Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
node failures
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
Logic gates
B codes
Complexity theory
computational complexity
computer architecture
Decoding
decoding complexities
Distributed databases
distributed storage
eavesdropping nodes
encoding
EVENODD codes
Generators
information theory
information-theoretic security
XOR-based systematic secure RAID schemes
low-complexity schemes
node failures
optimal encoding complexities
practical high rate regime
pubcrawl
RAID
RAID architecture
random access
Reed-Solomon codes
Reliability
Resiliency
Resilient Security Architectures
Systematics
biblio
On the Speedup of Recovery in Large-Scale Erasure-Coded Storage Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
networked storage system testbed
XOR-coded storage system
XOR-based erasure codes
XOR operations
vulnerability window
Strips
storage management
single-node failure recovery
single-node failure
replace recovery algorithm
recovery algorithm
parallelized architecture
node failures
Algorithm design and analysis
Mathematical model
large-scale erasure-coded storage systems
hill-climbing technique
Generators
fault tolerant computing
fast recovery solution
Equations
encoding
Distributed databases
data redundancy
availability guarantees