Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power demand
biblio
Dynamic Adaptation of Approximate Bit-width for CNNs based on Quantitative Error Resilience
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
dynamic adaptation
Resiliency
resilience
quantitative error resilience
pubcrawl
Power demand
power consumption
power aware computing
Neurons
logic circuits
Hardware
error resilience
dynamic adaptation of approximate bit-width
adders
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
configurable adder
Computing Theory
CNNs
approximation theory
approximate computing technology
approximate computing
approximate bit-width
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
Bluetooth
bluetooth security
wireless self-organizing Wi-Fi
wireless LAN
Wi-Fi network
Wi-Fi
transmission channels
telecommunication power management
self-organizing networks
open standards
modems
energy-saving modes
energy conservation
Cyber Physical System
Internet of Things
power consumption
cyber physical systems
Wireless fidelity
Routing
wireless networks
wireless channels
Human behavior
resilience
Resiliency
composability
pubcrawl
Power demand
Switches
biblio
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
machine learning
Autonomic Security
secure resources
Power and Performance Management
on-demand computing capabilities
cloud computing systems
Big Data Analytics
autonomic resource management
Power demand
power consumption
High performance computing
security of data
tools
resource management
composability
pubcrawl
Resiliency
embedded systems
security
Hardware
Cloud Computing
Monitoring
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
biblio
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
Table lookup
white box cryptography
white-box lookup table generation
white-box cryptography
white-box cryptographic implementation
white-box attacks
power analysis
gray-box attack
differential computation analysis
countermeasure
Cryptography
Power demand
encoding
Correlation
Metrics
composability
pubcrawl
Resiliency
Software
Runtime
biblio
Whitenoise encryption implementation with increased robustness to side-channel attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
design techniques
white box cryptography
whitenoise encryption algorithm implementation
White noise
static power consumption
shift registers
quadratic cost
power analysis attacks
linear cost
Hamming distance
dynamic power consumption
Cryptography
side-channel attacks
Power demand
pubcrawl
Heuristic algorithms
Robustness
Metrics
composability
Resiliency
encryption
biblio
POWERT Channels: A Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
Resiliency
Power management
power management algorithms
power management vulnerabilities
power system management
POWERT channel capacity
pubcrawl
representative commercial systems
resilience
power headroom modulation
resource allocation
Runtime
runtime power management
Scalability
Software
system-wide shared resource
tight power budget
application performance requirements
Power demand
power aware computing
multiprocessing systems
Monitoring
microprocessor chips
instantaneous power demand timely
Hardware
critical shared resource
covert communication
covert channels
control systems
Compositionality
composability
channel capacity
bit rate 121.6 bit/s
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Test methodology for detecting short-channel faults in network on- chip networks using IOT
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
integrated circuit reliability
short-channel fault detection
Routing
routers networks
Power demand
NoC
network-on-chip analysis machine
network-on-chip
network routing
network on- chip networks
network on chip
Monitoring
IoT
Internet of Things
interconnection networks
integrated circuit testing
network on chip security
Integrated circuit interconnections
fault diagnosis
Encoders/decoders
Data Security
Data protection
data encryption
Cryptography
Conferences
computing-intensive data processing
computer architecture
Aerospace electronics
Metrics
Resiliency
resilience
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »