Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
media streaming
biblio
An Adaptive Telerobotics Control for Advanced Manufacturing
Submitted by grigby1 on Tue, 12/15/2020 - 12:43pm
locally operated robots
camera device
compact reliable UDP
compact-RUDP
connection reliability
control arhitecture
cutting tool
cutting tools
data channelling
data communication reliability
data feedback packets
data packet transfer prioritization
Distributed Decision Making
file transfers
industrial manipulators
link status monitoring
bandwidth control
Machining
network communications
reliable operational process
Remote control
remotely operated robots
robot movements
robot teleoperation
round-trip time
TCP-like sliding window
teleoperation
telerobotics reasoning architecture
telerobotics reasoning networking
UDP packets
video stream
robot operating systems
Path Planning
pubcrawl
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
mobile robots
security
Protocols
control engineering computing
production engineering computing
media streaming
Data Security
Reliability
control commands
Servers
telecommunication network reliability
Robot sensing systems
telerobotics
light sensor
transport protocols
video streaming
robot vision
image sensors
5DOF robotic arm
adaptable operational process
adaptive telerobotics control
advanced manufacturing
advanced robot path planning
asynchronous file transfer
biblio
Performance Evaluation for Secure Internet Group Management Protocol and Group Security Association Management Protocol
Submitted by grigby1 on Fri, 04/24/2020 - 3:21pm
multicast communication
Unicast
telecommunication security
security
secure Internet Group Management Protocol
Resiliency
resilience
pubcrawl
Protocols
object oriented security
Object oriented modeling
multicast protocols
multicast distribution
authorisation
Metrics
media streaming
IPTV
IP networks
IP multicast technology
Internet service providers
Internet protocol television
internet
Group Security Association Management Protocol
data delivery
composability
biblio
Chaos-Based Delay-Constrained Green Security Communications for Fog-Enabled Information-Centric Multimedia Network
Submitted by grigby1 on Tue, 01/21/2020 - 10:28am
Information Centric Networks
telecommunication security
Streaming media
Scalability
Resiliency
resilience
Reed-Solomon codes
pubcrawl
network edge capability
multimedia streams
media streaming
internet
chaos-based delay-constrained green security communications
Information Centric Network
ICMN
fog-enabled Information-Centric Multimedia Network
Fog computing
encryption
edge computing
Cryptography
content-centric features
chaotic encryption
chaotic communication
biblio
Two-way real time multimedia stream authentication using physical unclonable functions
Submitted by grigby1 on Mon, 11/20/2017 - 11:04am
Multimedia Signal Processing
Xilinx
video surveillance
telecommunication security
Streaming media
signal processing
Resiliency
Receivers
real-time systems
pubcrawl
physical unclonable functions
multimedia stream authentication
authentication
Multimedia communication
Metrics
media streaming
license/key management
Human Factors
Human behavior
hardware-based security
Hardware
FPGA
Digital rights management
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 1:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration