Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile handsets
biblio
Classification of Mobile Phone Price Dataset Using Machine Learning Algorithms
Submitted by grigby1 on Wed, 09/20/2023 - 2:06pm
feature extraction
machine learning
machine learning algorithms
Support vector machines
pubcrawl
resilience
Resiliency
batteries
privacy
composability
Mobile handsets
classification
Random access memory
computer science
price prediction
biblio
AI-Enabled Conversational Agents in Service of Mild Cognitive Impairment Patients
Submitted by grigby1 on Fri, 05/12/2023 - 10:09am
pubcrawl
Human behavior
Metrics
Scalability
Medical services
Mobile handsets
natural language processing
Systematics
conversational agents
psychology
Bibliographies
user experience
biblio
SMS Spam Detection Using TFIDF and Voting Classifier
Submitted by grigby1 on Fri, 02/17/2023 - 5:37pm
feature extraction
spam
Feature Selection
Message service
spam detection
HAM
Mobile SMS Spam
TFIDF
Voting Classifier
Computer hacking
Hacker
machine learning
pubcrawl
Human behavior
Metrics
Scalability
Measurement
Mobile handsets
mobile computing
biblio
Keeping Connected in Internet-Isolated Locations
Submitted by grigby1 on Fri, 02/03/2023 - 5:15pm
Ad hoc networks
Wi-Fi Aware
peer-to-peer network
mTLS
mobile social network
Device-to-device communication
Decentralized Peer Authentication.
peer to peer security
Instant messaging
Mobile handsets
Peer-to-peer computing
Protocols
authentication
Scalability
performance evaluation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A Smart Door Lock Security System using Internet of Things
Submitted by grigby1 on Fri, 02/03/2023 - 5:10pm
Cameras
SD Card
Pi Camera
LBPH face recognizer
Haar-Cascade
Firebase
pattern locks
Costs
Raspberry Pi
face recognition
Internet of Things
Mobile handsets
Scalability
Safety
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
biblio
Service Placement for Real-Time Applications: Rate-Adaptation and Load-Balancing at the Network Edge
Submitted by grigby1 on Thu, 10/20/2022 - 3:49pm
Cloud Computing
pubcrawl
resilience
Conferences
telecommunication traffic
real-time systems
Mobile handsets
edge computing
Sensitivity
Stochastic Computing Security
Resiliency
Multi-access Edge Computing
Fog Network Dimensioning
rate adaptation
real-time applications
Service Placement
biblio
MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static Analysis
Submitted by aekwall on Sun, 10/16/2022 - 6:24pm
Software
Medical services
pubcrawl
Resiliency
Human behavior
composability
Cybersecurity
static analysis
Secure Software Development
Mobile handsets
Data Security
Regulation
static code analysis
Android applications
organizational aspects
biblio
Privacy Preserved Secure Offloading in the Multi-access Edge Computing Network
Submitted by grigby1 on Mon, 10/03/2022 - 12:47pm
energy consumption
secure offloading
jointly optimal
CMDP
Location Privacy in Wireless Networks
location privacy
Reinforcement learning
Markov processes
Mobile handsets
wireless networks
security
Compositionality
composability
Wireless communication
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
1
2
3
4
5
6
7
8
9
…
next ›
last »