Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
"Towards dependable CPS infrastructures: Architectural and operating-system challenges"
Submitted by abfox on Tue, 02/14/2017 - 2:33pm
advanced persistent threat
computer architecture
CPS infrastructure
cyber-physical system
cyber-physical systems
Kernel
Linux
operating systems (computers)
operating-system level
pubcrawl170101
rudimentary solution
security
security of data
Virtual private networks
biblio
"Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
public domain software
virtualization environment
virtualisation
Virtual machining
virtual machines
virtual machine volatile artifact analyzers
Virtual machine monitors
virtual machine introspection
virtual infrastructure privileged access
storage management
spyware
Semantics
semantic gap
rootkit
Random access memory
advanced persistent threat
pubcrawl170101
memory forensic analysis tool
memory forensic analysis
malware
live virtual machine RAM dump
LibVMI open source tool
Kernel
invasive software
intrusion detection system
hypervisor
execution time measurement
Digital Forensics
captured memory dump analysis
advanced persistent threats
biblio
Discrete Cosine Transform Locality-Sensitive Hashes for Face Retrieval
Submitted by BrandonB on Wed, 05/06/2015 - 11:54am
image querying
Vectors
retrieval efficiency
RaFD
Probes
multiPIE
Locality-Sensitive Hashing (LSH)
locality-sensitive hashes
Local Binary Patterns (LBP)
local binary patterns
linear search
LFW
Kernel
indexing
index structures
image retrieval
BioID
Image coding
hash suppression
FERET
FEI
face retrieval
face recognition
face indexing
face descriptors
face databases
Face
discrete cosine transforms
discrete cosine transform hashing
Discrete Cosine Transform (DCT) hashing
DCT hashing
Cryptography
biblio
Explicit Recursive and Adaptive Filtering in Reproducing Kernel Hilbert Spaces
Submitted by BrandonB on Wed, 05/06/2015 - 9:36am
infinite impulse response filter
Vectors
Training
Time series analysis
time series
stability
recursive.
recursive filters
recursive filtering
recursive
memory depth
Mathematical model
kernel methods
kernel Hilbert spaces
Kernel
Adaptation models
IIR filters
Hilbert spaces
Hilbert space
functional analysis
filter
electroencephalographic time series prediction
controlled stability
complex nonlinear system identification
chaotic time series prediction
autoregressive and moving-average
adaptive filters
adaptive filtering
adaptive antenna array processing
adaptive
biblio
Scanned Image Descreening With Image Redundancy and Adaptive Filtering
Submitted by BrandonB on Wed, 05/06/2015 - 9:27am
image redundancy
steerable filter
scanned image descreening
Scanned image
scanned halftone image
Redundancy
printing noise reduction
printing distortion
Printing
printers
noise reduction
Noise
local gradient features
Kernel
inverse halftoning
adaptive filtering
Image edge detection
image denoising
high quality contone image recovery
halftone pattern
Gaussian processes
electrophotography
electrophotographic printers
edge-preserving filter
descreening
denoising algorithm
continuous tone image print
anisotropic Gaussian kernel
adaptive filters
biblio
Nonlinear Adaptive Filtering with Dimension Reduction in the Wavelet Domain
Submitted by BrandonB on Wed, 05/06/2015 - 9:24am
adaptive filters
Algorithm design and analysis
dimension reduction
Kernel
kernel adaptive filtering
mean square error methods
mean-squared error minimization
MSE minimization
nonlinear adaptive filtering
Pollen wavelets
Training
wavelet coefficients
wavelet dimension reduction
Wavelet domain
wavelet transform
wavelet transforms
biblio
Scaling IPv6 address bindings in support of a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:14am
moving target defense
UDP requests
UDP echo server
transport protocols
Time factors
statistical improbability
standards
sockets
Servers
security
reconnaissance phase
Peer-to-peer computing
peer to peer scenario
networking
network security research
MT6D
bound interfaces
malicious actor
Local area networks
Kernel
IPv6 moving target defense
IPv6 address space
IPv6 address bindings
IPv6
IP networks
internet
Ethernet interface
computer network security
client-server systems
client server ratio
client server networks
biblio
Ethos' Deeply Integrated Distributed Types
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
Robustness
type system
type safety
type constraints
Trusted Computing
Semantics
security-sensitive bugs
security
safety-critical software
Safety
runtime-agnostic Ethos
Runtime
deeply integrated distributed types
Protocols
programming languages
program debugging
operating systems (computers)
operating system approach
operating system
multilingual Ethos
Language-theoretic security
language runtime
Kernel
Ethos operating system
biblio
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
random number generator
Whirlwind RNG
VM snapshots
VM boots
virtualized Linux
virtualized environments
Virtualization
virtual machines
virtual machine
software-based random number generators
cryptographic secrets
not-so-random numbers
Linux RNG systems
Linux
Kernel
Instruments
Hardware
entropy sources
Entropy
Cryptography
biblio
Dissecting On-Node Memory Access Performance: A Semantic Approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
memory behaviour
Topology
storage management
Semantics
semantic approach
sampling-based performance measurement units
sampled memory accesses
Program processors
power efficiency
PMU
performance ramifications
on-node memory access performance
multithreading
multi-threading
attribute semantic information
memory access optimization
Libraries
Kernel
Hardware
fine-grained memory access performance data
domain decomposition
distributed memory systems
design decisions
data objects
data motion
CPU manufacturers
Context
code regions
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »