Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Building an Open Identity Platform for India
Submitted by grigby1 on Wed, 03/08/2017 - 2:31pm
internet
vendor neutrality
unique identity project
technology platform
technology architecture
supply chains
security of data
security
pubcrawl170112
open systems
open standards
open source components
open identity platform
Aadhaar authentication service
India
design thinking
data centers
computer centres
computer architecture
Buildings
biometrics (access control)
biometric identity system
authentication
architecture
Aadhaar system
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
SPAA-Aware 2D Gaussian Smoothing Filter Design Using Efficient Approximation Techniques
Submitted by grigby1 on Wed, 03/08/2017 - 2:03pm
Error Tolerant Applications
speed-power-area-accuracy
SPAA-aware 2D Gaussian smoothing filter design
SPAA metric
smoothing methods
rounding-off Gaussian kernel coefficient
pubcrawl170111
portable multimedia devices
nearest pixel approximation
limited battery lifetime
Kernel
Image edge detection
Gaussian Smoothing Filter
Gaussian processes
adders
energy-efficient designs
energy-efficient approximate 2D GSF architecture
energy-efficient approximate 2D Gaussian smoothing filter architecture
Energy-efficiency
Edge-detection
edge detection
computer architecture
Complexity theory
approximation theory
approximation technique
Approximation methods
Approximate design
biblio
A mixed discrete-continuous optimization scheme for Cyber-Physical System architecture exploration
Submitted by grigby1 on Wed, 03/08/2017 - 1:53pm
discrete systems
sizing routine
pubcrawl170110
optimization time
optimization
optimisation
mixed discrete continuous optimization scheme
Mathematical model
magnitude reduction
Libraries
Engines
aircraft control
discrete space
discrete optimization routine
discrete architecture selection engine
cyber-physical system architecture exploration
CPS
contracts
continuous sizing engine
computer architecture
Atmospheric modeling
aircraft environmental control system
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
computer architecture
Computer crime
intrusion tolerance
Markov processes
Numerical models
Preventive maintenance
pubcrawl170109
Servers
System Availability
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
Healing process towards resiliency in cyber-physical system: A modified danger theory based artifical immune recogization2 algorithm approach
Submitted by grigby1 on Mon, 02/27/2017 - 12:52pm
danger theory
simulation environment
Resiliency
pubcrawl170107
multiagent paradigm
multi-agent systems
Multi Agent System
modified danger theory
Microprocessors
Immune system
healing process
actuators
cyber-physical systems
cyber-physical system
convergence rates
computer architecture
biological inspired danger theory
artificial immune systems
Artificial Immune Recognization2 Algorithm
Artifical Immune System
artifical immune recogization algorithm approach
Admission control
« first
‹ previous
…
51
52
53
54
55
56
57
58
59
next ›
last »