Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Dynamic Configuration
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Post-Turing Computing, Hierarchical Named Networks and a New Class of Edge Computing
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Resiliency
live-migration
living beings
managed process workflow
microservices
named microservice network
named service connections
Neural networks
Platina systems
post-turing computing
pubcrawl
resilience
kubernetes provisioning stack
Scalability
service network
Software systems
stored program control machines
structural machine framework
structural machines
Turing machine
Turing machines
virtual machine overlay
virtual machines
Edge Cloud
cellular organisms
Church-Turing thesis
Cloud Computing
cognition
Control Theory
Control Theory and Resiliency
Cyber Physical System
cyber physical systems
Dynamic Configuration
dynamic reconfiguration
biological systems
edge cloud platform
edge computing
hierarchical named network
Hierarchical named networks
Human behavior
inductive Turing machines
info-computation
IP address base networks
knowledge structures
Kubernetes
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors