Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message passing
biblio
Deadlock Detection for MPI Programs Based on Refined Match-sets
Submitted by grigby1 on Fri, 05/12/2023 - 10:28am
message passing
System recovery
security
Resiliency
resilience
Refining
Protocols
Metrics
message passing interface
pubcrawl
match-sets
high-performance computing
Concurrency
composability
communication deadlock
Cluster Computing
Clocks
biblio
A Trust-based Message Passing Algorithm against Persistent SSDF
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
cognitive radio
cooperative spectrum sensing
false trust
Libraries
malicious users
Mathematical model
message passing
policy-based governance
pubcrawl
radio transmitters
Reliability
Resiliency
Resists
Scalability
sensors
biblio
Quantifying the impact of network congestion on application performance and network metrics
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
Degradation
work factor metrics
packet transmission statistics
network counters
modern high-performance computing systems
intensive MPI operations
HPC network architecture
dragonfly topology
Aries network
application performance
network congestion
network metrics
network architecture
message passing
Scalability
HPC
Processor scheduling
telecommunication network topology
parallel processing
Topology
computer networks
Measurement
telecommunication network routing
Correlation
pubcrawl
Resiliency
Conferences
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 1:45pm
load balancing
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
nearest neighbor search
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
Measurement
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
machine learning algorithms
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
biblio
Operating System Process Using Message Passing Concept in Military
Submitted by grigby1 on Thu, 12/17/2020 - 1:54pm
operating systems (computers)
working framework
security
robots
robotics operating system process correspondence
Robotic warriors
robot operating systems
Robot
Resiliency
resilience
referenced idea robot solider
pubcrawl
policy-based governance
Biometric gadgets
military systems
military application robots
message passing model
message passing idea
message passing concept
message passing
message line
inexactly coupled framework
Human Factors
Human behavior
control engineering computing
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
MPI collective I/O
Writing
two-phase I/O
security
Scalability
request redistribution
pubcrawl
Program processors
Production
performance evaluation
parallel processing
parallel jobs
Parallel I/O
non-contiguous I/O
MPI processes
Aggregates
message passing
Libraries
intranode aggregation
internode communication contention
Intel KNL
input-output programs
i-o systems security
I-O Systems
high volume noncontiguous requests
Haswell processors
Cray XC40 parallel computers
collective MPI-IO functions
Benchmark testing
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
Broker Bridging Mechanism for Providing Anonymity in MQTT
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
message passing
standard mechanisms
smart devices
security service
onion routing
MQTT-SN
MQTT
message exchange
dynamic broker bridging mechanism
Broker Bridging
anonymous communications
MQTT protocol
anonymity
Metrics
encryption
Routing
composability
Databases
Protocols
internet
data integrity
data privacy
data confidentiality
computer network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
resilience
inter-layer message transmission mechanism
message passing
Metrics
Nickel
node activity test mechanism
physical backup
pubcrawl
Redundancy
hierarchical model
Resiliency
resource allocation
safety-critical key infrastructures
simulation test
simulation testing
simulations
SPB-CPS simulation test efficiency
test resources
fault tolerance
adaptive allocation
collaborative simulation time sequence push strategy
composability
Computational modeling
Control Strategy
CPS modeling
Cyber Physical System
cyber-physical systems
Adaptation models
fault tolerance policies
fault tolerant computing
Fault tolerant systems
Fault-Tolerant CPS
fault-tolerant CPS simulation platform
Hardware
hardware redundancy technology physical backup
hierarchical adaptive policies
biblio
Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
Selective Encryption
wired networks
reasons MANET
protecting messages
misbehaving node
ESI scheme
encryption scheme
dynamic topology
centralized administrator
ample protection
MANET security
mobile nodes
message passing
telecommunication security
security scheme
Compositionality
mobile ad hoc network
telecommunication network topology
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
Cryptographic Protocols
1
2
next ›
last »