Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context
biblio
Delegation-based authentication and authorization for the IP-based Internet of Things
Submitted by BrandonB on Mon, 05/04/2015 - 1:48pm
IP security protocols
Servers
Random access memory
public-key cryptography
public key cryptography
Protocols
peer authentication
memory-constrained devices
key agreement purposes
IP-based Internet of Things
authorization functionality
IP networks
Internet of Things
DTLS protocol
DTLS connection
delegation-based authentication
delegation server
Cryptographic Protocols
Context
biblio
Dissecting On-Node Memory Access Performance: A Semantic Approach
Submitted by BrandonB on Mon, 05/04/2015 - 1:42pm
memory behaviour
Topology
storage management
Semantics
semantic approach
sampling-based performance measurement units
sampled memory accesses
Program processors
power efficiency
PMU
performance ramifications
on-node memory access performance
multithreading
multi-threading
attribute semantic information
memory access optimization
Libraries
Kernel
Hardware
fine-grained memory access performance data
domain decomposition
distributed memory systems
design decisions
data objects
data motion
CPU manufacturers
Context
code regions
biblio
Institution Theory for Services Oriented Applications
Submitted by BrandonB on Fri, 05/01/2015 - 7:09am
Manganese
workflow applications
Unified modeling language
UML AD
UML activity diagram
System recovery
Syntactics
software engineering
service oriented applications
Semantics
semantic correctness
programming language semantics
Model transformation
Context
local semantic
institution theory
institution comorphism
Graphical Model
Grammar
formal verification
Formal Specification
Formal semantics
event-B specification
Event-B
diagrams
biblio
Establishing Theoretical Minimal Sets of Mutants
Submitted by BrandonB on Fri, 05/01/2015 - 7:08am
Minimization
test cases
set theory
redundant mutants
program testing
Mutation testing
mutation score
mutation analysis
mutant set minimization
Benchmark testing
minimisation
minimal mutant sets
Heuristic algorithms
Electronic mail
dynamic subsumption
Context
Computational modeling
biblio
Towards trustworthy complex event processing
Submitted by BrandonB on Thu, 04/30/2015 - 2:05pm
Fault tolerant systems
trustworthy
Trusted Computing
trust
threat analysis
Synchronization
soft realtime computing
Servers
Runtime
mission-critical applications
minimum runtime overhead
Intrusion Detection
intelligent computing
actionable situational knowledge
fault tolerance
event processing operations
Dependable Computing
Context
complex event processing
Byzantine Fault Tolerance
business intelligence
Business
Big Data
application semantics
algorithmic stock trading
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
biblio
A confident email system based on a new correspondence model
Submitted by BrandonB on Thu, 04/30/2015 - 12:47pm
internet
Context
Context modeling
correspondence
correspondence model
Electronic mail
Email
email security
email sender context
email service
email system policy
Human Factors
confident email system
mobile devices
Policy
Postal services
Protocols
security
security of data
trust
Trusted Computing
trusted email system
Confidence
biblio
Reducing Mistrust in Agent-Human Negotiations
Submitted by BrandonB on Thu, 04/30/2015 - 12:37pm
Educational institutions
Intelligent systems
Joints
multi-agent systems
multiissue negotiation
face-to-face negotiation
Instruments
computational agent
Context
socially intelligent agent
Economics
online negotiation
software agents
Trusted Computing
agent-human negotiation
agent-human negotiations
online negotiation setting
socially intelligent agents
software agent
trusting individual
online interaction
biblio
Computing Trust as a Form of Presumptive Reasoning
Submitted by BrandonB on Thu, 04/30/2015 - 12:31pm
presumptive reasoning
Walton argumentation schemes
Trusted Computing
trust schemes
trust model
trust expertise
trust computing
trust
standards
cognition
online communities
Measurement
fuzzy logics
Fuzzy logic
Context
Computational modeling
Communities
biblio
MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:30pm
social links
Mobile handsets
mobile social networks
mobile users
MSN
nonsemantical trust representation
Pragmatics
real-world mobile dataset
security of data
mobile devices
Social network services
social networking (online)
trust
trust graph
Trust models
trust value evaluation
Trusted Computing
Computational modeling
mobile context aware trust model
mobile context
mobile computing
Mobile communication
MobiFuzzyTrust inference mechanism
linguistic terms
graph theory
fuzzy trust inference mechanism
fuzzy set theory
fuzzy reasoning
fuzzy linguistic technique
fuzzy inference
distributed public virtual social spaces
Context modeling
Context
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »