Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
programming languages
biblio
CheckMyCode: Assignment Submission System with Cloud-Based Java Compiler
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
Java cloud based programming compiler
portability
assignment management system
CheckMyCode system
cloud based Java compiler
cloud compiler
Cloud System
computer science and engineering curriculum
educational courses
computer aided instruction
Java programming
learning system
mobile learning
PC browser
programming assignment submission system
programming language learning
smart device browser
Java
Scalability
programming
Task Analysis
Program processors
Resiliency
pubcrawl
Metrics
computer science education
Cloud Computing
Multimedia systems
Writing
Compositionality
program compilers
programming languages
compiler security
smart devices
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
Haskell
tools
Scalability
Resiliency
reasoning
pubcrawl
programming languages
programming differentially private analyses
programming
private data analyses
privacy
Human behavior
taint analysis
functional programming
differential privacy
Databases
data privacy
data analysis
data analyses results
concentration bounds
composability
cognition
accuracy concentration
Accuracy
biblio
Cloud-based Labs and Programming Assignments in Networking and Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 1:02pm
learning activities
teaching
Servers
Security Programming
security of data
public cloud
pubcrawl
Programming profession
programming languages
programming assignments
program testing
program debugging
private cloud
privacy
networking course
Network Programming
Cloud Computing
Laboratories
innovative design
innovate practice
Hands-On Laboratory
educational courses
education
cybersecurity education
cybersecurity course
cyber physical systems
course learning objectives
computer security
computer science education
computer aided instruction
cloud-based labs
biblio
The Software for Authorship and Style Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
programming languages
Vocabulary
transcription variants
transcription symbols
text transforming
text analysis
style attribution
statistical analysis
Software
pubcrawl
attribution
phonostatistical structure
Metrics
Java programming language
Java
information science
Human behavior
gaussian distribution
composability
authorship attribution
biblio
Detecting Input Sanitization Errors in Scala
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
program diagnostics
taint analysis
static types
sensitive sink methods
security of data
ScalaTaint
Scalability
Scala programming language
Scala Compiler
Scala applications
Resiliency
resilience
pubcrawl
programming languages
Compositionality
privacy
object-oriented programming
input sanitization errors
Input Sanitization
Human Factors
Human behavior
high-level language
functional programming
Error
dynamic taint analyzer
Data Sanitization
data deletion
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 9:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Checked C: Making C Safe by Extension
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
incremental conversion
tools
storage management
static analysis
spatial safety
security
Safety
Safe Coding
Resiliency
resilience
pubcrawl
programming languages
program debugging
policy-based governance
performance evaluation
Metrics
backward-compatibility
Human Factors
Human behavior
highly performant code
developer control
Cyclones
Computer bugs
collaboration
checked region
checked pointer
checked C's design
C++ language
C safe
bounds-safe interfaces
Benchmark testing
biblio
Applications for detecting XSS attacks on different web platforms
Submitted by grigby1 on Wed, 01/16/2019 - 1:32pm
Web browser
Reactive power
Resiliency
security
security flaw
security of data
Site Intermediate Script attacks
visualization
Web application
Rails
Web Browser Security
Web platforms
web security
Web sites
web vulnerabilities
XSS attacks
XSS injection
XSS security
intrusion prevention
Compositionality
C\# languages
dynamic web pages
HTML pages
Human behavior
information security
internet
Intrusion Detection
command injection attacks
Java
malicious code worker
malicious Java Script code
Metrics
Nanoelectromechanical systems
online front-ends
programming languages
pubcrawl
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
1
2
next ›
last »