Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
coding theory
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resiliency
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
gradient methods
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
channel coding
encoding
emerging cloud based computation model
distributed computation
Decoding
Computing Theory
computationally expensive tasks
computationally effective manner
Computational modeling
computational burden
Complexity theory
coding theory
coding methods
coded computation technique
coded computation scheme
Cloud Computing
biblio
Matrices From Topological Graphic Coding of Network Security
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Topology
vertex splitting operations
Topsnut-gpws
Topological graphic coding
topological coding matrices
topcode-matrices
splitting labellings
mathematical models
encrypted networks
edge splitting operations
coding theory
Labeling
Cryptography
graph theory
password
Compositionality
Metrics
network security
encoding
matrix algebra
Resiliency
resilience
pubcrawl
security
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Upper bound
secure exact-repair regenerating codes
secure determinant codes
repair bandwidth
per-node storage
information-theoretic secrecy
Distributed storage system
codes
Manganese
linear codes
coding theory
information theory
security of data
Compositionality
Bandwidth
Metrics
Redundancy
maintenance engineering
storage management
Cryptography
Resiliency
resilience
pubcrawl
security
biblio
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
Telecommunications
δ)-LRC classification
δ)-locally repairable codes
ternary codes
Singleton-like bound
r
q-ary LRC
optimal ternary LRC
optimal ternary (r
optimal ternary (n
linear code
k
code symbol
coding theory
information security
linear codes
human computer interaction
Upper bound
error correction codes
Compositionality
Metrics
Cryptography
Indexes
Generators
Resiliency
resilience
pubcrawl
security
biblio
SystemVue based Secure data transmission using Gold codes
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
quadrature amplitude modulation
wireless technology
Wireless communication
wireless channels
Viterbi decoding
Viterbi decoder
transceivers
transceiver
telecommunication security
SystemVue based Secure data transmission
SystemVue
signal to noise ratio graphs
security
Resiliency
resilience
radio transceivers
advanced wireless techniques
pubcrawl
orthogonal frequency division multiplexing modulation scheme
OFDM modulation
OFDM
Metrics
graph theory
gold codes
Gold
error statistics
Cryptography
Convolutional codes
Compositionality
coding theory
channel noise Convolutional code
channel coding
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
leakage tradeoff
wiretap code
wireless devices
vanishing leakage
traditional codes
telecommunication security
security
Resiliency
resilience
radiocommunication
pubcrawl
physical layer security
Neural networks
neural network autoencoders
Metrics
legitimate receiver
autoencoder
information theory
Gaussian wiretap channels
Gaussian channels
flexible wiretap code design
flexible design
finite blocklength wiretap codes
finite blocklength
error statistics
error rate
decoding error probability
Decoding
Cryptography
Compositionality
coding theory
channel coding
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
iterative decoding
wireless channels
short polar codes
Resiliency
Receivers
pubcrawl
polarized channels
polar codes
parity check codes
Noise measurement
noieseless channels
Mutual information
Metrics
low density parity check codes
coding theory
information theory
information bit
frozen bit
extrinsic information transfer analysis
EXIT chart
error correction codes
Decoding
composability
completely noisy channels
channel coding
channel capacity
5G mobile communication
security
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
error-correcting code
universal hash functions
theoretical cryptography
telecommunication security
Semantics
semantic security
Receivers
Random variables
pubcrawl
modular wiretap codes
graph-based modular coding scheme
graph theory
Gaussian channels
coding theory
error correction codes
encoding
Eigenvalues and eigenfunctions
edge-disjoint biregular graphs
discrete Gaussian wiretap channel
Cryptography
Compositionality
composability
channel coding
BRI function
biregular irreducible functions
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »