Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data structure
biblio
Construction of immersive architectural wisdom guiding environment based on virtual reality
Submitted by grigby1 on Mon, 05/23/2022 - 4:02pm
smart environment
wisdom guiding
immersive model
data structure
immersive systems
virtual reality
data analysis
Market research
Solid modeling
pubcrawl
composability
Industries
privacy
Data models
Software
Resiliency
Human Factors
Human behavior
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
RBF
untrusted cloud
tracking technology
secure range query protocol
secure location-based query
secure index
random Bloom filter
process location-based queries
LSPs
geospatial data storage
FSkNN
fast location-based query
fast and secure kNN query processing
data structure
commercial public clouds
Geospatial analysis
Cloud Computing
nearest neighbor search
location based services
location-based services
Predictive Metrics
Indexes
Measurement
data structures
query processing
pubcrawl
nearest neighbour methods
Protocols
data privacy
encrypted data
Cryptography
biblio
Exploring Metadata Search Essentials for Scientific Data Management
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
Metadata Indexing
tree data structures
search problems
scientific file formats
scientific data management
Scalability
Resiliency
resilience
real-world astronomy observation dataset
query processing
pubcrawl
Metadata Search
metadata queries
metadata indexing methodologies
astronomy computing
Metadata Discovery Problem
metadata characteristics
metadata attributes
metadata
meta data
indexing data structure
indexing
HDF5
data structures
data structure
data management
Compositionality
Complexity theory
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Phishing websites classifier using polynomial neural networks in genetic algorithm
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
genetic algorithms
Web sites
Statistics
Sociology
pubcrawl
phishing Websites classifier
Phishing
neural networks techniques
Neural networks
Neural network (NN)
neural nets
improved polynomial neural networks
Human Factors
Human behavior
AI techniques
Genetic Algorithm (GA)
genetic algorithm
Error analysis
data structures
data structure
Data mining
data classification
Computer crime
classification techniques
chromosome recombination operators
brain
Artificial Intelligence