Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Boosting the Efficiency of the Harmonics Elimination VLSI Architecture by Arithmetic Approximations
Submitted by grigby1 on Fri, 08/26/2022 - 10:48am
Harmonic analysis
VLSI Design
LMS
Harmonics Suppression
Approximate multipliers
approximate computing
power quality
Very large scale integration
Power dissipation
computer architecture
boosting
Computing Theory
Compositionality
composability
Hardware
Resiliency
resilience
pubcrawl
biblio
SoC Trust Validation Using Assertion-Based Security Monitors
Submitted by grigby1 on Fri, 08/12/2022 - 2:09pm
automata
System Verilog Assertions
Security and Hardware Monitors
Property Specification Language
Assertion Based Verification
system-on-chip
fabrication
compiler security
Metrics
tools
Layout
Runtime
composability
Hardware
Resiliency
pubcrawl
security
biblio
Performance Comparison of Orthogonal Matching Pursuit and Novel Incremental Gaussian Elimination OMP Reconstruction Algorithms for Compressive Sensing
Submitted by grigby1 on Fri, 08/12/2022 - 9:59am
pubcrawl
resilience
Resiliency
Hardware
composability
Signal processing algorithms
compressive sensing
compressive sampling
Matching pursuit algorithms
mean square error methods
Microwave antennas
Microwave measurement
orthogonal matching pursuit
RD-AIC
Reconstruction algorithms
biblio
Secure Hardware Design: Starting from the Roots of Trust
Submitted by grigby1 on Thu, 08/04/2022 - 5:05pm
security
pubcrawl
resilience
Resiliency
Generators
Hardware
composability
testing
Europe
Physical Unclonable Function
Trusted Computing
trusted platform modules
biblio
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Language theoretic security
Trustworthy Systems
tools
Systems architecture
Software algorithms
Software
Resiliency
resilience
pubcrawl
expert systems
Hardware
formal verification
formal synthesis
computer architecture
compiler security
Architecture modeling
privacy
biblio
Vibe: An Implicit Two-Factor Authentication using Vibration Signals
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
pubcrawl
Human behavior
Human Factors
Hardware
performance evaluation
authentication
network security
Error analysis
Physical layer
web security
Vibrations
physical-layer security
two factor authentication
Continuous Authentication
vibration
zero-effort two-factor authentication
biblio
Twine: An Embedded Trusted Runtime for WebAssembly
Submitted by grigby1 on Fri, 07/29/2022 - 4:48pm
Runtime
outsourced database security
sqlite
outsourcing
SGX
Webassembly
TEE
Runtime environment
Metrics
C++ languages
Libraries
security
Databases
Cryptography
privacy
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
pubcrawl
biblio
Electronic neuron-like generator with excitable and self-oscillating behavior
Submitted by aekwall on Fri, 07/29/2022 - 4:31pm
Band-pass filters
oscillating behaviors
phase-locked loop
Phase locked loops
neuron-like generator
neuromorphic electronics
excitable system
numerical simulation
complex networks
Hardware
Generators
Neurons
privacy
composability
Resiliency
Metrics
pubcrawl
biblio
SRTLock: A Sensitivity Resilient Two-Tier Logic Encryption Scheme
Submitted by grigby1 on Fri, 07/29/2022 - 9:45am
standards
pattern locks
Sensitivity Attack
logic design
0-Injection
sensitivity analysis
SAT attack
logic encryption
Benchmark testing
Logic gates
Scalability
Hardware Security
Hardware
Resiliency
resilience
Human behavior
pubcrawl
encryption
biblio
JANUS: Boosting Logic Obfuscation Scope Through Reconfigurable FSM Synthesis
Submitted by grigby1 on Fri, 07/29/2022 - 9:45am
Scalability
pattern locks
Tamper-proof Memory
logic obfuscation
logic locking
boosting
supply chains
Partitioning algorithms
Switches
security
Hardware Security
Hardware
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »