Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multicast communication
biblio
Advanced Forwarding Strategy Towards Delay Tolerant Information-Centric Networking
Submitted by grigby1 on Tue, 05/24/2022 - 3:57pm
Metrics
multicast communication
multicast
Delay Tolerant
Information-Centric Networking (ICN)
telemedicine
Multicast algorithms
information-centric networking
Routing protocols
Compositionality
pubcrawl
network topology
Information Centric Networks
composability
Scalability
Heuristic algorithms
Resiliency
resilience
collaboration
Human behavior
biblio
Trust Based Mechanism Using Multicast Routing in RPL for the Internet of Things
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
Resiliency
composability
Internet of Things (IoT)
Internet Protocol version 6 (IPv6)
Low-power and Lossy Networks (LLNs)
multicast communication
Multicasting technique
network topology
pubcrawl
resilience
Trust Routing
Routing Protocol for low-power and lossy networks (RPL)
Routing protocols
Scalability
security
Task Analysis
Throughput
Topology
trust mechanism
biblio
SmartFork: Partitioned Multicast Allocation and Switching in Network-on-Chip Routers
Submitted by aekwall on Thu, 09/30/2021 - 11:41am
resource management
Two dimensional displays
Resiliency
Metrics
Scalability
pubcrawl
Switches
Routing
Hardware
multicast communication
System recovery
network on chip security
biblio
Information-theoretic security in wireless multicasting
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
multicast communication
wireless multicasting
transmission rate
secrecy multicast mutual information
quasistatic Rayleigh fading channel
nonzero secrecy
Multicasting
multicast mutual information
informationtheoretic security
information theoretic formulation
eavesdropper's channel
client receiver
analytical expression
outage probability
information theoretic security
transmitter
security of data
Rayleigh fading
radio receivers
radio transmitters
Rayleigh channels
eavesdropper
probability
Phasor measurement units
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
telecommunication security
Scalability
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
LA-ANA based Architecture for Bluetooth Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
autonomic network
Wireless Personal Area Network
unicast packet delivery
stochastic model
Piconet
multiple sensor node technology
multicast packet delivery
LACAS based wireless sensor network
LACAS
LA-ANA based architecture
dynamic environment
Bluetooth environment
Bluetooth based dynamic environment
Autonomic Network Architecture (ANA)
Bluetooth
bluetooth security
multicast communication
Fault tolerant systems
fault tolerance
telecommunication congestion control
composability
wireless sensor networks
Mathematical model
Throughput
Resiliency
resilience
Human behavior
pubcrawl
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
communication
composability
universally composable key bootstrapping
universal composability model
universal composability
strong security notion
session keys
secure key bootstrapping protocol
secure communication protocol
practical key bootstrapping protocol
multiple energy resources
multicast communications
key bootstrapping
ideal functionality
energy internet
security
multicast communication
energy resources
Smart Grids
power engineering computing
Energy Efficiency
smart power grids
internet
Computational modeling
Cryptography
pubcrawl
Protocols
Cryptographic Protocols
telecommunication security
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
Evolving AL-FEC Application Towards 5G NGMN
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
mobile multicast services
arbitrary packet losses
deterministic algorithms
error control
error protection schemes
FEC error control method
feedback free error recovery method
fifth generation mobile technology
forward error correction codes
Application Layer FEC codes
mobile multicast standards
mobile users
multicast communication
Multimedia communication
next generation mobilenetwork
online algorithms
randomized online algorithms
redundant data
source data
pubcrawl
composability
Metrics
Decoding
5G mobile communication
ultra-high reliability
next generation networks
encoding
Resiliency
telecommunication network reliability
forward error correction
Packet loss
5G Next Generation Mobile Networks
5G NGMN
AL-FEC policy online problem
AL-FEC protection
1
2
next ›
last »