Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource allocation
biblio
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Internet of Things
Task Analysis
Servers
security-sensitive computation task
security of data
security
Scalability
resource allocation
Resiliency
pubcrawl
mobile computing
mixed integer programming multicommodity flow
Mixed integer programming
joint offloading approach
IoT application
IoT
Bandwidth
integer programming
greedy algorithms
greedy algorithm
fog-cloud provider
fog-cloud framework
Fog-cloud computing
Fog Computing and Security
delays
delay-aware secure computation offloading mechanism
Computational modeling
computation resources
computation offloading problem
completion delays
Cloud Computing
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 9:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
Research of Security Situational Awareness and Visualization Approach in Cloud Computing
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
data visualisation
storage resource utilization
standardization
situational information
situational awareness
security situational awareness
secure information
high-efficiency advantage
emergency response methods
elastic resource pooling
cloud computing security
Data visualization
Cloud Computing
network security
security events
sensors
resource allocation
composability
Resiliency
Metrics
pubcrawl
resilience
Computational modeling
security of data
biblio
Oases: An Online Scalable Spam Detection System for Social Networks
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
social communities
DHT based overlay
Distributed databases
load-balancing
malware disseminators
Oases
online scalable spam detection system
progressive aggregation tree
resource allocation
decentralized DHT-based tree overlay deployment
social spam
spam classifiers
spammers
trees (mathematics)
Twitter data
Vegetation
Web-based social networks
Metrics
invasive software
Human behavior
pubcrawl
Routing
Peer-to-peer computing
online social networks
social networking (online)
Twitter
Scalability
pattern classification
internet
unsolicited e-mail
spam detection
Training
community-based opportunities
content polluters
biblio
Analysis on Convergence of Stochastic Processes in Cloud Computing Models
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
cloud computing models
Stochastic computing
Stochastic Process
stochastic matrix
stochastic matrices
resource allocations
Rate of Convergence
matrix-defined systems
matrix algebra
Markov processes
complicated model
common stochastic processes
cloud computing systems
Cloud Computing
arbitrary stochastic processes
Eigenvalues and eigenfunctions
Biological system modeling
Steady-state
convergence
Stochastic processes
resource allocation
Scalability
Resiliency
pubcrawl
Computational modeling
security
biblio
A Trace-Based Performance Study of Autoscaling Workloads of Workflows in Datacenters
Submitted by grigby1 on Mon, 12/10/2018 - 10:42am
resources
operational behavior
provisioning policies
pubcrawl
real world traces
resilience
Resiliency
resource allocation
resource management
Monitoring
Scalability
scheduling
simulation
Task Analysis
time related autoscaling complexity metrics
trace based simulation
work factor metrics
allocation policies
memory related autoscaling complexity metrics
Measurement
Human Factors
elasticity metrics
datacenters
datacenter operators
Data models
customer experience
computer centres
computational complexity
Cloud Computing
autoscaling
autoscaler
application domains
Analytical models
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 10:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing
biblio
“Combat Cloud-Fog” Network Architecture for Internet of Battlefield Things and Load Balancing Technology
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
military computing
Internet of battlefield things
Internet of Things
Internet of Things technology
iobt
load balancing strategy
load balancing technology
Load management
load-balancing
military communication
Internef ot Battlefield Things
pubcrawl
resilience
Resiliency
resource allocation
Scalability
Task Analysis
task response latency
the-Internet-of-Battlefield-Things
Distributed databases
battlefield information
Cloud Computing
combat cloud network
combat cloud- fog network architecture
combat cloud-fog network system
combat-cloud-fog
computer architecture
computing capability
distributed computing load balancing problem
battlefield environment
distributed generalized diffusion strategy
distributed processing
edge computing
edge network equipment close
fog computing layer
fog equipment
fog-computing
Human Factors
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 2:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »