Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource management
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT-IIoT networks
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
iiot
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
sensors
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
IoT
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 11:43am
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
particle swarm optimization
weighted sum rate maximization
user grouping procedure
user association
swarm intelligence algorithms
Swarm Intelligence
Silicon carbide
Signal to noise ratio
resource management
resource allocation
Receivers
pubcrawl
PSO
power allocation
physical resource block allocation
5G
particle swarm optimisation
orthogonal clusters
nonorthogonal multiple access networks
Non-Orthogonal Multiple Access (NOMA)
NOMA networks
NOMA
multiple base stations
multi-access systems
joint user association-power allocation
Interference
Grey Wolf optimizer
Evolutionary algorithms
Compositionality
composability
biblio
Intelligent Resource Scheduling at Scale: A Machine Learning Perspective
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
Resource Scheduling
performance-centric node classification
Policy Based Governance
Processor scheduling
pubcrawl
quality of service
resilience
Resiliency
resource allocation
resource management
nonfunctional constraints
Scalability
scheduling
server characteristics
Servers
straggler
straggler mitigation
Task Analysis
workload
Internet-scale Computing Security
Cloud Computing
cloud-scale
collaboration
composability
data centers
exhibited heterogeneity
Human behavior
Human Factors
intelligent resource scheduling
ad-hoc heuristics
Internet-scale systems
large-scale resource scheduling
Large-scale systems
learning (artificial intelligence)
machine learning
Metrics
ML
multidimensional resource requirements
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
Cognitive radio (CR) network
Cognitive Radio Security
yardstick based threshold allocation technique
Yardstick based Threshold Allocation (YTA)
X-graph
unlicensed secondary users
spectrum sensing
spectrum scarcity problem
spectrum access probability
Secondary User (SUs)
Primary User Emulation Attack (PUEA)
Primary User (PU)
ns2
free spectrum
dynamic cognitive radio networks
pubcrawl
radiofrequency interference
primary user emulation attack
emulation
licensed primary user
radio spectrum management
cognitive radio
STEM
resource management
sensors
estimation
Analytical models
telecommunication security
Resiliency
resilience
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
malware
BIOS Security
resource utilization consistency
Probes
heatmap training mechanism
Heating systems
flow graphs
defensive deception
decoy processes
decoy process
control flow graphs
neural network
Human Factors
Scalability
neural nets
Neural networks
learning (artificial intelligence)
Training
resilience
Resiliency
Metrics
pubcrawl
machine learning
resource management
resource allocation
invasive software
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »