Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded software
biblio
Program Energy-Hotspot Detection and Removal: A Static Analysis Approach
Submitted by aekwall on Sun, 10/16/2022 - 6:25pm
battery
composability
Computer bugs
embedded software
embedded systems
energy consumption
energy hotspot
Human behavior
pubcrawl
Resiliency
static analysis
static code analysis
Wireless fidelity
worst-case execution-time (WCET)
biblio
Towards Reliable Spatial Memory Safety for Embedded Software by Combining Checked C with Concolic Testing
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
operating systems
Virtual Prototype
RIOT
memory safety
embedded software
concolic testing
Checked C
codes
RISC-V
Writing
software reliability
pubcrawl
Metrics
Policy Based Governance
Safe Coding
Computer bugs
Runtime
Safety
Resiliency
resilience
Human Factors
Human behavior
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
GPU-based approach
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
parallel algorithms
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
data structures
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
feature extraction
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
biblio
Embedded Software Fault Prediction Based on Back Propagation Neural Network
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
metrics testing
Training
statistical analysis
software testing activities
software metrics
software fault tolerance
Software
pubcrawl
program testing
nonlinear fitting ability
Neurons
neural nets
back propagation neural network
Metrics
Measurement
formal verification
filter metric set
fault prediction
embedded systems
embedded software fault prediction
embedded software
Correlation
Biological neural networks
Backpropagation
biblio
A Platform-Aware Model-Driven Embedded Software Engineering Process Based on Annotated Analysis Models
Submitted by grigby1 on Mon, 10/05/2020 - 2:02pm
Analytical models
Biological system modeling
Component-based Software Engineering
Compositionality
Computational modeling
embedded software
Measurement
Model-driven development
On-board Software
pubcrawl
schedulability analysis
tools
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
hardware-software system
tamper-resistant hardware module
Software
self-attestation
SACHa
Resiliency
remote attacks
Read only memory
pubcrawl
Protocols
physical attacks
Microprocessors
intended application code
Human behavior
attestation
hardware-based attestation
Hardware
FPGAs
Field-Programmable Gate Arrays
field programmable gate arrays
embedded systems
embedded software
embedded device
device attestation
configurable hardware
configurable FPGA hardware
computer architecture
composability
biblio
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
execution-profiling CFG
operating systems (computers)
coarse-grained check
coarse-grained control-flow attestation schemes
Control Flow Attestation
control-flow security
costly fine-grained level
Embedded Platform Security
embedded software
Predictive models
execution-profiling control-flow graph
fine-grained remote control-flow attestation
MGC-FA
mutable control-flow attestation scheme
mutable granularity control-flow attestation
Mutable Granularity Scheme
remote control-flow attestation scheme
Resiliency
attestation
Remote Attestation
Runtime
security
software integrity
control-flow attacks
embedded systems
Raspberry Pi
security of data
Human behavior
pubcrawl
composability
machine learning
Probabilistic logic
probability
ARM TrustZone
profile
George Mois
Embedded Software
Systems Engineering
Wireless Sensing and Actuation
Education
embedded software
cloud-based Internet of Things applications
low-power devices
Wireless Sensor Network Technologies
biblio
Automated Vulnerability Analysis Technique for Smart Grid Infrastructure
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
smart grid infrastructure
Power system protection
pubcrawl
resilience
Resiliency
security
security of data
security vulnerability analysis
Smart Grid
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
static analysis
Vulnerability Analysis
vulnerability analysis methodologies
vulnerability discovery method
automated power electricity network
power grid system
power engineering computing
power electricity infrastructure
Metrics
Korean smart grid environment
general systems
embedded software vulnerability discovery
embedded software
cyber-physical system security
cyber-physical system
Computer bugs
computer architecture
Compositionality
composability
automated vulnerability analysis
biblio
Compiler-Assisted Test Acceleration on GPUs for Embedded Software
Submitted by grigby1 on Wed, 05/09/2018 - 2:57pm
Automated Testing
collaboration
compilers
embedded software
Functional testing
GPUs
Human Factors
Metrics
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Safe Coding
1
2
next ›
last »