Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
System performance
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Heterogeneity Aware Workload Management in Distributed Sustainable Datacenters
Submitted by aekwall on Mon, 11/30/2020 - 12:02pm
holistic heterogeneity-aware cloud workload management approach
dynamic power availability
flexible batch job management approach
flexible batch job manager
green computing
green energy
green power availability
green power supply
Green products
heterogeneity
heterogeneity aware workload management
heterogeneity-oblivious approach
heterogeneous workloads
distributed sustainable datacenters
Internet service operators
Internet-scale services
job migration
large-scale data analytics
real-world weather conditions
sCloud
Sustainable datacenter
system goodput
transactional workload placement
workload placement
workload traces
Internet-scale Computing Security
computer centres
Task Analysis
power aware computing
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
sustainable development
quality of service
constrained optimization problem
scheduling
Cloud Computing
QoS requirements
nonlinear programming
Power supplies
System performance
policy governance
batch job migration algorithm
brown energy
clouds
datacenter power consumption
distributed datacenters
distributed self-sustainable datacenters
biblio
Security-Driven Task Scheduling for Multiprocessor System-on-Chips with Performance Constraints
Submitted by grigby1 on Mon, 11/02/2020 - 1:36pm
pubcrawl
two-stage performance-constrained task scheduling algorithm
Trojan horses
task scheduling
Task Analysis
system-on-chip
System performance
system level security constraints
security-driven task scheduling
security of data
security
scheduling
Schedules
schedule length
Resiliency
resilience
composability
Processor scheduling
policy-based governance
performance constraints
Multiprocessor System-on-Chips
multiprocessing systems
MPSoC
malicious inclusions
logic design
IP networks
intellectual property security
industrial property
hardware trojan
Hardware
graph theory
delays
biblio
A radio-fingerprinting-based vehicle classification system for intelligent traffic control in smart cities
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
precise vehicle classification
comprehensive measurements
cost-efficiency
dynamic control methods
dynamic type-specific lane assignments
global system parameters
highly sophisticated traffic control methods
highly-dynamic Cyber Physical System
individual vehicles
intelligent traffic control systems
key element
machine learning based approach
key performance indicators
radio-fingerprint
radio-fingerprinting
real-time
road traffic control
specific data
street network
Traffic flow
up-to-date traffic
vehicle classification system
vehicle type information
CPS Privacy
vehicular ad hoc networks
traffic engineering computing
data privacy
Receivers
Measurement
Support vector machines
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
privacy preservation
Roads
road vehicles
pattern classification
machine learning
privacy
cyber physical systems
Human Factors
smart cities
system state
CPS
System performance
radio transmitters
biblio
Secrecy Outage Probability Analysis for Visible Light Communications with SWIPT and Random Terminals
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
SWIPT
random terminals
Resiliency
Scalability
secrecy outage probability analysis
secrecy performance
security
simultaneous wireless information and power transfer
SOP
random channel characteristics
System performance
telecommunication power management
telecommunication security
telecommunication terminals
transmitter
typical indoor VLC system
Visual Light Communications Security
wireless channels
optical receivers
free-space optical communication
indoor communication
indoor visible light communications
inductive power transmission
information receiver
light emitting diodes
lower bound
Metrics
energy receiver
passive information eavesdropper
physical-layer data
physical-layer data secure transmission
power system reliability
probability
Probability density function
pubcrawl
radiofrequency power transmission
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
Automatic Generation of Hierarchical Contracts for Resilience in Cyber-Physical Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
resilience
Monitoring
multiobjective optimization problem
nonfunctional properties
numerous contracts
object-oriented programming
operating conditions
optimisation
power system stability
pubcrawl
rapid fault detection
Metrics
Resilience Decentralized Algorithms
Resiliency
root contract
Scalability
Silicon
system design
System Level
System performance
web services
Cyber Dependencies
cyber physical systems
Automatic Contract Generation
automatic contract refinement
automatic generation
communication overhead
Compositionality
Contract Synthesis
contracts
core issue
CPS resilience
cyber-physical systems
fault diagnosis
growing scale
hierarchical contract-based resilience framework
hierarchical contracts generation
Human Factors
large-scale CPS
lower-level contract
manufacturing domain
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
Modelling of submerged oscillating water columns with mass transfer for wave energy extraction
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
submerged oscillating water column
momentum equations
numerical analysis
Numerical models
numerical time-domain model
ocean waves
oscillating-water-column devices
OWC
pipe flow
positive flow
reduced environmental loads
regular wave conditions
resonance amplification
simplified structural design
mass transfer mechanism
submerged oscillating water columns
submerged resonant duct
surface level
time-domain analysis
turbine induced damping
Turbines
Water conservation
water flows
wave energy converter
wave energy converters
wave energy extraction
weir
oscillating behaviors
composability
damping
completely submerged systems
air chamber
adiabatic air compressibility
Acceleration
wave power plants
wave power generation
hydraulic turbines
Atmospheric modeling
optimisation
Metrics
System performance
Load modeling
Design engineering
Mathematical model
Resiliency
resilience
pubcrawl
privacy
design optimization
floating fixed structures
fluid oscillations
H2O
hydro turbine
Hydrodynamics
mass transfer
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
« first
‹ previous
1
2
3
4
5
6
next ›
last »