Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tree data structures
biblio
Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
Shape
metric-based balanced indexing tree
Metrics
National security
Performance Metrics
pubcrawl
resilience
Resiliency
rifle database
Scalability
metric space indexing
Shape Signatures
Similarity Indexing Methods
tree data structures
visual databases
visual retrieval systems
visualization
weapon images
Weapons
feature representation
Balanced Trees
Big Data
big data security
content-based retrieval
database indexing
Department of Homeland Security
DHS applications
feature extraction
balanced search
Fourier descriptors
gun database
image retrieval
image retrieval systems
indexing
invariance properties
M-tree
Measurement
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 12:20pm
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis
biblio
High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables
Submitted by BrandonB on Wed, 05/06/2015 - 11:57am
single-dimensional searches
packet-level accounting
pipelined hash tables
Pipelines
Power demand
search engines
security of data
signal classification
signature tree
signature tree structure
packet classification
steep performance degradation
Table lookup
TCAM
ternary content addressable memory
ternary content addressable memory (TCAM)
Throughput
throughput via
traffic traces
tree data structures
high-throughput multimatch
bit rate 26.8 Gbit/s to 93.1 Gbit/s
complicated multidimensional search
content-addressable storage
Cryptography
distributed hash tables
edge-grouping
encoding
hash table
hash table lookup
asynchronous pipeline architecture
hybrid perfect hash table construction
IEEE transactions
intermediate data structure
interstage parallel access
Memory management
memory-efficient multimatch
multimatch packet classification problem
network intrusion detection
biblio
A fast and compact hybrid memory resident datastore for text analytics with autonomic memory allocation
Submitted by BrandonB on Tue, 05/05/2015 - 1:24pm
hybrid memory resident datastore
tree data structures
text analytics
text analysis
Switches
storage management
space-efficient memory-resident datastore
SDRAM
LOUDS tries
level-order unary degree sequence tries
autonomic memory allocation
high-performance memory-resident datastore
hash table
dynamic trie
double array trie
data structures
data placement
Cows
Buffer storage
« first
‹ previous
1
2