Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Partitioning algorithms
biblio
Big Provenance Stream Processing for Data Intensive Computations
Submitted by aekwall on Mon, 09/23/2019 - 10:40am
Data Lake
tagging
stream processing
Sparks
provenance events
Partitioning algorithms
parallel stream
parallel algorithms
parallel algorithm
out-of-order provenance streams
Out of order
on-the-fly provenance processing
Lakes
data-parallel frameworks
data provenance
Big Data
data intensive computations
Business
big provenance stream processing
Big Provenance
Provenance
data analysis
Metrics
Twitter
composability
pubcrawl
Human behavior
Resiliency
data integrity
biblio
An Adaptive Differential Privacy Algorithm for Range Queries over Healthcare Data
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
medical information systems
Sensitivity
Scalability
Resiliency
range queries
query processing
pubcrawl
privacy
patient privacy
partitioning mechanisms
Partitioning algorithms
adaptive differential privacy algorithm
medical data
Human behavior
Healthcare Data Privacy
healthcare data
health care
greedy algorithms
diseases
differential privacy
data privacy
composability
biblio
Grid-Based Indexing and Search Algorithms for Large-Scale and High-Dimensional Data
Submitted by grigby1 on Mon, 06/11/2018 - 3:43pm
public databases
Measurement
Metrics
nearest neighbor search
nearest neighbor search algorithm
Nearest neighbor searches
parallel implementation
Partitioning algorithms
pubcrawl
massive information
Quantization (signal)
query processing
retrieval
search algorithms
Search methods
search problems
single machine
synthetic databases
grid-based index structure
Clustering algorithms
data handling
data index structure
database indexing
feature extraction
graph theory
grid cells
grid computing
approximate nearest neighbor search
high-dimensional data
high-dimensional database
high-dimensional feature vectors
index data
indexing
internet
large-scale data
large-scale database
biblio
An Efficient Control-Driven Period Optimization Algorithm for Distributed Real-Time Systems
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
optimization
system schedulability
Search methods
scheduling
schedulability constraints
sampling periods
real-time systems
Real-time embedded control system
real-time embedded control functions
programming
piecewise linear function
period optimization
Partitioning algorithms
approximated functions
optimisation
GP formulations
geometric programming
distributed systems
Distributed real-time systems
control-driven period optimization algorithm
control systems
control performance
control models
control loops
communication resources
automotive industrial case study
1553757
biblio
An Improved (k,p,l)-Anonymity Method for Privacy Preserving Collaborative Filtering
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
matrix sparsity reduction
Resiliency
resilience
recommender systems
pubcrawl
Privacy Preserving Collaborative Filtering
privacy
PPCF
Perturbation methods
Partitioning algorithms
obfuscation methods
Metrics
Maximum Distance to Average Vector microaggregation algorithm
anonymity
matrix algebra
Latent Factor Model
k-anonymity method
Human behavior
data privacy
data aggregation
Cryptography
cryptographic methods
composability
collaborative filtering
collaboration
biblio
Composition Properties of Bayesian Differential Privacy
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
Algorithm design and analysis
Bayes methods
Bayesian differential privacy
composability
data privacy
differential privacy
Indexes
parallel composability
Partitioning algorithms
post-processing
privacy
pubcrawl
sequential composability
biblio
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
Resiliency
parallel processing
partition decision trees
partitioning
Partitioning algorithms
partitioning-based packet classification algorithms
pattern classification
pubcrawl
resilience
packet classification accelerator chips
Scalability
search table
security
software-based packet classification algorithms
T-CAM
telecommunication computing
telecommunication traffic
ternary content addressable memory
high scalable packet classification algorithm
cache-aware table structure
Classification algorithms
computer network security
Decision trees
general hardware architectures
hardware-based solutions
Heuristic algorithms
high performance packet classification algorithm
Buildings
high-performance systems
integrated inter- and intra-table search
Metrics
Multicore Computing
multicore computing security
multicore multithreaded processors
network security systems
packet classification
biblio
An improved differential privacy algorithm to protect re-identification of data
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
Human behavior
ε-differential privacy
two-layer privacy
sanitized data
Resiliency
re-identification risk
Publishing
pubcrawl
privacy
Policy
Partitioning algorithms
mining trends
Medical services
machine learning algorithms
improved differential privacy algorithm
Human Factors
Algorithm design and analysis
healthcare organizations
decision-making systems
data sharing
data set
data sanitization algorithm
Data Sanitization
data repositories
data privacy
Data mining
data donors
data custodians
customer service
credible information
Compositionality
collaboration
biblio
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
overlay networks
uniform routing table
telecommunication network routing
skip graph
routing algorithm
Routing
Resiliency
query forwarding
pubcrawl
Peer-to-peer computing
Partitioning algorithms
arrays
overlay network
order preserving linear hashing
linear hashing
Limiting
hop reduction
hash algorithms
graph theory
distributed key-value store
Distributed databases
Compositionality
biblio
Scalability of CPU and GPU Solutions of the Prime Elliptic Curve Discrete Logarithm Problem
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
Measurement
sequential algorithms
security scalability
Scalability
public key cryptography
pubcrawl
Pollard Rho
Partitioning algorithms
parallelism metrics
parallel processing
Parallel Collision Search based solution
parallel algorithms
microprocessor chips
big integer libraries
graphics processing units
GPU solutions
gpu
Elliptic curves
elliptic curve discrete logarithm problem
elliptic curve asymmetric cryptographic systems
ECDLP
Cryptography
cryptographic systems
CPU solutions
bit-length system
« first
‹ previous
1
2
3