Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
packet transmission
biblio
An Adaptive Routing Scheme Based on Q-learning and Real-time Traffic Monitoring for Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
Monitoring
traffic monitoring
traffic load congestion
telecommunication traffic
Routing
real-time systems
real-time
q-learning
Prediction algorithms
performance optimization
packet transmission
optimisation
NoC
network-on-chip
network routing
network congestion
network on chip security
monitor
learning (artificial intelligence)
Heuristic algorithms
DyXY routing
dynamical routing schemes
dynamical routing
dynamical Q-learning routing approach
computer architecture
C-XY routing
adaptive routing scheme
Metrics
Resiliency
resilience
Scalability
biblio
Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
school campus networks
packet transmission
participating nodes
Peer-to-peer computing
pubcrawl
resilience
Routing
routing nodes
Routing Protocol
Routing protocols
packet delivery ratio
service coverage
telecommunication security
transmitted data packets
ubiquitous wireless networks
wireless mesh network
wireless mesh networks
wireless sensor networks
WMNs
influential factors
AODV
black hole
Black hole attack
community networking
composability
emergency rescue operations
home automation
IEEE 802.11 Standard
Ad hoc networks
Malicious Packet Drop
malicious packet drop attack
Metrics
multihop destination
network maintenance
network performance reliability
NS-3 simulator
office automation
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
Trust-based QoS routing algorithm for Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
packet transmission
WSN
wireless sensor networks
trust-based QoS routing algorithm
Trust Routing
telecommunication power management
telecommunication network routing
telecommunication control
routing algorithms
Routing
quality of service
QoS
Protocols
power control
Algorithm design and analysis
Packet loss
node clusting
LEACH protocol
LEACH
information transmission
energy efficient
Energy Efficiency
energy control
energy conservation
delays
Data Transmission
data communication
cluster head selection
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
biblio
Hypervisor-based cloud intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:25pm
multitenancy
virtualization technology
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine performance metrics
Virtual machine monitors
software metrics
Software Architecture
shared resource utilization
received packets
packet transmission
operating system
block device read requests
Measurement
intrusion detection security
Intrusion Detection
hypervisor-based cloud intrusion detection system
hypervisor performance metrics
hypervisor
CPU utilization
computer network security
Computer crime
cloud features
cloud computing resources
Cloud Computing
block device write requests