Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Memory management
biblio
A genetic algorithm for obtaining memory constrained near-perfect hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
near-perfect hashing
uniform data distribution
Statistics
Sociology
search problems
Resiliency
resilience
pubcrawl
operating systems
open-addressing double-hashing approach
nonlinear transformation
Next generation networking
binary search
memory-constrained applications
Memory management
hash table
hash algorithms
genetic algorithms
genetic algorithm
file organisation
fast items retrieval
Compositionality
Cohttps://ieeexplore.ieee.org/document/8402794mplexity theory
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
Networks-on-Chip based Deep Neural Networks Accelerators for IoT Edge Devices
Submitted by grigby1 on Fri, 05/15/2020 - 12:45pm
low-power electronics
system-on-chip
Space exploration
resource-constrained embedded devices
performance evaluation
On-chip communication
NoC-based deep neural network accelerators
Neurons
neural chips
network-on-chip
network routing
memory size
Memory management
Measurement
massive parallel cores
network on chip security
IoT edge devices
Internet of Things
integrated circuit design
Energy analysis
Design Space Exploration
deep neural network inferences
Deep Neural Network accelerator
circuit optimisation
Artificial Neural Networks
Metrics
Resiliency
resilience
Scalability
biblio
Data Provenance for Experiment Management of Scientific Applications on GPU
Submitted by aekwall on Mon, 03/30/2020 - 11:32am
multipurpose applications
execution patterns
experiment management
gpu
GPU environments
GPU memory usage
GPU nodes
GPU runtime environments
graphics processing units
memory virtualization methods
diverse memory usage patterns
natural sciences computing
parallel architectures
pattern change
Physical Memory
resource configuration
runtime configuration
runtime execution
runtime monitoring
scientific applications
Provenance
Memory management
Runtime
Task Analysis
Resiliency
Human behavior
pubcrawl
composability
Metrics
Throughput
Monitoring
data provenance
scientific workflow
Instruction sets
application characteristics
application management
co-located applications
CUDA scientific applications
data provenance management
biblio
CapExec: Towards Transparently-Sandboxed Services
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
tools
collaboration
security
pubcrawl
policy-based governance
composability
Runtime
Libraries
Memory management
application security
Capsicum
Cats
compartmentalization
Containers
sandboxing
service manager
biblio
Defending against ROP Attacks with Nearly Zero Overhead
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Training
Monitoring
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
composability
Runtime
Libraries
Memory management
programming
static analysis
rop attacks
biblio
Secure Memory for Embedded Tamper-Proof Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
security of data
memory supply voltage manipulation
metastability
Metrics
protection circuitry
pubcrawl
Resiliency
Scalability
secure memory
Memory management
storage management
Tamper resistance
tamper-proof embedded systems
tamper-proof system
Tamper-Resistance
Trusted Component
Voltage measurement
Aerospace electronics
memory instability
memory data leakage protection
memory data change
memory cell circuitry
integrated circuits
Integrated circuit modeling
Human Factors
Human behavior
embedded tamper-proof systems
embedded systems
Data protection
data change scenaria
Cryptography
composability
change memory contents
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography
biblio
Improvement in Homomorphic Encryption Algorithm with Elliptic Curve Cryptography and OTP Technique
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
Human Factors
OTP technique
OTP
one time password
homomorphic encryption algorithm
encryption keys
Diffie Hellman key exchange algorithm
customary outsider evaluator
fully homomorphic encryption
Homomorphic encryption
distributed computing
Cloud Computing
Transform coding
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Memory management
encryption
Servers
Scalability
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »