Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
Prevention of Data Leakage due to Implicit Information Flows in Android Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
privacy policy enforcement
taint analysis
Smalien enforced privacy policy
implicit information flows
implicit information flow
IIFs
IIF-contained information
IIF-accompanied attacks
IIF tricks
IIF detection technique
explicit information
dynamic taint analysis technique
dynamic taint analysis
DTA technique
Android applications
security of data
Android (operating system)
android
Instruments
data leakage
Metrics
privacy
composability
pubcrawl
mobile computing
performance evaluation
security
Runtime
data privacy
Servers
biblio
Cloud: privacy For Locations Based-services' through Access Control with dynamic multi-level policy
Submitted by aekwall on Mon, 01/20/2020 - 12:14pm
location-based services
zero trust
user privacy in the cloud
user location data
third-party application
supplementary servers
Scalability
Resiliency
pubcrawl
policy-based governance
mobile computing
Metrics
Access Control
location information
LBSs
Human Factors
dynamic multilevel policy
data privacy protection
data privacy
data partitioning
cloud-based locations
cloud service
Cloud Computing
authorisation
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
biblio
A Novel Approach on Mobile Devices Fast Authentication and Key Agreement
Submitted by aekwall on Mon, 01/13/2020 - 12:07pm
key agreement
acoustic coupling
virtual key assention
mobile device authentication
GeneWave
gadget verification
gadget inspection
Device-to-device communication
device authentication
cell phones
Acoustics
acoustic communication
encoding
security
message authentication
authentication
Databases
pubcrawl
Human behavior
Resiliency
mobile computing
data encryption
Internet of Things
Cryptography
Scalability
biblio
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
privacy preserving communication
IoT-enabled shopping experience
local coupon storage
localized coupons
Mobile Applications
mobile computing
mobile device
Mobile handsets
privacy
IoT technology
privacy-preserving smart retail environments
pubcrawl
purchasing
retail data processing
Scalability
Servers
wireless channels
Wireless communication
data privacy
Bandwidth
BLE
Cloud Computing
cloud-based systems
coupon safety
CouponHubs
cryptographic management
Cryptography
Aggio
edge computing
electronic coupon distribution system
expert systems
Human Factors
Internet of Things
Internet-of-Things devices
IoT
biblio
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Internet of Things
Task Analysis
Servers
security-sensitive computation task
security of data
security
Scalability
resource allocation
Resiliency
pubcrawl
mobile computing
mixed integer programming multicommodity flow
Mixed integer programming
joint offloading approach
IoT application
IoT
Bandwidth
integer programming
greedy algorithms
greedy algorithm
fog-cloud provider
fog-cloud framework
Fog-cloud computing
Fog Computing and Security
delays
delay-aware secure computation offloading mechanism
Computational modeling
computation resources
computation offloading problem
completion delays
Cloud Computing
biblio
A Control-Theoretic Approach for Location Privacy in Mobile Applications
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
location privacy
users mobility pattern
Scalability
Resiliency
resilience
pubcrawl
protection algorithm
privacy issues
privacy
POI-related privacy measure
PI control strategy
PI control
mobility records simulation
mobile computing
Mobile Applications
Meters
Computing Theory and Privacy
location information
literature focus
Human behavior
dynamic modeling
dispersion
data privacy
Data models
cyber physical systems
Cyber Physical System
control-theoretic approach
control-based approach
Control Theory
control signals
control formulation
biblio
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
service request
preference learning
Processor scheduling
QoS provision
quality of service provision
scheduling
serious security risks
service brokers
service composition
multiagent platform JADE
three-layered trust-enabled service composition model
transaction success rate
trust-based agent learning model
user experience
user experiences
user preference learning
user satisfaction
Computing Theory and Trust
Trust management
Task Analysis
Trusted Computing
mobile computing
learning (artificial intelligence)
pubcrawl
composability
Computational modeling
multi-agent systems
Cloud Computing
fuzzy set theory
quality of service
mobile cloud computing
Compositionality
customers service preferences
fuzzy comprehensive evaluation method
mobile cloud computing environments
multi-agent technology
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »