Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy Based Governance
biblio
Intelligent Resource Scheduling at Scale: A Machine Learning Perspective
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
Resource Scheduling
performance-centric node classification
Policy Based Governance
Processor scheduling
pubcrawl
quality of service
resilience
Resiliency
resource allocation
resource management
nonfunctional constraints
Scalability
scheduling
server characteristics
Servers
straggler
straggler mitigation
Task Analysis
workload
Internet-scale Computing Security
Cloud Computing
cloud-scale
collaboration
composability
data centers
exhibited heterogeneity
Human behavior
Human Factors
intelligent resource scheduling
ad-hoc heuristics
Internet-scale systems
large-scale resource scheduling
Large-scale systems
learning (artificial intelligence)
machine learning
Metrics
ML
multidimensional resource requirements
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
GPU-based approach
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
parallel algorithms
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
data structures
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
feature extraction
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
biblio
Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse?
Submitted by grigby1 on Tue, 12/01/2020 - 3:36pm
real-time systems
joint electricity procurement
Linear programming
Load management
market prices
Metrics
multiple geo
Policy Based Governance
price uncertainty
Pricing
Procurement
pubcrawl
joint bidding
realistic setting
resilience
Resiliency
resource allocation
Scalability
standards
strategic bidding
total electricity
uncertainty
wholesale markets
workloads
datacenters
bidding curve
Cloud Computing
cloud service provider
collaboration
composability
computer centres
convex programming
cost reduction
cost-saving performance
CSP
data centers
bandwidth cost
deregulated electricity market
Electricity supply industry
Geographic load balancing
geographical load balancing
GLB
Human behavior
Human Factors
IEEE transactions
Internet-scale Computing Security
Internet-scale service
biblio
Moving Bits with a Fleet of Shared Virtual Routers
Submitted by grigby1 on Tue, 12/01/2020 - 3:36pm
Scalability
Metrics
networking community
offloading network functionality
on-demand instances
Policy Based Governance
price disparity
Pricing
pubcrawl
resilience
Resiliency
IP transit prices
shared virtual routers
telecommunication network routing
telecommunication network topology
third-party cloud spot instances
traffic demands
transit providers
unit pricing
virtual network provider
virtualisation
Economics
bandwidth costs
Cloud Computing
cloud providers
cloud-assisted networks
collaboration
composability
computing resources
data transfer
data transfers
dedicated resources
Bandwidth
flexible network service chains
Human behavior
Human Factors
internet
Internet core hubs
Internet ecosystem
Internet-scale Computing Security
Internet-scale interconnections
IP networks
biblio
Remote Monitoring and Online Testing of Machine Tools for Fault Diagnosis and Maintenance Using MTComm in a Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
prognosis
maintenance engineering
manufacturers
manufacturing
manufacturing operations
Metrics
MTComm
performance evaluation
Policy Based Governance
Probes
product quality
product quality prediction
production engineering computing
maintenance
pubcrawl
remote monitoring
remote online testing
resilience
Resiliency
RESTful Web services
Scalability
Servers
testing
testing operations
web services
cyber-physical systems
cloud applications
Cloud based fault diagnosis
Cloud Computing
collaboration
component level
composability
condition monitoring
Conferences
CPMC
cyber physical manufacturing cloud
cyber-physical manufacturing cloud
Anomaly Detection
factory floor data
fault diagnosis
fault diagnosis system
heterogeneous machine tools
Human behavior
Human Factors
Internet scale communication method
Internet-scale Computing Security
machine health monitoring
machine tool communication
machine tools
biblio
MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
pubcrawl
manufacturing
manufacturing processes
Metrics
MTComm
MTComm based virtualization
physical machine need
physical machine operations
Policy Based Governance
production engineering computing
machine tools
resilience
Resiliency
Scalability
Solid modeling
Three-dimensional displays
virtual images
Virtualization
visualization
Digital-Twin
Cloud Computing
collaboration
composability
CPMC
Cyber Manufacturing
cyber-physical manufacturing cloud
cyber-physical systems
data visualisation
application scenarios
digital-twin simulator
Digital-Twins simulate physical world objects
Human behavior
Human Factors
image classification
Internet scale machine tool communication method
Internet-scale Computing Security
machine sensors
biblio
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
Internet-scale insecurities
unsolicited IoT devices
unsolicited Internet-scale IoT devices
Smart homes
smart home appliances
Scalability
Resiliency
resilience
pubcrawl
Policy Based Governance
Metrics
IoT paradigm
IoT malicious raw data
IoT cyber security situational awareness
Internet-wide scanning
internet-scale unsolicited IoT devices inference
collaboration
Internet-scale Computing Security
Internet of Things
internet of malicious things
Internet frontier
Internet background radiation traffic
internet
Human Factors
Human behavior
Home appliances
electric industrial facilities
critical infrastructures
critical infrastructure
computer security
computer network security
composability
biblio
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
Protocols
learning (artificial intelligence)
Local area networks
modern industrial control systems
Policy Based Governance
policy-based governance
privacy
protocol frame structures
protocol frames
protocol verification
Industrial Safety
pubcrawl
security
security checks
security vulnerabilities
self learning
SeqFuzzer
stateful protocols
target protocol
vulnerability mining
deep learning perspective
composability
Compositionality
computer architecture
computer network security
Control Automation Technology devices
Data models
Decoding
deep learning
deep learning model
collaboration
EtherCAT
Fuzz Testing
fuzzing
fuzzing framework
industrial communication processes
industrial communication protocols
industrial network
industrial protocol fuzzing framework
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »