Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Energy Efficiency
biblio
Energy Efficient Embedded Systems for LED Lighting Control in Traffic
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
energy efficient embedded systems
universal embedded system
Smart Systems
quality lighting
microprocessor based embedded systems
low energy consumption
lighting control in traffic
lighting control
lighting
LED technology
LED lighting technology
LED lighting control
LED lighting
energy efficient microprocessor
Resiliency
energy consumption efficiency
digital embedded system
road traffic
light emitting diodes
energy consumption
embedded systems
microcontrollers
Energy Efficiency
Metrics
Roads
composability
pubcrawl
biblio
Selection Mechanism for Underwater Multi-Media Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:35pm
acoustic medium
Underwater Networks
Visible Light medium
visible light communication (VLC)
underwater single medium communication
underwater multimedia communication
underwater MAC protocols
underwater acoustic communication
selection mechanism
propagation delay
multi-media
medium access control layer
harsh underwater environment
Earth's surface
Scalability
acoustic
access protocols
telecommunication network reliability
Energy
Multimedia communication
Data Transmission
Energy Efficiency
Metrics
telecommunication power management
energy conservation
pubcrawl
Resiliency
biblio
Balanced Load Clustering with Trusted Multipath Relay Routing Protocol for Wireless Sensor Network
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
quality of service
WSN
wireless sensor networks
Wireless Sensor Network
wireless channels
trusted multipath relay routing
trust values
Trust Routing
telecommunication security
Scalability
Routing protocols
relay node
relay networks (telecommunication)
balanced load clustering
pubcrawl
pattern clustering
network simulation software
multipath trust
multipath channels
malicious activity trusted multipath relay routing protocol
Hybrid medium access control (HMAC)
Energy Efficiency
energy consumption
composability
balanced load clustering concepts
biblio
Data Caching Optimization in the Edge Computing Environment
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
mobile users
information retrieval
Integer Problem (IP)
integer programming
integer programming problem
Metrics
mobile computing
mobile data traffic
mobile devices
Energy Efficiency
network delay reduction
Page-Hinckley-Test (PHT)
resilience
Resiliency
Scalability
service provider
Web Caching
pubcrawl
edge servers
edge computing environment
edge computing
delays
data popularity
data optimization
data handling
data caching problem
data caching optimization
data cache problem
data access latency
data access
Cloud Computing
centralized cloud
cache storage
biblio
Energy Efficiency: Digital Signal Processing Interactions Within Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
digital signal processing
signal processing
Renewable Energy Resources
advanced communication infrastructure
bi-directional power flow
complex electrical power system
complex SG challenges
cyber data injection attack
demand response management
Electric Vehicles
digital Signal Processing interactions
distributed generations
DSP interactions
Electric Vehicles infrastructure
SG deployment
Smart Grid challenges
user-friendly system
power grids
telecommunication security
Resiliency
pubcrawl
composability
Metrics
Reliability
privacy
smart power grids
Monitoring
Energy Efficiency
power system security
Smart Grid
power system reliability
signal processing security
power system stability
demand side management
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
biblio
Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
energy efficient tree algorithm
ultralow energy consumption
tree network
telecommunication power management
telecommunication network reliability
resource-constrained devices
Resiliency
pubcrawl
Protocols
network lifetime
multihop routing
multihop BLE networks
IoT
fast growing protocol
expandability
BLE
Energy Efficiency
energy dissipation
energy consumption profile
energy conservation
constrained-resource nodes
composability
complex systems
Bluetooth low energy networks
bluetooth low energy
Bluetooth
BLE static constrained-resources networks
BLE mesh
BLE expandability problem
file
AC Computing Methodology for RF-Powered IoT Devices
Submitted by Emre Salman on Thu, 01/16/2020 - 4:09pm. Contributors:
Emre Salman
Tutu Wan
Yasha Karimi
Yuanfei Huang
Milutin Stanacevic
RF-power
security
Energy Efficiency
Posters
1646318
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »