Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
Analysis of asymmetric encryption scheme, AA \#x03B2; Performance on Arm Microcontroller
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Internet of Things
system-on-chip
system on chip
sensors
security protection
security
Scalability
Resiliency
random-access storage
Random access memory
public key cryptography
Public key
pubcrawl
microcontrollers
Metrics
Libraries
AA-Beta
Instruction cache
GNU multiple precision arithmetic library package
encryption
embedded microcontroller
Elliptic curve cryptography
digital arithmetic
Data Cache
Clocks
cache storage
asymmetric encryption scheme
Asymmetric
arm microcontroller
ARM Cortex-M7 microcontroller
AAβ
biblio
Institutional Repository Digital Object Metadata Enhancement and Re-Architecting
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
meta data
search problems
Scalability
Resiliency
pubcrawl
open metadata API
open access repositories
object representation
Object recognition
object discovery
Metadata Discovery Problem
metadata access
metadata
administrative object management
Libraries
institutional repository digital object metadata enhancement
information architecture
Guidelines
full text application program interface
DOI assignment
digital object identifier
digital libraries
Compositionality
application program interfaces
Aggregates
administrative object processing
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system
biblio
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Submitted by grigby1 on Wed, 03/08/2017 - 1:33pm
IP theft
system-on-chip
SoC design
sequential benchmark circuits
security parameter sizes
pubcrawl170112
privacy-preserving version
privacy-preserving functional IP verification
Noise
magnitude IP verification
Logic gates
Libraries
IP users
Cryptography
IP reuse
IP networks
IP core
intellectual property verification
industrial property
IC industry
IC design business model
globalized supply chain
functional verification
fully homomorphic encryption
encryption
data privacy
biblio
Trends on EDA for low power
Submitted by grigby1 on Wed, 03/08/2017 - 12:54pm
state-of-the-art microprocessors
low-power electronics
microprocessor chips
optimization
Physical design
power consumption
Power demand
power optimization
pubcrawl170110
Low power
transistor circuits
transistor layout
transistor network
transistor sizing
Transistors
visualization
visualization tools
AD 2012
Logic gates
Libraries
layout design automation tool
Layout
ISPD Contest
integrated circuit layout
electronic design automation
EDA algorithms
EDA
discrete gate sizing
continuous gate sizing
cell library
Algorithms
Algorithm design and analysis
AD 2013
biblio
A mixed discrete-continuous optimization scheme for Cyber-Physical System architecture exploration
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
discrete systems
sizing routine
pubcrawl170110
optimization time
optimization
optimisation
mixed discrete continuous optimization scheme
Mathematical model
magnitude reduction
Libraries
Engines
aircraft control
discrete space
discrete optimization routine
discrete architecture selection engine
cyber-physical system architecture exploration
CPS
contracts
continuous sizing engine
computer architecture
Atmospheric modeling
aircraft environmental control system
biblio
Fault subspace selection and analysis of relative changes based reconstruction modeling for multi-fault diagnosis
Submitted by BrandonB on Wed, 05/06/2015 - 1:32pm
industrial processes
Tennessee Eastman benchmark process
related statistical characteristics analysis
regression analysis
reconstruction-based fault diagnosis
reconstruction modeling
principal component analysis
partial least squares
online fault diagnosis
multifault diagnosis
multi-fault diagnosis
Monitoring
Libraries
Joints
joint fault effects
abnormal process behaviors
historical fault library
historical fault data
fault subspace selection strategy
fault subspace selection
fault diagnosis
Data models
combinatorial mathematics
combinatorial fault nature analysis
Analytical models
analysis-of-relative changes based reconstruction modeling
analysis of relative changes
alarming signal elimination
aggregative reconstruction-based fault diagnosis strategy
aggregative fault subspace calculation
biblio
Automating Isolation and Least Privilege in Web Services
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
principle of least privilege
XSS attack
web services
web security
shared-memory-space application
Servers
security policy inference
security of data
security guarantee
security
sandboxed process
Runtime
query results
Prototypes
Browsers
Passe system
Libraries
isolation
HTML5 sandboxing techniques
Django web framework
Databases
database queries
data-flow relationship
cross-site scripting attack
control-flow relationship
client-facing applications
capabilities
biblio
Dissecting On-Node Memory Access Performance: A Semantic Approach
Submitted by BrandonB on Mon, 05/04/2015 - 1:42pm
memory behaviour
Topology
storage management
Semantics
semantic approach
sampling-based performance measurement units
sampled memory accesses
Program processors
power efficiency
PMU
performance ramifications
on-node memory access performance
multithreading
multi-threading
attribute semantic information
memory access optimization
Libraries
Kernel
Hardware
fine-grained memory access performance data
domain decomposition
distributed memory systems
design decisions
data objects
data motion
CPU manufacturers
Context
code regions
biblio
WiMesh: A Tool for the Performance Evaluation of Multi-Radio Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:51am
software tool
XML configuration
XML
wireless mesh networks
WiMesh
Topology
Throughput
telecommunication computing
telecommunication channels
Channel allocation
research community
performance evaluation
ns-3 simulations
network topology
multiradio wireless mesh networks
Libraries
channel assignment
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »