Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance evaluation
biblio
Optimizing the Performance of Web Applications in Mobile Cloud Computing
Submitted by grigby1 on Mon, 01/31/2022 - 4:42pm
Wireless communication
Redis caching
mobile cloud computing
Docker Containers
Web Caching
Kubernetes
Mobile handsets
web applications
Bandwidth
Cloud Computing
Scalability
performance evaluation
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Caching Methods Analysis for Improving Distributed Storage Systems Performance
Submitted by grigby1 on Mon, 01/31/2022 - 4:41pm
Web servers
system load
software-defined storage
disk synchronization
disk drives
caching methods
Web Caching
System performance
distributed storage
pubcrawl
Distributed databases
Stability analysis
Virtual machining
Scalability
performance evaluation
Resiliency
resilience
Metrics
biblio
Identifying Metrics for an IoT Performance Estimation Framework
Submitted by aekwall on Mon, 01/31/2022 - 3:32pm
Hardware
Computational modeling
performance evaluation
estimation
pubcrawl
Scalability
Resiliency
Power demand
Memory management
embedded computing
work factor metrics
biblio
IIoT Decentralized System Monitoring for Smart Industry Applications
Submitted by aekwall on Mon, 01/31/2022 - 3:16pm
security
wireless sensor networks
performance evaluation
Protocols
pubcrawl
Metrics
Resiliency
composability
Industries
wireless networks
process control
wireless mesh networks
biblio
Replication Scheme for Structured P2P System Applications in Wireless Mesh Networks (WMNs)
Submitted by aekwall on Mon, 01/31/2022 - 3:14pm
performance evaluation
Scalability
pubcrawl
Metrics
Resiliency
composability
Technological innovation
wireless networks
Costs
maintenance engineering
Popularity of Content
replication
Structured P2P Systems
wireless mesh networks
WMN
biblio
Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set
Submitted by aekwall on Mon, 01/31/2022 - 3:13pm
NP-hard problem
White Box Security
Resiliency
quantum computing
Pur
public-key cryptography
public key cryptography
pubcrawl
performance evaluation
perfect dominating set
white box cryptography
NP-complete
NIST
minus dominating function
encryption
Computers
3-regular graph
Metrics
resilience
composability
biblio
Cybersecurity architecture functional model for cyber risk reduction in IoT based wearable devices
Submitted by grigby1 on Mon, 01/31/2022 - 2:47pm
framework
Pregnancy
Cybersecurity Architecture
cyber risk reduction
wearables security
wearable computers
Wearable devices
Proposals
ISO standards
Scalability
Internet of Things
performance evaluation
Resiliency
resilience
Human behavior
pubcrawl
security
risk management
privacy
biblio
A Three-Party Mutual Authentication Protocol for Wearable IOT Health Monitoring System
Submitted by grigby1 on Mon, 01/31/2022 - 2:46pm
authentication
WIHMS
Three-Party
Internet of Things(IoT)
wearables security
wearable computers
wearable sensor
mutual authentication
Databases
Protocols
Internet of Things
Scalability
performance evaluation
Resiliency
resilience
Human behavior
pubcrawl
security
privacy
biblio
Unified Attribute-Based Encryption Scheme for Industrial Internet of Things
Submitted by aekwall on Tue, 01/25/2022 - 2:53pm
privacy
performance evaluation
attribute-based encryption
Conferences
encryption
Access Control
pubcrawl
Scalability
Human behavior
Internet of Things
Industries
policy-based governance
component
industrial control
Industrial Internet of Things
wireless sensor and actuator network
biblio
Attribute-based Encrypted Search for Multi-owner and Multi-user Model
Submitted by aekwall on Tue, 01/25/2022 - 2:53pm
Computational modeling
Data models
Cloud Computing
data privacy
performance evaluation
attribute-based encryption
Conferences
pubcrawl
Scalability
Human behavior
policy-based governance
Keyword search
multi-owner and multi-user model
searchable encryption
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »