Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user interfaces
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
biblio
SIMON Lightweight Encryption Benchmarking on Wireless Aquascape Preservation
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
remote Android smartphone
Arduino controller
autonomous aquascape preservation system
DS18B20 sensor
engineering technique
Human-computer interaction
instance aquascaping
leisure activities
pervasive computing
aquascape temperature
SIMON lightweight cryptography
SIMON lightweight encryption
SIMON lightweight encryption benchmarking
unauthorized party
wireless aquascape preservation system
wireless communication channel
android encryption
security of data
aquascape
Android graphical user interface application
Metrics
graphical user interfaces
communication technology
user experience
user interfaces
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
telecommunication security
Cryptography
Scalability
biblio
Robust and Responsive Acoustic Pairing of Devices Using Decorrelating Time-Frequency Modelling
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
Acoustic Fingerprinting
Acoustic Fingerprints
voice-related information
voice user interfaces
Voice User Interface
unified voice user interface
time-frequency representation
natural interaction
decorrelation
decorrelating time-frequency modelling
DCT
audio quality
audio fingerprint
acoustic pairing
authorisation
access management rules
Acoustic signal processing
Time-frequency Analysis
acoustic signal
audio signal processing
user interfaces
user privacy
Robustness
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Asynchronous Rendering of Texts in iOS Applications
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
operating systems
iOS Security
user interfaces
text information rendering
rendering (computer graphics)
rendering
iOS operating system
iOS applications
asynchronous text rendering
asynchronous methods
iOS (operating system)
mobile computing
Message systems
Instruction sets
Compositionality
Human Factors
Random access memory
Mobile Applications
text analysis
Metrics
pubcrawl
Resiliency
biblio
User-Aware Shared Perception for Embodied Agents
Submitted by grigby1 on Thu, 07/16/2020 - 12:32pm
Metrics
virtual space
virtual reality
user-aware shared perception
user interfaces
software agents
shared perception
Scalability
pubcrawl
physical space
multi modal interfaces
3D virtual world
Human behavior
human agent interaction
facial expressions
Embodied Conversational Agents
embodied avatars
embodied agents
DIANA
conversational agents
Avatars
biblio
A Large Curved Display System in Virtual Reality for Immersive Data Interaction
Submitted by grigby1 on Thu, 06/04/2020 - 11:49am
immersive systems
VR-based educational game
visualization
virtual reality environment
virtual reality
virtual image wall
virtual environments
user interfaces
Two dimensional displays
Three-dimensional displays
serious games (computing)
Resiliency
resilience
pubcrawl
privacy
perceived immersion
3D user interface
immersive data interaction
Human-computer interaction
Human Factors
Games
Display systems
display component
Data visualization
cyber physical systems
curved display system
curved display
computer displays
computer aided instruction
composability
Cameras
biblio
Towards natural interaction in immersive reality with a cyber-glove
Submitted by grigby1 on Thu, 06/04/2020 - 11:48am
Task Analysis
mixed reality interaction tasks
mixed reality systems
natural interaction
privacy
pubcrawl
resilience
Resiliency
sensors
standard VR hand controller devices
immersive systems
Three-dimensional displays
tracking
user interfaces
virtual door
virtual environment
virtual reality
virtual reality interaction tasks
virtual reality systems
wrist
gesture recognition
augmented reality
biomechanics
composability
cyber physical systems
cyber-glove based interactions
cyber-glove system
data gloves
embodiment
finger movements
3D manipulation task
glove-based systems
hand orientation
Heart rate
high immersive experiences
HTC Vive controller
human computer interaction
Human Factors
immersive reality
immersive sensation
biblio
K-Nearest Neighbors and Grid Search CV Based Real Time Fault Monitoring System for Industries
Submitted by grigby1 on Fri, 05/22/2020 - 2:23pm
model-based techniques
flask
graphical user interface (GUI)
grid search cross validation
grid search CV
induction machine
Induction machines
K-Nearest Neighbors (KNN)
KNN
knowledge-based approach
Feature Selection
Python
python web framework
real time fault monitoring
signature extraction-based approach
Statistics
time fault monitoring system
user friendly interface
nearest neighbor search
nearest neighbour methods
pubcrawl
Circuit faults
Data models
internet
Industries
production engineering computing
Classification algorithms
Metrics
Measurement
grid search
Prediction algorithms
k-nearest neighbors
user interfaces
condition monitoring (CM)
cross validation (CV)
fault detection
fault detection techniques
fault diagnosis
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
Cookie Based Protocol to Defend Malicious Browser Extensions
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
HTTP cookie
browser extension
Chrome store
cookie management
customizing web browsers
defend malicious browser extensions
dynamic cookies
dynamic encrypted cookies
features increase
authentication protocol
offline extension installations
privileges browser extensions
replay attack
session hijacking
software module
static cookies
user interface modifications
Web Browser Security
Protocols
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
authentication
internet
Cryptography
composability
online front-ends
Metrics
Browsers
Compositionality
password
user interfaces
« first
‹ previous
1
2
3
4
5
6
next ›
last »