Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network lifetime
biblio
Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
energy efficient tree algorithm
ultralow energy consumption
tree network
telecommunication power management
telecommunication network reliability
resource-constrained devices
Resiliency
pubcrawl
Protocols
network lifetime
multihop routing
multihop BLE networks
IoT
fast growing protocol
expandability
BLE
Energy Efficiency
energy dissipation
energy consumption profile
energy conservation
constrained-resource nodes
composability
complex systems
Bluetooth low energy networks
bluetooth low energy
Bluetooth
BLE static constrained-resources networks
BLE mesh
BLE expandability problem
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
Trust-aware routing protocol for mobile crowdsensing environments
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
sensor lifetime
MCS
Measurement
mobile crowdsensing environments
multi-metric decision
network lifetime
optimal routing decision
packet delivery ratio
residual energy
link quality node selection
Signal to noise ratio
sink node
social behaviour
suboptimal data forwarding
Trust management
trust-aware routing protocol
Trust Routing
Scalability
link quality
Fuzzy logic
friendship mechanism
FR solution
Energy Efficiency
telecommunication power management
Routing
energy conservation
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
mobile computing
Conferences
biblio
Trust aware node scheduling protocol for target coverage using rough set theory
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
target coverage
Protocols
pubcrawl
quality of service
resource scarcity
rough set theory
Rough sets
scheduling strategy
sensors
probability
target coverage problem
telecommunication scheduling
trust
trust aware node scheduling protocol
trust values
Wireless Sensor Network
wireless sensor networks
Human behavior
autonomous operation
computer theory
coverage maximization
coverage probability
decision rules
Energy Efficiency
energy efficient coverage protocol
fault tolerance
active nodes
Human Factors
lifetime
Monitoring
network efficiency
network lifetime
node states
optimisation
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
biblio
A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN
Submitted by grigby1 on Wed, 04/11/2018 - 2:54pm
sensor nodes
resilience
Resiliency
Routing
routing algorithms
Routing protocols
Scalability
secure environmental monitoring system
security
pubcrawl
telecommunication power management
telecommunication security
Time Frequency Analysis
time latency
Wireless communication
wireless sensor area
wireless sensor networks
WSN routing
hybrid routing algorithm
bio inspired algorithms
Channel measurement
Clustering algorithms
cyber physical systems
Data Transmission
environmental monitoring (geophysics)
firefly algorithm
Fireflyalgorithm
Algorithm design and analysis
LAL users
Localizability aided localization routing protocol
metaheuristic hybrid algorithm
Metrics
network lifetime
packet drop
Packet loss
Protocol frequency
biblio
Lifetime-Aware Data Collection Using a Mobile Sink in WSNs with Unreachable Regions
Submitted by grigby1 on Mon, 03/26/2018 - 1:00pm
clustering
composability
Metrics
mobile sinks
network lifetime
pubcrawl
resilience
Resiliency
routing forest
unreachable regions
wireless mesh networks
wireless sensor networks
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
« first
‹ previous
1
2