Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hashing
biblio
Semi-Relaxation Supervised Hashing for Cross-Modal Retrieval
Submitted by grigby1 on Mon, 06/11/2018 - 3:42pm
pubcrawl
Measurement
Metrics
approximate nearest neighbor search
cross-modal search
hashing
multimodal
nearest neighbor search
biblio
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault Tolerance
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
anti-forensics
composability
detection
fault tolerance
File systems
hashing
Information hiding
Metrics
privacy
pubcrawl
robust
security
Slack Space
Steganography
steganography detection
Threshold secret sharing
biblio
Constant Time, Fixed Memory, Zero False Negative Error Logging for Low Power Wearable Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
traditional error logging algorithms
pubcrawl
Reliability
resilience
Resiliency
run-time error logging
Scalability
security
Sensor Systems
privacy
wearable computers
Wearable devices
Wearable sensors
wearables security
Wireless communication
wireless sensor networks
wireless wearable embedded devices
zero false negative error
false positive error rate
Caching Algorithm
Conferences
constant insertion time
constant memory
constant time
embedded devices
Error Logging
error logging algorithm
Body Sensors
firmware
firmware faults
fixed memory
hashing
Human behavior
Internet of Things
IoT systems
low power wearable devices
biblio
Time Adaptive Sketches (Ada-Sketches) for Summarizing Data Streams
Submitted by grigby1 on Tue, 05/16/2017 - 12:30pm
Algorithm
approximate counting algorithms
big-data mining
composability
count-min sketches
hash algorithms
hashing
Metrics
pubcrawl
randomized algorithms
Resiliency
Scalability
Sketching
streaming
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 11:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis
biblio
Design of a cyber security framework for ADS-B based surveillance systems
Submitted by BrandonB on Tue, 05/05/2015 - 12:08pm
digital communications
United States airspace
United State airspace
surveillance
space-based automatic dependent surveillance-broadcast
security of data
secure transmission framework design
real-time flight data
radar coverage
Radar
hashing
ground stations
FAA
encryption
economic implications
ADS-B based surveillance systems
digital communication
cyber security framework design
Cryptography
collision risk
Atmospheric modeling
Asymmetric Encryption
ARTCC
Aircraft
air traffic controllers
air traffic control
air route traffic control center
ADS-B surveillance systems
ADS-B signals
« first
‹ previous
1
2