Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
biblio
A Hybrid Algorithm for Influence Maximization of Social Networks
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
NP problem
Secure File Sharing
resilience
Resiliency
pubcrawl
wikipedia
voting situation
Time complexity
social networks
social networking (online)
social network
Peer-to-peer computing
optimisation
optimal solution
Big Data
influence maximization
hybrid distribution value accumulation algorithm
Hybrid algorithm
hill climbing
Heuristic algorithms
greedy algorithms
greedy algorithm
Gnutella node-to-node file sharing network
Encyclopedias
dissemination process
dissemination effect
computational complexity
activation effect
biblio
Incremental Abstraction for Diagnosability Verification of Modular Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
fault diagnosis
uncertain loops
simple detector automata
scalable production system
polynomial complexity
parallel lines
nonblocking
Modular systems
modular system
incremental abstraction
forbidden loops
Discrete-Event Systems
diagnosability verification
diagnosability
abstraction
scalable verification
Detectors
verification
formal verification
Compositionality
Predictive Metrics
Production systems
Scalability
automata
Complexity theory
computational complexity
control systems
feedback
Synchronization
pubcrawl
Resiliency
biblio
Input Elimination Transformations for Scalable Verification and Trace Reconstruction
Submitted by aekwall on Mon, 03/16/2020 - 10:38am
2QBF variant
verification scalability
verification complexity
trace reconstruction
scalable verification
netlist transformations
merging
input reparameterization
input elimination transformations
fast- lossy preprocess
Cost accounting
connectivity verification
Resiliency
model checking
formal verification
Registers
Compositionality
Predictive Metrics
Scalability
Logic gates
Complexity theory
computational complexity
pubcrawl
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
A Theoretical Model for Fork Analysis in the Bitcoin Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
fork branches
Theoretical modeling
theoretical cryptography
random processes
pubcrawl
Protocols
probability
peer-to-peer network
Peer-to-peer computing
network simulator OMNET
network protocols
network bandwidth
Nakamoto consensus
historical Bitcoin data
graph theory
fork occurrence probability
bitcoin
fork analysis
Erdös-Rényi random graph construction
Cryptography
cryptocurrency
cryptocurrencies
computational complexity
Compositionality
composability
blockchain networks
Blockchain fork
block selection rules
block propagation delay
Bitcoin network
Bitcoin consensus
biblio
Peace Through Superior Puzzling: An Asymmetric Sybil Defense
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
distributed computing
Sybil participants
Sybil defense algorithm
sybil attacks
Sybil attack
spending rate
Resiliency
resilience
pubcrawl
Metrics
abstract-A common tool
computer network security
computational puzzles
computational complexity
composability
attacker
attack scenarios
asymmetric Sybil defense
Algorithm design and analysis
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
IoT Devices Security Using RF Fingerprinting
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
software defined radio
Radio frequency
Radio Frequency Fingerprinting
RF Fingerprinting
Scalability
scalability problems
SDR
security
security scalability
smart devices
pubcrawl
software radio
telecommunication security
Telecommunication standards
universal SDR-based inexpensive implementation
user-dedicated modes
Wireless communication
wireless RFF
wireless security authentication
feature extraction
authentication problem
Compositionality
computational complexity
computer network security
Cryptographic Protocols
cryptography-based authentication protocols
device identity fingerprint
emitted wireless signals
authentication
Fingerprint recognition
Internet of Things
Internet of Things devices industry
IoT
IoT devices security
mobile phone signal burst extraction
Object recognition
physical layer-based security authentication method
biblio
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Human Factors
Xyreum
time-based zero-knowledge proof of knowledge
time-based zero knowledge proof of knowledge
mutual multifactor authentication
Industrial Internet of Things
enhanced IIoT security
computational complexity
computation complexity
blockchain-based security protocol
blockchain solutions
blockchain group decision-making process
blockchain designs
multifactor authentication
authenticated encryption
Privacy-preserving
security
Scalability
Distributed databases
Cyber Attacks
Decision Making
blockchain
Metrics
Cryptography
privacy
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »