Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data communication
biblio
Distributed timely-throughput optimal scheduling for wireless networks
Submitted by el_wehby on Wed, 05/23/2018 - 6:08pm
Optimal scheduling
wireless sensor networks
wireless networks
Wireless communication
virtual debts
Throughput
telecommunication traffic
telecommunication scheduling
Scheduling algorithms
Schedules
reliable data delivery
radio networks
optimal transmission decision making
arrival rate vectors
maximum network throughput
maximum network capacity region
incoming traffic rate
distributed timely-throughput optimal scheduling algorithm
distributed algorithms
delays
delay deadlines
Decision Making
data communication
CSMA-type protocols
carrier sense multiple access
1446484
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
security
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
pubcrawl
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
IEEE Std 1500
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
access mechanisms
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
biblio
An enhanced cryptographic model based on DNA approach
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
Asymmetric Encryption
authenticity
Ciphers
confidentiality
Cryptography
data communication
decryption
DNA
DNA computing
DNA cryptography
encryption
Human behavior
Metrics
privacy
pubcrawl
Resiliency
biblio
Backup and Disaster Recovery System for HDFS
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human Factors
storage management
Servers
Science of Security
Scalability
Resiliency
Reliability
pubcrawl
Policy-Governed Secure Collaboration
performance evaluation
parallel processing
Metrics
metadata
massive scale data storage
backup and disaster recovery system
Human behavior
HDFS cluster
HDFS
Hadoop distributed file system
gigabit Ethernet
file system backup
data retention
data communication
composability
collaboration
Cloud Computing
Benchmark testing
biblio
RFID integrated QR code tag antenna
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
QR code tag antenna
UHF antennas
telecommunication security
tag
supply-chain management
security applications
RFID tag antenna design
RFID
Resonant frequency
radiofrequency identification
quick response code
QR codes
antenna
QR code
pubcrawl170112
microstrip antennas
ISM frequency band
frequency 2.45 GHz
Electronic mail
data communication
bar code antenna
antennas
Antenna measurements
biblio
"Secured data communication system using RSA with mersenne primes and Steganography"
Submitted by grigby1 on Tue, 02/14/2017 - 12:59pm
image file
Steganography
secured data communication system
RSA cipher
public key cryptography
Public key
pubcrawl170102
Prime RSA
Mersenne primes
Mersenne
arrays
Image color analysis
Image coding
hidden text
factorization
encryption
data communication
Cryptography
communication channel
Ciphers
biblio
"Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"
Submitted by grigby1 on Tue, 02/14/2017 - 12:35pm
hybrid cryptosystem
user authentication
transmission
secure image transmission
secret fragment visible mosaic image method
pubcrawl170102
PSNR
mosaic image
key generation
image security
image parameter
image lossless compression technique
image integrity
image data integrity
image compression
Image coding
authentication
human being
Fingerprint recognition
encryption purpose
encryption
data hiding encryption
data compression
data communication
Cryptography
confidential information
Compression
biometrics (access control)
biometric fingerprint
Biomedical imaging
authorisation
authentication purpose
biblio
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:52pm
networked storage system prototype
X-code-based parallel storage systems
X-code-based optimal recovery scheme
System recovery
storage management
single disk failure recovery algorithm
Reliability
redundancy coding schemes
Redundancy
recovery algorithm
Peer to peer computing
Parallel storage systems
parallel memories
optimal update complexity
optimal single-disk failure recovery
arrays
minimum-disk-read-recovery
MDRR
logical encoding scheme
Load management
encoding
double-fault tolerant coding scheme
disc storage
data communication
data centers
data availability
Complexity theory
coding theory
cloud storage
biblio
Trust-based QoS routing algorithm for Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
packet transmission
WSN
wireless sensor networks
trust-based QoS routing algorithm
Trust Routing
telecommunication power management
telecommunication network routing
telecommunication control
routing algorithms
Routing
quality of service
QoS
Protocols
power control
Algorithm design and analysis
Packet loss
node clusting
LEACH protocol
LEACH
information transmission
energy efficient
Energy Efficiency
energy control
energy conservation
delays
Data Transmission
data communication
cluster head selection
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »