Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
parallel processing
biblio
Development of Models in Resilient Computing
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resistance
parallel processing
Perturbation methods
perturbations
problem solving
pubcrawl
resilience
Resiliency
resilient computing
modelling
resistive computing
resistivity
resource boundaries
resource niche
reversible and irreversible processes
reversible development processes
smarter elasticity
elastic computing
checkability
Circuit faults
computational checkability
Computational modeling
computing development
computing evolution factors
Computing Theory
critical applications
Biological system modeling
elasticity
evolutionary computation
evolutionary development
fuzzy set theory
growth challenge
harsh resistance
irreversible development processes
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
biblio
Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
Submitted by aekwall on Mon, 08/24/2020 - 1:51pm
MapReduce
big data privacy
secure hash algorithm
network operating systems
MapReduce framework
data decryption
anonymous privacy-preserving scheme
Hadoop distributed file system
Human Factors
cloud
Proposals
parallel processing
security
Metrics
privacy
pubcrawl
Resiliency
data encryption
data privacy
Big Data
encryption
Cryptography
Scalability
Cloud Computing
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
Optimization of Hardware-oblivious and Hardware-conscious Hash-join Algorithms on KNL
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
hardware-oblivious hash join algorithms
hash algorithms
parallel computing
multithreading
multicore servers
memory allocation
manycore platforms
KNL hardware characteristics
Knights Landing
hash join
Resiliency
hardware-conscious hash join algorithms
hardware architecture features
algorithm optimization
multi-threading
multiprocessing systems
Compositionality
storage management
parallel processing
pubcrawl
biblio
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
hash
hash algorithms
SHA-2 hash functions
security analysis scheme
secure hash algorithm
randomness analyses
randomness
output hash
odd ratio tests
modified SHA
Merkle Damgård structure
high performance computing testbed
hash output
Cryptography
generated hash
famous secure hash algorithms SHA-1
CUDA parallel computing platform
corresponding hash function
Bayesian tests
Bayesian
SHA-1
Compositionality
parallel processing
pubcrawl
Resiliency
biblio
An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
parallel processing
faster query execution
high memory footprint
in-memory indexes
K-NN search
MatDot codes
matrix multiplication
model parallelism
model-parallel architecture
MRPT
multiple random projection trees
nearest neighbor estimation
fast k-nearest neighbors
query response time
query time
single compute node
single processing node
storage constraints
storage-optimal MatDot Codes
storage-optimal recovery threshold
straggler and failure tolerance
straggler-prone environment
Systematics
worker nodes
nearest neighbor search
Indexes
Data models
Computational modeling
Big Data
trees (mathematics)
Metrics
Measurement
nearest neighbour methods
data storage
query processing
mathematics computing
pubcrawl
high-dimensional data
Approximation algorithms
approximate nearest neighbor algorithms
candidate points
coded computing
coded matrix multiplication
computation efforts
computation strategy
distributed computing cluster
distributed processing
Euclidean distance calculations
biblio
A Nearest Neighbor Search Engine Using Distance-Based Hashing
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
query processing
query point
high-dimensional data
hardware search engine
FPGA-based nearest neighbor search engine
flexible distance-based hashing
distance based hashing
nearest neighbor search algorithm
nearest neighbor search
file organisation
pubcrawl
search problems
search engines
nearest neighbour methods
Measurement
Metrics
parallel processing
field programmable gate arrays
FPGA
biblio
A Diffusional Schedule for Traffic Reducing on Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
Schedules
network on chip
network-on-chip
NoC activities
parallel processing
parallel task execution
power aware computing
Protocols
remote data access
long-distance data synchronization
scheduling
synchronisation
Synchronization
Task Analysis
task mapping algorithm
task schedule
task traffic reduction
traffic distribution
diffusional schedule
network on chip security
Scalability
Resiliency
resilience
Metrics
application-layer optimization
Coherence
diffusional pattern
pubcrawl
energy consumption
energy efficient task schedule
energy saving
energy.
inefficient task schedule strategy
latency
latency reduction
Load modeling
biblio
Resilient Reorder Buffer Design for Network-on-Chip
Submitted by grigby1 on Fri, 03/27/2020 - 11:27am
Reorder Buffer
Network interfaces
network-on-chip
Network-on-Chip Advanced eXtensible Interface Network Interface block
parallel processing
policy-based governance
pubcrawl
random control logic
Registers
Metrics
resilience
Resiliency
resilient Reorder buffer design
Safe Coding
safe control logic design
safe ROB design
Safety
Table lookup
fault tolerance
buffer circuits
collaboration
control logic function
Diagnostic Coverage requirement
error correction codes
error detection
error detection code
error detection codes
area efficient safe design techniques
Fault tolerant systems
high performance computing systems
Human behavior
Human Factors
Industries
integrated circuit design
invariance checking
logic design
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »