Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Design methodology
biblio
Accelerated Verification of Parametric Protocols with Decision Trees
Submitted by aekwall on Tue, 10/12/2021 - 3:07pm
policy-based governance
protocol verification
parameterized verification
formal methods
Design methodology
Coherence
cache coherence protocols
knowledge based systems
Decision trees
Acceleration
Compositionality
composability
pubcrawl
Conferences
machine learning
Protocols
privacy
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
biblio
Design method for developing a Mobile Engineering-Application Middleware (MEAM)
Submitted by BrandonB on Wed, 05/06/2015 - 2:12pm
Business
Design Method
Design methodology
IT environment
MEAM
Measurement
middleware
Mobile Application
Mobile communication
mobile computing
Mobile Engineering Application Middleware
mobile engineering-application middleware
security
Systematics
touchscreen-based handling
« first
‹ previous
1
2