Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
A live static code analysis architecture for PLC software
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
programmable controllers
tools
timing
static code analysis
static analysis
software engineering
Software
Resiliency
resilience
regular compiler
pubcrawl
composability
program diagnostics
PLC software
live static code analysis architecture
IEC standards
IEC 61131-3
Human behavior
development process
debugging
control engineering computing
computer architecture
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
Correct-by-Construction Adaptive Cruise Control: Two Approaches
Submitted by el_wehby on Sun, 05/27/2018 - 6:53pm
Acceleration
Adaptive cruise control (ACC)
automotive safety
Computational modeling
Correct-by-Construction
Cruise control
formal methods
Lead
Safety
Software
supervisory control.
vehicles
1552668
biblio
A Notion of Robustness for Cyber-Physical Systems
Submitted by el_wehby on Sun, 05/27/2018 - 6:53pm
Computational modeling
Concrete
control systems
Cost function
Robustness
Software
Stability analysis
1552668
biblio
Next Generation Automotive Architecture Modeling and Exploration for Autonomous Driving
Submitted by el_wehby on Fri, 05/25/2018 - 4:23pm
next generation automotive architecture modeling
timing
system integration
Software Architecture
Software
sensors
security
road vehicles
optimization
optimisation
Automotive engineering
mobile robots
mechanical engineering computing
heterogeneous components
hardware architecture
design metrics validation
control engineering computing
computer architecture
Autonomous Driving
Autonomous automobiles
1553757
biblio
CONVINCE: A cross-layer modeling, exploration and validation framework for next-generation connected vehicles
Submitted by el_wehby on Fri, 05/25/2018 - 4:23pm
next-generation semiautonomous vehicles
vehicular ad hoc networks
vehicles
vehicle-to-vehicle applications
vehicle-to-infrastructure applications
V2V communication network
V2I communication network
timing
Software
security
Analytical models
next-generation connected vehicle
next-generation autonomous vehicles
next generation networks
Mathematical model
holistic environment
cross-layer modeling exploration and validation framework
CONVINCE framework
Computational modeling
1553757
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
DAS: An Efficient NoC Router for Mixed-Criticality Real-Time Systems
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
NoC router
worst-case communication latency
wormhole and store and forward technique
Wormhole
virtual channel
Switches
Store And Forward
Software
security
Router Systems Security
Router Systems
Resiliency
resilience
real-time systems
pubcrawl
Ports (Computers)
computer architecture
network-on-chip
network use rate
network routing
multiprocessing systems
multiple virtual channels
mixed-criticality systems
Metrics
MCS
low-critical flow
high-critical flows
double arbiter and switching router
delays
DAS
cycle-accurate SystemC NoC simulator
biblio
Hiding the Long Latency of Persist Barriers Using Speculative Execution
Submitted by grigby1 on Wed, 05/09/2018 - 2:56pm
resilience
nonvolatile memory technology
NVMM
pcommit
performance bottleneck
performance overhead
persist barriers
persistence instructions
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
Random access memory
random-access storage
Nonvolatile memory
Resiliency
Safe Coding
Safety
significant execution time overhead
Software
speculative execution
Speculative Persistence
speculative persistence architecture
storage management
substantial performance boost
volatile caches
fail-safe code
checkpoint-based processing
checkpointing
clflushopt
clwb
collaboration
common data structures
consistent state
data structures
DRAM
DRAM chips
expensive fence operations
cache storage
Failure Safety
file system
Force
Human Factors
logging based transactions
long latency persistency operations
Metrics
modern systems reorder memory operations
non-volatile main memory
nonpersistent implementations
NonVolatile Main Memory
« first
‹ previous
…
61
62
63
64
65
66
67
68
69
…
next ›
last »