Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5G mobile communication
biblio
Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object
Submitted by grigby1 on Tue, 02/18/2020 - 10:54am
Scalability
optimization
optimum knapsack solutions
performance measures per data object
QoS measures
quality of service
rank exchange caching (REC)
rank exchange caching methods
resilience
Resiliency
object hit ratio
score-gated polling (SGP)
simulative evaluation
TE
Throughput
time 25.0 year
time 50.0 year
traffic engineering
Web Caching
web caching strategies
efficient Web caching methods
5G mobile communication
byte hit ratio
cache content
cache storage
Correlation
CPU caches
data chunk storage
Database systems
delays
pubcrawl
generalized value hit ratio
Greedy-Dual
hit ratio optimization and bounds
independent request model
internet
LFU
LRU
metadata
Metrics
biblio
Maximizing Social Welfare in Fractional Hedonic Games using Shapley Value
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
agent-based methods
Social Agents
Social Welfare
Shapley value-based welfare distribution scheme
Shapley value
player payoffs
optimal coalition structure
fractional hedonic games
decision rules
coalition generation problem
coalition formation
CFSV
Approximation algorithms
Scalability
3G mobile communication
social sciences
Benchmark testing
Human Factors
Stability analysis
Games
5G mobile communication
multi-agent systems
Social network services
graph theory
pubcrawl
game theory
biblio
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
3G mobile communication
user authentication
unitary authentication model
telecommunication security
security levels
Scalability
resilience
quality of service
pubcrawl
multiservice system
multimedia interaction
mobility management (mobile radio)
mobile industry automation
late-model services
Internet of Vehicles
Identity management
identity authentication methods
3GPP committee
5G mobile communication
5G multiservice systems
5G network platform
composable three-factor authentication mechanism
Cryptographic Protocols
differentiated services
diversified identity authentication mechanism
diversified identity management
diversified security requirements
extensible authentication protocol
future fifth-generation mobile communications system
high definition visual communication
Human behavior
biblio
Single Crystalline Scandium Aluminum Nitride: An Emerging Material for 5G Acoustic Filters
Submitted by aekwall on Mon, 01/13/2020 - 11:07am
Si
material candidate
next generation wireless communication devices
operation frequencies
Piezoelectric devices
piezoelectric material needs
Q-factor
quality factors
RF front-end
SC
scandium
scandium compounds
Scandium Doping
semiconductor growth
III-V semiconductors
Single Crystalline
single-crystal
size 400.0 nm
sputter deposition
sputtering techniques
steep skirts
sub-micron ranges
surface acoustic wave devices
thin films
ultra-thin films
wide band gap semiconductors
acoustic coupling
bulk acoustic wave resonators
Resiliency
Human behavior
pubcrawl
5G mobile communication
piezoelectric materials
5G acoustic filters
5G resonators
acoustic filters
acoustic resonators
AlN
aluminium compounds
Aluminum Nitride
bulk acoustic wave devices
Scalability
electromechanical coupling
emerging material
Film bulk acoustic resonators
film thickness
filter bandwidth
filtering applications
form factor
frequency 3.0 GHz to 10.0 GHz
high crystal quality
high electromechanical coupling
high-performance filters
high-quality single-crystalline
biblio
MAEC-X: DDoS Prevention Leveraging Multi-Access Edge Computing
Submitted by grigby1 on Wed, 12/18/2019 - 1:44pm
Human behavior
Resiliency
resilience
pubcrawl
Protocols
network security
multitier networking
multiaccess edge computing
Monitoring
Metrics
MAEC-X
Internet-of-Everything era
internet
5G mobile communication
edge computing
denial-of-services attacks
DDoS prevention solution
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
computer network security
Computer crime
computer architecture
composability
5g network
biblio
Comparative Study of Channel Coding Schemes for 5G
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
5G
word length 256.0 bit
word length 128.0 bit
turbo codes
Turbo code
successive cancellation list decoding
polar codes
polar code
LDPC
convolutional code
Resiliency
LDPC codes
Complexity theory
5G mobile communication
parity check codes
channel coding
Decoding
Metrics
composability
pubcrawl
biblio
SELF-HEALING AND RESILIENCE IN FUTURE 5G COGNITIVE AUTONOMOUS NETWORKS
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
self-healing functions
gaussian distribution
key requirements
Long Term Evolution
managed network functions
mobile network self-healing
multidimensional statistical methods
radio access networks
resilience
future network deployments
SON
SON self-healing
sophisticated machine learning methods
statistical analysis
telecommunication computing
ultra-high reliability
self-healing networks
automated anomaly detection
machine learning
pubcrawl
composability
optimization
Reliability
Anomaly Detection
self-healing
5G mobile communication
learning (artificial intelligence)
Case-Based Reasoning
cognitive network management
critical machine-type communication
degraded states
diagnosis function
future 5G cognitive autonomous networks
future cognitive autonomous mobile networks
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
biblio
Collaborative Adversarial Modeling for Spectrum Aware IoT Communications
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Pareto-optimal adversarial strategy design
cooperative communication
cooperative spectrum sensing
DSA paradigm
dynamic spectrum access
dynamic spectrum access based networks
environmental sensing capability
inherent DSA vulnerabilities
large scale future 5G Internet of Things
leader-follower game
Pareto optimisation
collaborative SSDF attack
radio spectrum management
selfish adversarial model
selfish adversary
signal detection
spectrum availability estimation
spectrum aware 5G vision
spectrum aware IoT applications
spectrum aware IoT communications
spectrum sensing data falsification attacks
Adversary Models
collaboration
Internet of Things
security
Computational modeling
Games
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hardware
5G mobile communication
IoT networks
sensors
telecommunication security
cognitive radio
wireless channels
adversarial system utility components
collaborative adversarial modeling
collaborative attacks
collaborative group
collaborative selfish adversaries
biblio
Location Privacy in Virtual Cell-Equipped Ultra-Dense Networks
Submitted by grigby1 on Mon, 12/03/2018 - 2:02pm
Metrics
wireless networks densification
virtualization privacy
virtualisation
virtual entities
virtual cells
virtual cell-equipped ultra-dense networks
ultra-dense network
tracked mobile nodes
Resiliency
resilience
pubcrawl
privacy
next generation 5G cellular networks
mobile nodes
mobile node densification
Location Privacy in Wireless Networks
location privacy threats
location privacy
location based services
Human behavior
Handover
data privacy
composability
cellular radio
cell virtualization
authentication
access node densification
5G networks
5G mobile communication
Compositionality
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »