Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
QoS requirements
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 1:11pm
Schedules
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Metrics
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
high-density networks
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
access protocols
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
biblio
Heterogeneity Aware Workload Management in Distributed Sustainable Datacenters
Submitted by aekwall on Mon, 11/30/2020 - 11:02am
holistic heterogeneity-aware cloud workload management approach
dynamic power availability
flexible batch job management approach
flexible batch job manager
green computing
green energy
green power availability
green power supply
Green products
heterogeneity
heterogeneity aware workload management
heterogeneity-oblivious approach
heterogeneous workloads
distributed sustainable datacenters
Internet service operators
Internet-scale services
job migration
large-scale data analytics
real-world weather conditions
sCloud
Sustainable datacenter
system goodput
transactional workload placement
workload placement
workload traces
Internet-scale Computing Security
computer centres
Task Analysis
power aware computing
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
sustainable development
quality of service
constrained optimization problem
scheduling
Cloud Computing
QoS requirements
nonlinear programming
Power supplies
System performance
policy governance
batch job migration algorithm
brown energy
clouds
datacenter power consumption
distributed datacenters
distributed self-sustainable datacenters
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
command injection attacks
Time factors
substation automation system
substation automation
stealthy injection attacks
security technologies
SaS
Queueing analysis
QoS requirements
Message service
IEC61850s GOOSE messaging service
generic object oriented substation events messaging service
communications channels
security of data
quality of service
power system security
power engineering computing
IEC standards
Substations
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Guaranteeing QoS requirements in long-haul RINA networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:49pm
Resiliency
policy governance
Policy-Governed Secure Collaboration
programmable networking model
Protocols
pubcrawl
QoS
QoS requirements
quality of service
Recursive InterNetwork Architecture
recursive networking model
resilience
path selection
RINA
RINA architecture
shortest-path solutions
static layered structure
TCP-IP protocol stack limitations
TCP-IP-based Internet
TCPIP
telecommunication network topology
traffic flows
transport protocols
human factor
clean slate
collaboration
computer architecture
connection-oriented solutions
data transport networks
Degradation
fastest-path solutions
flow QoS parameters
heterogeneous Quality of Service requirements
Human behavior
built-in QoS support
Human Factors
internet
long-haul
long-haul RINA networks
maximum allowed latency
Measurement
Metrics
network providers
network requirements
packet losses
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 1:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
biblio
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System
Submitted by BrandonB on Fri, 05/01/2015 - 8:46am
QoS violation
wireless mesh networks
Wireless communication
traffic type
traffic sending rate
traffic regulation scheme
traffic load scale
Throughput
telecommunication traffic
telecommunication congestion control
static routers
regulation process
real-time systems
queuing delays
queueing theory
quality of service
Ad hoc networks
QoS requirements
Protocols
network state
multimedia support
mobile ad hoc networks
mesh routers
Load management
lightly loaded buffers
interval type-2 fuzzy logic system
heavy traffic load
fuzzy control
delays
dedicated QoS protocols
buffer evolution