Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transmitters
biblio
A centralized inter-cell rank coordination mechanism for 5G systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
MMSE receiver
conventional non interference-aware schemes
future fifth generation wireless system
game-theoretic interference pricing measure
intercell interference management mechanism
interference aware intercell rank coordination framework
interference pricing
interference resilience property
interference resilience trade-off
least mean squares methods
linear minimum mean squared error receivers
mean signal-to-interference-plus-noise ratio
centralized intercell rank coordination mechanism
MMSE receivers
multiple receive antennas
multiple transmit antennas
random matrix theory
rank adaptation
receiving antennas
space division multiplexing
spatial multiplexing
transmitter-receiver pair
transmitting antennas
antenna arrays
pubcrawl
matrix algebra
Interference
Receivers
radio receivers
radiofrequency interference
Signal to noise ratio
estimation
resilience
Throughput
Transmitters
game theory
5G mobile communication
MIMO
search problems
5G
Pricing
Monte Carlo methods
Monte Carlo simulations
Computing Theory
5G systems
brute-force exhaustive search algorithm
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Environment-Aware Indoor Localization Using Magnetic Induction
Submitted by el_wehby on Wed, 05/23/2018 - 6:07pm
Magnetic Induction
wireless networks
wireless applications
Transmitters
transmission media
Receivers
radio networks
radio links
position information
phase shifting
MI-based wireless networks
MI signals
MI communication
Coils
LOS links
line-of-sight links
joint device localization and conductive-object tomography algorithm
indoor navigation
Indoor environments
floor planning
estimation errors
environment-aware indoor localization
electromagnetic induction
Conductivity
conductive walls
complex nonLOS environments
1446484
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
A generalized optimization framework for control plane in tactical wireless networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
optimisation
wireless networks
wireless multihop tactical networking
Transmitters
throughput maximization problem
Throughput
telecommunication control
tactical wireless networking
spread spectrum communication
seamless multihop communications
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
optimization
Ad hoc networks
network layers
multihop tactical wireless networks
military communication
Metrics
Interference
Human Factors
human factor
Human behavior
global network optimization framework
generalized optimization framework
crosslayer optimization framework
control plane
collaboration
clean slate
biblio
Improving physical layer security for wireless ad hoc networks via full-duplex receiver jamming
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
Ad Hoc Network Security
composability
High definition video
Human behavior
Human Factors
Jamming
power system reliability
probability
pubcrawl
Receivers
Resiliency
security
Transmitters
biblio
Secrecy outage probability of full-duplex networks with cognitive radio environment and partial relay selection
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
pubcrawl
underlay cognitive radio networks
Transmitters
Telecommunications
signal processing
secrecy outage probability
Resiliency
Relays
relay networks (telecommunication)
receiving antennas
cognitive radio
Protocols
probability
partial relay selection
multiple relays selection
full-duplex networks
decode-and-forward relay selection
decode and forward communication
Cognitive Radio Security
cognitive radio environment
biblio
Covert communication with noncausal channel-state information at the transmitter
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
pubcrawl
Transmitters
transmitter
state-dependent channel
Scalability
Resiliency
Reliability
Receivers
radio transmitters
additive white Gaussian noise channels
noncausal channel-state information
Monte Carlo methods
encoding
discrete memoryless channels
covert communication
covert channels
Compositionality
AWGN channels
biblio
"A MIMO Precoding Based Physical Layer Security Technique for Key Exchange Encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:16pm
precoding
Wireless communication
wireless channels
Transmitters
telecommunication security
security
secret key exchange encryption
Receivers
pubcrawl170102
private key cryptography
precoding matrix index
channel coding
OFDM modulation
OFDM
multiinput multioutput orthogonal frequency division multiplexing system
MIMO-OFDM channel precoding based physical layer security technique
MIMO communication
MIMO
matrix algebra
key error rate
KER
Indexes
« first
‹ previous
1
2
3
4
5
6
next ›
last »