Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bandwidth
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 9:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
The price of virtualization: Performance isolation in multi-tenants networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:51am
online link utilization feedback mechanism
Virtualization
virtualisation
Substrates
Servers
resource management
resource allocation network
Ports (Computers)
OpenFlow protocol
address space isolation
network virtualization
multitenants datacenter network
Labeling
Internet evolutionary path
internet
flow space isolation
Bandwidth
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Content and network-aware multicast over wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
network coding
wireless networks
wireless mesh networks
video multicast service
video multicast application
Video communication
telecommunication network reliability
Streaming media
redundancy allocation algorithm
Redundancy
Receivers
network-aware multicast communication
network node allocation
Bandwidth
multicast communication
high priority video packet delivery
error prone wireless mesh network
end-to-end performance
delays
data multicast application
data communication
content-aware multicast communication
content and network-aware redundancy allocation
channel status
channel coding
channel bandwidth
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Fri, 05/01/2015 - 8:32am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
biblio
Impact of the sampling theorem interpretations on digitization and reconstruction in SDRs and CRs
Submitted by BrandonB on Fri, 05/01/2015 - 8:11am
NSC design
software radio
software defined radio
signal sampling
signal representation
signal reconstruction
SDR
sampling theorem interpretation
sampling rates
sampling and reconstruction
sampled signal representation
S&R circuits
analogue-digital conversion
NRC design
Interference
Equations
digital signal processing
CR
cognitive radio
Baseband
Barium
Bandwidth
Band-pass filters
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Bandwidth Distributed Denial of Service: Attacks and Defenses
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
denial of service
Servers
Routing protocols
network congestion
legitimate traffic
IP networks
internet
DoS mitigation
DoS attacks
DoS
Bandwidth
DDoS
computer security
computer network security
Computer crime
BW-DDoS defense
BW-DDoS attacks
brute force mechanisms
bandwidth flooding
bandwidth distributed denial-of-service
biblio
On a Mathematical Model for Low-Rate Shrew DDoS
Submitted by BrandonB on Thu, 04/30/2015 - 1:17pm
low-rate shrew DDoS
transport protocols
transport control protocol
Throughput
TCP flows
TCP congestion window
shrew distributed denial-of-service
shrew attack
Packet loss
network environments
Mathematical model
Adaptation models
low-rate distributed denial of service (DDoS) attack
internet
delays
computer network security
Computer crime
bottleneck bandwidth
Bandwidth
attack pattern
attack effect estimation
Attack effect
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »