Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy Based Governance
biblio
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
resilience
neural nets
Neural networks
optimal MAC strategy
Policy
Policy Based Governance
policy governance
prior knowledge
pubcrawl
radio networks
network layers
Resiliency
Robustness
share spectrum
telecommunication computing
time division multiple access
time-slotted networks
traditional reinforcement learning
universal MAC protocol
wireless networks
DRL algorithmic framework
clean-slate design
collaboration
convergence
DARPA SC2
deep reinforcement learning
deep-reinforcement learning multiple access
design framework
DLMA
DRL agent
clean slate
heterogeneous wireless networks
Human behavior
Human Factors
learning (artificial intelligence)
MAC design
machine learning
machine-learning technique
Media Access Protocol
Metrics
biblio
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
Resiliency
NDN
node mobility
performance tuning
Policy
Policy Based Governance
policy governance
practical adoption
Protocols
pubcrawl
resilience
Named Data Networking (NDN)
stable connections
tactical applications
tactical edge networks
tactical environments
tactical networks
transport protocols
unreliable capacity limited performance
wireless nature
wireless sensor networks
ICN
application-specific extensions
clean slate
clean slate networking approach
collaboration
communication scenario
Engines
Face
fairly stable infrastructure-based environments
Human behavior
Human Factors
Ad hoc networks
information centric networking
Information-Centric Networking (ICN)
internet
IP networks
Metrics
military communication
mobile computing
mobile military networks
named data networking
biblio
Keys in the Clouds: Auditable Multi-Device Access to Cryptographic Credentials
Submitted by grigby1 on Tue, 11/19/2019 - 2:38pm
cloud
collaboration
Governance
Intel SGX
key management
Policy Based Governance
pubcrawl
biblio
Privacy and Identity Management in Learning Analytics Processes with Blockchain
Submitted by grigby1 on Tue, 11/19/2019 - 2:38pm
blockchain
collaboration
data privacy
data security management
Digital identity
Governance
learning analytics
Policy Based Governance
pubcrawl
biblio
When Willeke Can Get Rid of Paperwork: A Lean Infrastructure for Qualified Information Exchange Based on Trusted Identities
Submitted by grigby1 on Tue, 11/19/2019 - 2:38pm
authentication
authorisation
collaboration
data minimisation
data portability
digital infrastructures
distributed systems
EIDAS
GDPR
Governance
personal data management
Policy Based Governance
privacy
pubcrawl
qualified information exchange
biblio
Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control
Submitted by grigby1 on Tue, 11/19/2019 - 2:38pm
attribute-based access control
collaboration
Governance
logical models
Policy Based Governance
policy formalism
pubcrawl
security
biblio
Interoperability Governance: A Definition and Insights from Case Studies in Europe
Submitted by grigby1 on Tue, 11/19/2019 - 2:37pm
collaboration
Governance
governance models
interoperability
interoperability governance
Policy Based Governance
pubcrawl
biblio
A Security Policy Enforcement Framework for Controlling IoT Tenant Applications in the Edge
Submitted by aekwall on Mon, 06/17/2019 - 9:21am
Policy Based Governance
Access Control
edge computing
IoT
model-driven security
policy-based governance
pubcrawl
security policies
services computing
ThingML
biblio
RestAssured: Securing Cloud Analytics
Submitted by grigby1 on Fri, 03/22/2019 - 11:38am
Big Data Analytics
big data security
cloud
Metrics
Policy Based Governance
pubcrawl
resilience
Resiliency
Scalability
Secure computing
biblio
An Empirical Study on the Effect of Information Security Activities: Focusing on Technology, Institution, and Awareness
Submitted by grigby1 on Thu, 05/24/2018 - 11:32am
collaboration
Information culture
information protection
information security
Information security breach
Policy
Policy Based Governance
policy-based governance
pubcrawl
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »