Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software libraries
biblio
Evaluating the Performance of Various Deep Reinforcement Learning Algorithms for a Conversational Chatbot
Submitted by aekwall on Fri, 08/26/2022 - 11:05am
chatbot
QR-DQN
q-learning
NMT
DQN
deep reinforcement learning
BiRNN
Attention Model
software libraries
conversational agents
Measurement
Recurrent neural networks
Reinforcement learning
Industries
Human behavior
Metrics
Scalability
pubcrawl
deep learning
biblio
Stacking Ensemble-based XSS Attack Detection Strategy Using Classification Algorithms
Submitted by aekwall on Tue, 04/19/2022 - 10:29am
pubcrawl
XSS payload
Uniform resource locators
Technological innovation
Stacking Ensembles
Stacking
software libraries
Scalability
Resiliency
Random Forest
classification
Predictive models
logistic regression
k-means clustering
Human behavior
Decision Tree
Cross-site scripting (XSS) attack
cross-site scripting
Cross Site Scripting
Classification algorithms
biblio
Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
Submitted by grigby1 on Tue, 05/25/2021 - 2:24pm
Prediction algorithms
SVP
standards
software libraries
Software algorithms
Software
sieving algorithms
Scalability
Resilient
resilience
pubcrawl
collaboration
modular software
Metrics
Lattices
lattice-based cryptography
Human Factors
Human behavior
HashSieve
cryptology
Cryptography
composability
biblio
An Approach to Embedding a Style Transfer Model into a Mobile APP
Submitted by aekwall on Mon, 02/01/2021 - 10:44am
pre-trained convolutional neural network model
Economic indicators
mobile users
deep learning models
neural style transfer
Mobile app
embedding CNN models
Perceptual Losses algorithm
photo processing apps
Feedforward neural networks
proceeding time
shorten waiting time
Style transfer model
TensorFlow Mobile library
time 2.0 s
time 2.8 s
traditional style transfer model
Scalability
feedforward neural network
image restoration
Predictive Metrics
feedforward neural nets
software libraries
mobile phone
convolutional neural nets
testing
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
mobile computing
Internet of Things
Big Data
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers
Submitted by aekwall on Tue, 09/08/2020 - 9:16am
Virtual machine monitors
policy governance
clean slate
Unikernels
unikernel technologies
software-defined systems
software defined systems
software defined cloud computing
lightweight virtualization technologies
lightweight virtualization approaches
legacy unikernels
hardware infrastructure
Docker LinuxKit
Docker Containers
cloud infrastructure components
big monolithic applications
Cloud Computing
operating systems
virtual machines
operating systems (computers)
Virtualization
cloud
performance evaluation
Containers
software libraries
Metrics
pubcrawl
Human behavior
Resiliency
Kernel
virtualisation
Servers
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
biblio
Comparing the Usability of Cryptographic APIs
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
GitHub
Usable Security
usability
symmetric cryptography
software libraries
Security by Default
Scalability
Resiliency
Python developers
pubcrawl
programming
Libraries
Guidelines
API usability
documentation accessibility
documentation
cryptography errors
Cryptography
cryptographic library
cryptographic application programming interfaces
cryptographic API usability
controlled experiment
code security
auxiliary features
application program interfaces