Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software architecture design
biblio
Neural Network and ROS based Threat Detection and Patrolling Assistance
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
Robot vision systems
operating systems (computers)
patrolling assistance
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System
robot operating systems
robot vision
object detection
robotic automation
ROS based threat detection
security
Service robots
Software Architecture
software architecture design
Weapons
YOLO
ergonomics
autonomously moving bots
Cameras
computer architecture
computer vision
computer vision algorithms
control engineering computing
convolutional neural networks
daily ergonomics
autonomous navigation
hardware components
Human behavior
Human Factors
Lasers
mobile robots
navigation
neural nets
neural network
biblio
Parallel Verification of Software Architecture Design
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
object-oriented programming
software architecture verification
software architecture design
parallel verification
multithreaded environment
multi-threading
monolithic architecture
large-scale complex software systems
component-based software system
Component-Based Software
Circular Dependency
Bottleneck
scalable verification
computer architecture
Compositionality
Predictive Metrics
Scalability
program verification
model checking
Software Architecture
Unified modeling language
Software systems
Production
pubcrawl
Resiliency
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions