Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource management
biblio
Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Radio Access Network
integrated user application-specific demand characteristics
intra-slice resource sharing elasticity
massive machine type communication
network characteristics evaluation
network load
network utility
online slice allocation model
quality of experience
heterogeneous traffic demand
resource allocation decision metric
resource allocation framework performance
resource management
service demand
slice resource block-size
ultra-reliable low-latency communication
predictive security metrics
Internet of Things
estimation theory
enhanced mobile broadband
Dynamic scheduling
dynamic intra-slice decision boundary estimation model
Bandwidth
admission control strategy
Admission control
5G wireless network
resource allocation
Metrics
telecommunication congestion control
telecommunication traffic
quality of service
5G mobile communication
pubcrawl
biblio
Complex Network Cybersecurity Monitoring Method
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
resource management
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Task Analysis
system monitoring
special-purpose devices
security sensor
security of data
resource allocation
limited resource allocation
cybersecurity monitoring
complex networks
complex network unit cybersecurity
complex network cybersecurity monitoring
complex network
Bipartite graph
computer security
Scalability
Monitoring
sensors
biblio
Reinforcement Learning Based Multi-Tenant Secret-Key Assignment for Quantum Key Distribution Networks
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
quantum cryptography
predictability
Security Heuristics
tenant-request blocking probability
quantum key distribution networks
online multitenant secret-key assignment algorithm
Benchmark testing
Heuristic algorithms
Artificial Neural Networks
Scalability
Training
Reinforcement learning
resource management
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
Heuristics-Based Multi-Agent Task Allocation for Resilient Operations
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
pre-requisite
Markovian assumptions
Markovian state information
modeling probabilistic failure
natural world
navigation
nonMarkovian setting
nonMarkovian state modeling
novel heuristic
intelligent task assignment
real-world systems
realistic state
rescue robots
resilient operations
SAR
uncertainty modeling
Security Heuristics
predictability
Probabilistic logic
Task Analysis
Resiliency
pubcrawl
resource management
multi-robot systems
multi-agent systems
robots
uncertainty
Scalability
Markov processes
Linear programming
agent failure
complex environments
heuristics-based multiagent task allocation
imulated search and rescue mission
inherent challenges
biblio
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
single LRU cache
Nickel
optimal distributed LRU caching
Organizations
probability
reliability theory
reliable caches
resilience
Resiliency
resource management
Scalability
separate LRU caches
single-hop multicache distributed system
Mobile Edge Computing
storage management
symmetric channels
system design
System performance
total cache space
total memory space
unreliable channels
unreliable LRU caches
Web Caching
wired Web servers
wireless content delivery networks
data items
asymptotic miss probabilities
asymptotic miss probability
cache miss ratios
cache storage
channel unreliability probabilities
Communication Systems
counterintuitive characteristics
counterintuitive insights
critical method
data centers
Data-Intensive Applications
asymmetric cache organization
data placement
data replication schemes
data routing strategies
efficient cache organization
efficient data access
explicit unequal allocation policy
fast data access
fundamental method
Hash functions
LRU caching systems
Metrics
biblio
Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:10pm
Metrics
Zigbee
wireless networks
timeslot allocation method
timeslot allocation
secure join
resource management
resource limitation problem
Resiliency
resilience
radio networks
pubcrawl
policy-based governance
multiple node join mechanism
collaboration
Mesh networks
IPv6-based industrial wireless network
ipv6 security
IPv6
IP networks
internet
industrial wireless network
IEEE 802.15.4e network
IEEE 802.15 Standard
Cryptography
computer network security
composability
biblio
APDPk-Means: A New Differential Privacy Clustering Algorithm Based on Arithmetic Progression Privacy Budget Allocation
Submitted by aekwall on Mon, 01/06/2020 - 10:36am
k-means algorithm
Sensitivity
security of data
Scalability
resource management
Resiliency
pubcrawl
privacy protection
privacy budgets
privacy budget allocation
privacy
pattern clustering
optimisation
network information security
network data mining
APDPk-means
iterative process
Iterative methods
Human behavior
differential privacy k-means
differential privacy clustering algorithm
differential privacy
Data protection
Data mining
data clustering
composability
Clustering algorithms
Big Data
arithmetic progression privacy budget allocation
biblio
Balancing Security Guarantees vs QoS Provisioning in Combined Fog-to-Cloud Systems
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
efficient management solution
significant proportion
security of data
Scalability
resulting scenario
resource management
Resiliency
quality of service
QoS-Security trade-off
QoS provisioning
pubcrawl
Fog-to-Cloud
Fog Computing and Security
Fog computing
delivered QoS
decoupled transversal security strategy
DCF
Cryptography
computer architecture
combined fog-to-cloud systems
Cloud Computing
challenging aspects
balancing Security guarantees
authentication
architectural oriented policy handling
security
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
biblio
The seven deadly myths of" autonomous systems"
Submitted by Katie Dey on Thu, 09/12/2019 - 5:22pm
human computer interaction
Teamwork
context awareness
Man machine systems
resource management
Intelligent systems
human-centered computing
autonomous systems
Theory of Minds
Human Machine Teaming
C3E 2019
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »