Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Containers
biblio
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues
Submitted by grigby1 on Tue, 01/21/2020 - 10:39am
resilience
virtualization technologies
Virtualization
use-case scenarios
Unikernels
technology development
Servers
security of data
security
Scalability
RTOS
Resiliency
Pervasive Computing Security
real time operating systems
pubcrawl
operating systems (computers)
open security issues
Fog computing
edge computing perspectives
edge computing
Containers
computer architecture
Cloud Computing
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
biblio
Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers
Submitted by aekwall on Mon, 12/30/2019 - 11:15am
distributed computing
Fog Computing and Security
untrusted operating systems
untrusted fog infrastructures
trusted Linux containers
secure distributed computing
Secure computing
OpenSGX platform
Linux containers
Intels Software Guard Extensions technology
Intel Software Guard Extensions (SGX)
fog infrastructure heterogeneity
Fog computing security
Docker
security of data
edge computing
Containers
Computational modeling
pubcrawl
Resiliency
Linux
Trusted Computing
Software
security
Hardware
Scalability
Cloud Computing
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 9:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
oAuth2.0
verification mechanism
update mechanisms
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TLS 1.3
tamper resistant endpoints
Software
smart buildings
smart building cyber-physical systems
security of data
secure communication channels
Resiliency
pubcrawl
composability
IT-security
IoT
Internet of Things
integrity measurement mechanisms
hardware-based security
Hardware
firmware
data integrity
cyber-physical systems
Cryptography
critical infrastructures
critical infrastructure
CPS devices
Containers
computer science
biblio
Detecting the Use of Unsafe Data in Software of Embedded Systems by Means of Static Analysis Methodology
Submitted by grigby1 on Fri, 02/22/2019 - 3:10pm
pubcrawl
unsafe data
Syntactics
syntactic information
static program code analysis
static code analysis
static analysis methodology
static analysis
software quality
Semantics
semantic information
Resiliency
composability
program diagnostics
program code
potentially unsafe data
Indexes
increase of efficiency
Human behavior
embedded systems
embedded computing
diagnostic rules
Containers
biblio
Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
smart contracts
Metrics
network accountability
open systems
Peer-to-peer computing
permissioned blockchain
Provenance
pubcrawl
resilience
Resiliency
IoT devices
Stakeholders
Trusted Computing
trustworthy orchestration
Trustworthy Systems
trustworthy transactions
velocity
verity
volume
W3C-PROV data model
context dependent data analysis
blockchain
blockchain container based architecture
business network
Cloud Computing
cloud resources
composability
computer architecture
container based edge computing
Containers
accountability
cyber physical systems
data analysis
decentralized interaction model
EC infrastructures
edge computing
Internet of Things
Internet of Things devices
IoT based applications
biblio
DepSys: Dependency aware integration of cyber-physical systems for smart homes
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
DepSys
XML
water supply
utility sensing infrastructure
system interdependency problems
smart phones
Smart homes
physical world entities
home computing
Energy resolution
Electricity supply industry
actuation infrastructure
dependency aware system integration
dependency
cyber-physical systems
CPS applications
control
Containers
Conflict Resolution
conflict detection
Availability
actuators
1536086
biblio
Towards Proactive SDN-Controller Attack and Failure Resilience
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
resilience
moving-target defense
network performance
PAFR
plug-and-play operation
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
proactive SDN-controller attack
pubcrawl
live remote checkpointing
sandboxing
SDN networks
security
Servers
software defined modules
software defined networking
Software-Defined Networks
Virtualization
controller/host isolation
checkpointing
collaboration
composability
computer network performance evaluation
computer network security
Containers
control systems
controller resilience
controller sandboxing mechanism
central SDN controller
data center networks
failure resilience
failure-and-attack-resilient execution
generic hardware platforms
host-based attacks
Linux
Linux containers
Linux-containers
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »