Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
queueing theory
biblio
Resilience Analysis of Software-Defined Networks Using Queueing Networks
Submitted by aekwall on Tue, 07/27/2021 - 2:10pm
Computing Theory
resilience
composability
Compositionality
Computing Theory and Resilience
Industrial Control Systems
pubcrawl
Queue Networks
queueing theory
real-time systems
Software Defined Networks
biblio
On a Deterministic Approach to Solving Industrial Control System Problems
Submitted by grigby1 on Tue, 03/30/2021 - 12:05pm
Human Factors
signal transmission
security
queuing theory
queueing theory
Queueing analysis
pubcrawl
production engineering computing
network performance measures
Network calculus
Mathematical model
Local area networks
Industrial Control Systems
industrial control
automation
Human behavior
digital control system problems
deterministic queuing systems network calculus
delays
delay
database updating
Cybersecurity
critical infrastructures
Control System
control engineering computing
Calculus
backlog
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:42pm
Linguistics
Wireless Mesh Network Security
self-organized technology
self-configured technology
safe traffic adaptation model
safe traffic adaptation
queue length
performance efficiency
network traffic load
fuzzy framework
future queue state
explicit rate messages
queueing theory
Monitoring
wireless mesh networks
delays
control systems
fuzzy set theory
Fuzzy logic
internet
Metrics
composability
pubcrawl
Resiliency
real-time systems
telecommunication traffic
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS-enabled robotic systems
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
queueing theory
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
medical robotic surveillance
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
authentication
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
biblio
An Odd Couple: Loss-Based Congestion Control and Minimum RTT Scheduling in MPTCP
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
minRTT scheduling
transport protocols
telecommunication scheduling
telecommunication congestion control
Scalability
RTT measurement
Resiliency
resilience
queueing theory
pubcrawl
odd couple
multipath TCP
multipath heterogeneous networks
Multi-Path TCP
alternative congestion control algorithms
minRTT scheduler
minimum RTT scheduling
minimum round trip time
loss-based congestion control
head-of-line blocking
deep queues
coupled congestion control
Congestion Control
cellular radio
Cellular networks
bufferbloat
buffer dimensioning
biblio
ctrlTCP: Reducing latency through coupled, heterogeneous multi-flow TCP congestion control
Submitted by grigby1 on Wed, 12/02/2020 - 1:52pm
Multiplexing
transport protocols
telecommunication congestion control
short flow completion times
Scalability
Resiliency
resilience
queuing delay reduction
queueing theory
pubcrawl
Packet loss
NS-2 simulations
Aggregates
multiple TCP connections
latency reduction
FreeBSD kernel
delays
ctrlTCP
Couplings
coupled heterogeneous multiflow TCP congestion control
coupled congestion control
Congestion Manager
Conferences
bandwidth allocation
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
edge devices
Computing Theory and Privacy
sample data models
privacy architecture
practical data model
Message Queuing Telemetry Transport
fog-to-cloud computing systems
fog architecture
DPPforF2C
data service model
Data Privacy for Fog-to-Cloud (DPPforF2C)
data portfolio
data management portfolio
Advanced Message Queuing Protocol
telemetry
queueing theory
IoT
fog nodes
data management
Data models
Fog computing
Data Transmission
middleware
Protocols
pubcrawl
Human behavior
Resiliency
Internet of Things
privacy concerns
data privacy
Scalability
Cloud Computing
biblio
Security and Performance Modeling and Optimization for Software Defined Networking
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
Performance modeling
Web servers
telecommunication traffic
software defined networking
security optimization approach
Security Optimization
Security modeling
security constraints
security
SDN
Scalability
Resiliency
resilience
queueing theory
pubcrawl
Computing Theory
performance constraints
optimization
networking capabilities
network traffic
Measurement
graphical security models
genetic algorithms
genetic algorithm
Generators
Databases
computer network security
communication demands
big data security metrics
Security Metrics
biblio
Anonymity Mixes as (Partial) Assembly Queues: Modeling and Analysis
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
anonymity mixes
traffic disruption techniques
randomized batch mixing strategy
queueing model
particular anonymize
Order statistics.
delay properties
delay analysis
communicating users
Chaum mixes
batch mix
anonymity platforms route
pubcrawl
anonymity metrics
queueing theory
anonymity
Metrics
telecommunication traffic
telecommunication network routing
composability
telecommunication security
Resiliency
resilience
Human behavior
1
2
3
next ›
last »