Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
A Location-aware Computation Offloading Policy for MEC-assisted Wireless Mesh Network
Submitted by aekwall on Mon, 03/01/2021 - 4:44pm
context-awareness
Wireless Mesh Network Security
WMN
wireless mesh network
traditional wireless communication
Time delay
mobile energy savings
MEC-assisted wireless mesh network
low latency energy savings
low deployment cost
location-aware offloading policy algorithm
location-aware computation offloading policy
LAOP algorithm
flexible network architecture
Delay effects
access network
Cloud Computing
Computation offloading
energy consumption
Mobile Edge Computing
wireless mesh networks
delays
Metrics
Computational modeling
Routing
composability
pubcrawl
Resiliency
mobile computing
Task Analysis
Servers
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
Design of an Augmented Reality System for Immersive Learning of Digital Electronic
Submitted by grigby1 on Wed, 02/03/2021 - 1:08pm
immersive learning
tools
resilience
pubcrawl
privacy
Multimedia systems
mobile learning
mobile computing
Mobile Applications
Mobile Application
Logic gates
Libraries
ios
interactive systems
interactive app
immersive systems
Human Factors
Human behavior
electronic engineering education
electronic engineering computing
education
digital electronics
Digital circuits
cyber physical systems
computer aided instruction
composability
Cameras
augmented reality system
augmented reality
biblio
An Approach to Embedding a Style Transfer Model into a Mobile APP
Submitted by aekwall on Mon, 02/01/2021 - 11:44am
pre-trained convolutional neural network model
Economic indicators
mobile users
deep learning models
neural style transfer
Mobile app
embedding CNN models
Perceptual Losses algorithm
photo processing apps
Feedforward neural networks
proceeding time
shorten waiting time
Style transfer model
TensorFlow Mobile library
time 2.0 s
time 2.8 s
traditional style transfer model
Scalability
feedforward neural network
image restoration
Predictive Metrics
feedforward neural nets
software libraries
mobile phone
convolutional neural nets
testing
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
mobile computing
Internet of Things
Big Data
biblio
Machine Learning Method Based on Stream Homomorphic Encryption Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
Elliptic curve cryptography
stream homomorphic encryption computing
mobile positioning
KNN
k nearest neighbors
computational time
computational resources
\$k\$ nearest neighbors
Homomorphic encryption
data analysis
estimation
Human Factors
security
Mathematical model
Distributed databases
Metrics
pubcrawl
Resiliency
machine learning
nearest neighbour methods
mobile computing
encryption
Cryptography
Scalability
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
E-Voting System In Smart Phone Using Mobile Application
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Humanoid robots
Web technologies
voting process
smart phones
smart phone
Servers
Scalability
Resiliency
resilience
pubcrawl
polling booth
OTP
mobile computing
Mobile Application
Metrics
internet
android encryption
Human behavior
government data processing
fraud voters
fraud
encryption
electronic voting
e-voting system
Cryptography
computer science
casted vote count
biometric
Androids
Android platform
AES256 algorithm
Aes256
biblio
Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
modern mobile devices
video sharing software
times people
Software
smart phones
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving mobile video sharing
privacy-preserving method
android encryption
mobile computing
mobile cameras
Metrics
Human behavior
fully homomorphic encryption scheme
encryption
data privacy
Cryptography
Conferences
Cameras
biblio
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
Metrics
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
Monitoring
mobile computing
Access Control
Intelligent sensors
Human behavior
encryption
context-aware
Context modeling
Automated Secure Software Engineering
attribute-based encryption
android encryption
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »