Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Turing machines
biblio
A Compositional Cost Model for the λ-calculus
Submitted by aekwall on Fri, 08/12/2022 - 3:57pm
Computational modeling
computer science
Games
Semantics
Program processors
Random access memory
pubcrawl
Compositionality
Turing machines
biblio
Turing Machine based Syllable Splitter
Submitted by grigby1 on Wed, 08/10/2022 - 2:46pm
pubcrawl
Computational modeling
Computers
composability
Turing machines
Compositionality
computational intelligence
Communications technology
graphical user interfaces
Computational Theory
finite automata
Modelling and Simulation
Syllable Splitter
Turing machine
biblio
Real Number Signal Processing Can Detect Denial-of-Service Attacks
Submitted by grigby1 on Tue, 04/19/2022 - 10:44am
privacy
Wireless communication
Turing machines
signal processing security
signal processing
Resiliency
resilience
real number signal processing
pubcrawl
Acoustics
Metrics
digital computers
denial-of-service attack
Conferences
composability
Blum-Shub-Smale machine
algorithmic detection
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Post-Turing Computing, Hierarchical Named Networks and a New Class of Edge Computing
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Resiliency
live-migration
living beings
managed process workflow
microservices
named microservice network
named service connections
Neural networks
Platina systems
post-turing computing
pubcrawl
resilience
kubernetes provisioning stack
Scalability
service network
Software systems
stored program control machines
structural machine framework
structural machines
Turing machine
Turing machines
virtual machine overlay
virtual machines
Edge Cloud
cellular organisms
Church-Turing thesis
Cloud Computing
cognition
Control Theory
Control Theory and Resiliency
Cyber Physical System
cyber physical systems
Dynamic Configuration
dynamic reconfiguration
biological systems
edge cloud platform
edge computing
hierarchical named network
Hierarchical named networks
Human behavior
inductive Turing machines
info-computation
IP address base networks
knowledge structures
Kubernetes
biblio
Formal Computational Unlinkability Proofs of RFID Protocols
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
pubcrawl
unlinkability
Turing machines
tools
Theorem Proving
security protocols
security of data
RFIDs
RFID protocols
RFID
Resiliency
radiofrequency identification
communication complexity
Protocols
Human Factors
Human behavior
Hash functions
formal computational unlinkability proofs
Cryptography
Cryptographic Protocols
Computational modeling
computational model
computational complete symbolic attacker