Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tree data structures
biblio
A Cyber Physical System based Stochastic Process Language With NuSMV Model Checker
Submitted by grigby1 on Tue, 07/12/2022 - 3:37pm
Semantics
Cyber Dependencies
tree data structures
Stochastic Process
description language
model checking
cyber physical systems
embedded systems
Natural languages
Syntactics
pubcrawl
Compositionality
Metrics
composability
Stochastic processes
Scalability
Resiliency
resilience
Human behavior
biblio
Exploring Metadata Search Essentials for Scientific Data Management
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
Metadata Indexing
tree data structures
search problems
scientific file formats
scientific data management
Scalability
Resiliency
resilience
real-world astronomy observation dataset
query processing
pubcrawl
Metadata Search
metadata queries
metadata indexing methodologies
astronomy computing
Metadata Discovery Problem
metadata characteristics
metadata attributes
metadata
meta data
indexing data structure
indexing
HDF5
data structures
data structure
data management
Compositionality
Complexity theory
biblio
Inferring API Correct Usage Rules: A Tree-based Approach
Submitted by grigby1 on Fri, 08/14/2020 - 11:45am
inference mechanisms
application programming interface
statistically extracted API correct usage rules
Software Vulnerability
parent API
majority API usages
lower-level API
API tree structure
API misuse
API documentation
API Correct Usage Rule
security of data
Compositionality
tree data structures
application program interfaces
APIs
Linux
program debugging
Resiliency
resilience
pubcrawl
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
A Local Integral Hash Nearest Neighbor Algorithm
Submitted by grigby1 on Fri, 05/22/2020 - 2:37pm
Metrics
trees (mathematics)
tree structure
tree data structures
tree based algorithms
search problems
pubcrawl
nearest neighbour methods
nearest neighbor search algorithm
nearest neighbor search
Nearest neighbor algorithm
access tree
Measurement
local integral hash nearest neighbor algorithm
Local integral hash
high dimensional data
fast search algorithm
fast retrieval algorithms
data distribution characteristics
computer image algorithm
hash algorithms
biblio
A Method of Conflict Detection for Security Policy Based on B+ Tree
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
network security
trees (mathematics)
tree data structures
security policy
security
Redundancy
pubcrawl
Protocols
policy-based governance
policy conflict
Policy Based Governance
B+ tree
network management system
Libraries
Indexes
detection algorithms
conflict detection
computer network security
computer network management
Communication networks
collaboration
B+ tree-based security policy conflict detection method
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Edge-Based Shortest Path Caching for Location-Based Services
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
location-based services
Web Caching
tree data structures
shortest route
shortest path queries
Scalability
road network topology
Resiliency
resilience
R-tree-based cache lookup algorithm
querying origin
query processing
path caching services
path caches
path cache
Metrics
pubcrawl
location based-services
location based services
large-scale path query processing
large-scale
historical path results
greedy-based cache construction algorithm
greedy algorithms
graph theory
Google Maps
edge-based shortest path caching
edge-based shortest path cache
edge-based path cache structure
caching services
cache storage
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
1
2
next ›
last »