Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
timing
biblio
14.3 A 28nm SoC with a 1.2GHz 568nJ/prediction sparse deep-neural-network engine with \#x003E;0.1 timing error rate tolerance for IoT applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:07pm
Internet of Things
VDD scaling
timing error rate tolerance
timing
Throughput
system-on-chip
sign-magnitude number format
Resiliency
resilience
Razor timing violation detection
pubcrawl
programmable FC-DNN accelerator design
Program processors
Neural Network Resilience
neural nets
IoT applications
1.2GHz 568nJ/prediction sparse deep-neural-network engine
frequency 667 MHz
frequency 1.2 GHz
frequency 1 GHz
FCLK scaling
Error analysis
Engines
Energy Efficiency
datapath logic
data sparsity
circuit-level timing violation tolerance
circuit resilience
algorithmic resilience
algorithmic error tolerance
aggregate timing violation rates
28nm SoC
biblio
An assessment of vulnerability of hardware neural networks to dynamic voltage and temperature variations
Submitted by grigby1 on Thu, 06/07/2018 - 3:06pm
natural language processing
timing
temperature variations
Speech recognition
Resiliency
resilience
pubcrawl
problem solving
Neural Network Resilience
neural network algorithms
neural nets
adders
multilayer perceptrons
MLP
medical applications
Logic gates
learning (artificial intelligence)
hardware neural networks
Hardware
dynamic voltage
CNN
Biological neural networks
biblio
On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Submitted by grigby1 on Wed, 05/30/2018 - 4:06pm
Scalability
pubcrawl
public key cryptography
quantum computing
quantum-resistant SIDH protocol
quantum-resistant supersingular isogeny Diffie-Hellman protocol
random number generation
resilience
Resiliency
Protocols
secret kernel point
secret scalars
side-channel analysis
signature based defense
simple power analysis
timing
timing attacks
true random number generator
Elliptic curves
Cryptographic Protocols
Cryptography
Differential Power Analysis
double-point multiplication
ECDH key exchange
Electronic mail
elliptic curve Diffie-Hellman key exchange
elliptic curve isomorphism
ALU
elliptic curve theory
Fault Attacks
Fermat little theorem inversion
Hardware
hardware architectures
isogeny-based cryptography
oracle attacks
Post-quantum cryptography
biblio
Next Generation Automotive Architecture Modeling and Exploration for Autonomous Driving
Submitted by el_wehby on Fri, 05/25/2018 - 4:23pm
next generation automotive architecture modeling
timing
system integration
Software Architecture
Software
sensors
security
road vehicles
optimization
optimisation
Automotive engineering
mobile robots
mechanical engineering computing
heterogeneous components
hardware architecture
design metrics validation
control engineering computing
computer architecture
Autonomous Driving
Autonomous automobiles
1553757
biblio
CONVINCE: A cross-layer modeling, exploration and validation framework for next-generation connected vehicles
Submitted by el_wehby on Fri, 05/25/2018 - 4:23pm
next-generation semiautonomous vehicles
vehicular ad hoc networks
vehicles
vehicle-to-vehicle applications
vehicle-to-infrastructure applications
V2V communication network
V2I communication network
timing
Software
security
Analytical models
next-generation connected vehicle
next-generation autonomous vehicles
next generation networks
Mathematical model
holistic environment
cross-layer modeling exploration and validation framework
CONVINCE framework
Computational modeling
1553757
biblio
Optimized event notification in CAN through in-frame replies and Bloom filters
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
event-driven systems
timing
real-time systems
protocol
Proposals
Payloads
optimized event notification
Media Access Protocol
in-frame replies
access protocols
Electronic mail
distributed medium access control mechanism
data structures
controller area networks
CAN XR
Bloom filters
asynchronous medium access control mechanism
1646317
biblio
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity
Submitted by grigby1 on Wed, 05/09/2018 - 2:57pm
software errors
real-time systems
resilience
Resiliency
Safe Coding
safe diversity approach
safety-critical real-time systems
safety-critical software
security
security of data
real-time processes
software vulnerabilities
static WCET analysis
timing
timing guarantees
timing properties
unacceptable performance overheads
WCET
WCET-aware artificial diversity
worst case execution time
Layout
artificial software diversity
block-level diversity
code-reuse attacks
collaboration
cyber-physical systems
embedded systems
hardware resources
Human Factors
individual probability
Artificial Diversity
Metrics
movable instruction sequences
policy-based governance
Policy-Governed Secure Collaboration
probability
pubcrawl
real-time
real-time cyber-physical systems
biblio
Spectral Keyboard Streams: Towards Effective and Continuous Authentication
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke dynamics
Vectors
timing
Time series analysis
time series
spectral keyboard streams
robust authentication mechanisms
pubcrawl
online learning platforms
on-line assessment
Metrics
learning (artificial intelligence)
keystroke time series
Keystroke Streams
authentication
keystroke analysis
Keyboards
keyboard user monitoring
keyboard dynamics
Human Factors
Human behavior
discrete wavelet transforms
discrete wavelet transform
Discrete Fourier transforms
discrete Fourier transform
Continuous Authentication
benchmark feature vector representation
behavioral biometric
biblio
Sensitivity Analysis in Keystroke Dynamics Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
Behavioral biometrics
convolution
convolutional neural network
data augmentation
deep learning
feature extraction
Human behavior
Human Factors
keystroke analysis
keystroke dynamics
Metrics
password
Presses
pubcrawl
timing
Training
biblio
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
Post-quantum
timing
SoCs
security
Scalability
Resiliency
quantum computing security
quantum computing
pubcrawl
Cache Attack
NTRUEncrypt
Metrics
Lattices
IoT
Hardware
encryption
composability
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »