Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
energy consumption
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Optimizing Task Assignment with Minimum Cost on Heterogeneous Embedded Multicore Systems Considering Time Constraint
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
Processor scheduling
Guaranteed Probability
Heterogeneous Embedded Multicore System
heterogeneous embedded multicore systems
heterogeneous multicore architectures
minimum cost
multiprocessing systems
optimal energy efficiency
optimizing task heterogeneous assignment with probability algorithm
OTHAP
processor and voltage assignment with probability problem
execution time
processor scheduling algorithm
PVAP problem
real-time embedded systems
system performance model
Task Assignment
task assignment optimization
task completion probability
time constraint
multicore computing security
Multicore Computing
Program processors
pubcrawl
Scalability
Algorithm design and analysis
energy consumption
real-time systems
Reliability
directed graphs
probability
Metrics
Signal processing algorithms
resilience
embedded systems
Resiliency
battery-based embedded systems
computer systems
DAG
data-dependent aperiodic tasks
directed acyclic graph
dynamic programming
dynamic programming algorithm
Energy Efficiency
biblio
Effects of Topology Information on Routing in Contention-Based Underwater Acoustic Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
Relays
Underwater acoustics
underwater acoustic networks
underwater acoustic communication
topology information
Topology
terrestrial wireless network topology information
telecommunication network topology
telecommunication network routing
telecommunication network reliability
routing efficiency
Routing
robust information distribution
retransmission reduction
Resiliency
Reliability
acoustic communication
pubcrawl
Protocols
propagation delays
opportunistic flooding approach
network topology
network simulations
Network reconnaissance
network protocols
mine countermeasures
local topology information
Load modeling
energy consumption
degree-of-topology information
contention-based channel access method
Ad-Hoc Network
biblio
An intelligent honeynet architecture based on software defined security
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
security
Metrics
pubcrawl
Resiliency
privacy
composability
Software
Hardware
computer architecture
energy consumption
honeynet
honeypot
network function virtualization
Packet loss
Software Defined Security
signal processing security
biblio
Security threat identification using energy points
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
pubcrawl
software engineering
software development lifecycle
Software
security threat identification
security process
security of data
security mechanisms
security breaches
SDLC
Scientific Computing Security
Resiliency
Central Processing Unit
Power demand
power aware computing
Metrics
energy points
energy consumption
energy based denial of service attacks
DoS attack
cosmic Method
Computers
Computer crime
Compositionality
biblio
Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security
Submitted by grigby1 on Mon, 11/20/2017 - 11:19am
security
Policy
policy-based governance
pubcrawl
QCQP
QoS constraints
quadratically constrained quadratic problem
quality of service
quality-of-service constraints
Resiliency
SCIP algorithm
physical layer security
sensor nodes
solving constraint integer programs
telecommunication security
total energy consumption
transmitting antennas
virtual MIMO-based cooperative beamforming and jamming
virtual multiinput multioutput communication architecture
Wireless Sensor Network
wireless sensor networks
WSN
cooperative communication
array signal processing
artificial neural network
Artificial Neural Networks
artificial noise
beamforming
beamforming vector optimization
cluster-based cooperative wireless sensor networks
clustered wireless sensor network security
collaboration
computational complexity
antenna
energy consumption
Governance
Government
integer programming
Jamming
jamming vector optimization
MIMO
MIMO communication
MISO
NP-hard problem
biblio
Optimal Power Control and Rate Adaptation for Ultra-Reliable M2M Control Applications
Submitted by grigby1 on Wed, 03/08/2017 - 12:54pm
telecommunication power management
rate adaptation problem
reliability requirements
Scheduling algorithms
sensor nodes
Shannon capacity formulation
signal-to-interference-plus-noise ratio
SINR
stringent timing
telecommunication control
pubcrawl170110
telecommunication scheduling
transmission delay
transmission power
transmission schedule
transmitting nodes
ultrareliable M2M control
ultrareliable machine-to-machine control
wireless channels
Wireless communication
limited battery resources
additive white Gaussian noise wireless channel
AWGN channels
AWGN wireless channel
continuous rate transmission
delay error
delays
discrete rate transmission
energy consumption
information theory
Adaptation models
Mobile communication
optimal control
optimal power control
optimization
packet error
polynomial time algorithm
power consumption
power control
biblio
Virtual machine placement strategy based on discrete firefly algorithm in cloud environments
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
optimisation
Virtual machining
virtual machines
virtual machine placement strategy
virtual machine placement
search problems
search mechanism
resource wastage
resource allocation
pubcrawl170110
power aware computing
Brightness
OpenStack cloud platform
multiobjective constraint optimization model
Heuristic algorithms
firefly algorithm
evolutionary computation
energy consumption
discrete firefly algorithm
Constraint optimization
Cloud Computing
biblio
Security in Wireless Sensor Networks: Key Management Module in EECBKM
Submitted by BrandonB on Wed, 05/06/2015 - 12:41pm
packet delivery ratio
WSN communication
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
security information
Secuirty
Routing protocols
Routing
authentication
node capture attack
Nickel
limited memory resource
key management module
key management
energy consumption
energy constraint
EECBKM
Cryptography
biblio
An efficient and hybrid key management for heterogeneous wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:34pm
heterogeneous wireless sensor networks
wireless sensor networks
telecommunication security
telecommunication network management
symmetric encryption
sensor nodes
sensor network security
public key encryption method
key management
hybrid key management
asymmetric key cryptography
heterogeneous sensor networks
energy consumption
encryption
Elliptic curve cryptography
Cryptography
communication security
cluster heads
Base stations
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »