Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context-aware services
biblio
Context Aware Fog-Assisted Vital Sign Monitoring System: Design and Implementation
Submitted by grigby1 on Fri, 02/03/2023 - 4:19pm
Internet of Things
Cloud Computing
security
Servers
pubcrawl
Metrics
resilience
Resiliency
Scalability
Fog computing
context awareness
microcontrollers
Context-aware services
Human Factors
Pervasive Computing Security
cost effective
biblio
An End-to-End Context Aware Anomaly Detection System
Submitted by grigby1 on Wed, 07/28/2021 - 7:48am
Anomaly Detection
Computational modeling
Computing Theory
Context-aware services
deep learning
Industries
Internet-of-Things
Metrics
Pipelines
pubcrawl
Security Metrics
Semantics
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 10:54am
ubiquitous computing
Computing Theory and Privacy
user data privacy preservation
three-antithetic-party game
serious privacy issues
privacy-preserving data collection scheme
privacy leakage risk
data collection game
context-awareness
Context-aware services
context-aware applications
smart devices
game model
security of data
Numerical models
Games
Data collection
privacy
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Recognition of Human Computer Operations Based on Keystroke Sensing by Smartphone Microphone
Submitted by grigby1 on Mon, 01/21/2019 - 11:28am
human computer interaction
word recognition procedure
ubiquitous computing
smartphone sensing
smartphone microphone
smart phones
sensors
Semantics
semantic features
Resiliency
pubcrawl
microphones
keystroke sensing
Keyboards
human computer operation recognition
human computer operation
acoustic features
Human behavior
Games
fingerprint identification techniques
fingerprint identification
Feature fusion
feature extraction
determined keystrokes
Context-aware services
computer keyboard
composability
classification model
Activity Recognition
Acoustics
Acoustic Fingerprints
biblio
Context Aware Ubiquitous Biometrics in Edge of Military Things
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
operational context data collection
Internet of Things
iobt
IoMT
message authentication
military computing
military equipment
military personnel
military-battlefield applications
internet of military/battlefield things
pubcrawl
resilience
Resiliency
Scalability
soldier psychophysical condition continuous monitoring
static biometrics
ubiquitous computing
ubiquitous sensing
context-adaptive authentication
battlefield-level biometric monitoring
biometrics (access control)
Cloud Computing
computer architecture
computing devices
Conferences
context aware biometrics
context aware ubiquitous biometrics
authentication
Context-aware services
dedicated edge computing architecture
distributed processing
dynamic biometrics
edge of military things
Human Factors
Internet of battlefield things
Internet of military Things
biblio
Multicast Security Model for Internet of Things Based on Context Awareness
Submitted by grigby1 on Mon, 03/19/2018 - 12:48pm
actuator security
actuators
composability
context awareness
Context-aware services
Group key management
Human behavior
Internet of Things
Metrics
Protocols
pubcrawl
resilience
Resiliency
security
sensors
Servers