitted by aekwall on Mon, 11/29/2021 - 1:55pm
Packet loss
Internet of Things
Switches
pubcrawl
Resiliency
composability
standards
testing
Throughput
6LoWPAN
Topology
Mininet-IoT
Onos controller
Software Defined Network
biblio
Identifying Rank Attacks and Alert Application in WSN
Submitted by aekwall on Mon, 11/29/2021 - 1:54pm
Routing protocols
SCF
rank attack
PDR
LLN
Dijkstra's algorithm
RPL
WSN
6LoWPAN
wireless sensor networks
Throughput
composability
Resiliency
pubcrawl
Wireless communication
performance evaluation
quality of service
Routing
biblio
Power and Trust Based Routing for MANET Using RRRP Algorithm
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
resilience
pubcrawl
multi-hop
mobile ad hoc networks
Industry applications
egoistic
drop fraction
Conferences
composability
appropriateness
Trust Routing
Throughput
Scalability
Routing protocols
Routing
Resiliency
biblio
Trust Based Mechanism Using Multicast Routing in RPL for the Internet of Things
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
Resiliency
composability
Internet of Things (IoT)
Internet Protocol version 6 (IPv6)
Low-power and Lossy Networks (LLNs)
multicast communication
Multicasting technique
network topology
pubcrawl
resilience
Trust Routing
Routing Protocol for low-power and lossy networks (RPL)
Routing protocols
Scalability
security
Task Analysis
Throughput
Topology
trust mechanism
biblio
TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks
Submitted by grigby1 on Mon, 11/08/2021 - 4:47pm
Reliability
asynchronous wireless sensor networks
composability
energy consumption
load balancing.
Measurement
opportunistic routing
Probability distribution
pubcrawl
wireless sensor networks
resilience
Resiliency
Routing
Scalability
Throughput
trust aware
Trust Routing
biblio
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
Measurement
Games
Wireless communication
pubcrawl
Resiliency
Industries
Reinforcement learning
Compositionality
Throughput
Predictive Metrics
provable security
Contextual Multi-Armed Bandit
link adaptation
RL algorithms security
security assessment
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »