Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bandwidth
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
biblio
Ultimate Secrecy in Wireless Communications
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
attenuation
Information Reuse and Security
ultimate secrecy
secrecy benchmarks
radio frequencies
power 1.0 W to 1000.0 W
frequency reuse
frequency allocation
frequency 1.0 GHz to 1000.0 GHz
communication secrecy
bandwidth saving method
Receivers
Wireless communications
radio transmitters
Propagation losses
Compositionality
Physical layer
Bandwidth
pubcrawl
Resiliency
telecommunication security
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
biblio
Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
participating operators
finite-capacity backhaul links
finite-capacity fronthaul links
fronthaul/backhaul compression strategies
inter-onerator privacy
inter-operator cooperation
inter-tenant privacy constraints
multi-tenant
multitenant C-RAN
multitenant Cloud Radio Access Network system
downlink transmission
privacy constraint
private shared subbands
proprietary radio units
RAN sharing
shared subband
spectrum pooling
user equipments
CPS Privacy
radio access networks
Cloud Computing
data privacy
Human behavior
pubcrawl
privacy
optimization
cyber physical systems
Bandwidth
computer network security
Downlink
Interference
Human Factors
Quantization (signal)
bandwidth allocation
precoding
C-RAN
cloud processor
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
Upper bound
secure exact-repair regenerating codes
secure determinant codes
repair bandwidth
per-node storage
information-theoretic secrecy
Distributed storage system
codes
Manganese
linear codes
coding theory
information theory
security of data
Compositionality
Bandwidth
Metrics
Redundancy
maintenance engineering
storage management
Cryptography
Resiliency
resilience
pubcrawl
security
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
evolutionary design approach
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
TCPIP
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
Bandwidth
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
programming
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
biblio
TendrilStaller: Block Delay Attack in Bitcoin
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
Distributed databases
TendrilStaller
peer-to-peer network
eclipse attack
countermeasure
blockchain state
block propagation protocol
block propagation
block delay attack
Bitcoin protocol
Bitcoin peer-to-peer network
bitcoin security
bitcoin
IP networks
Security analysis
cryptocurrencies
Human behavior
pubcrawl
Peer-to-peer computing
Cryptographic Protocols
Bandwidth
blockchain
Scalability
delays
Protocols
biblio
File I/O Performance Analysis of ZFS BTRFS over iSCSI on a Storage Pool of Flash Drives
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
Linux
BTRFS
compute-intensive systems
file I/O performance
file system
filesystem
flash drives
highly functioning storage systems
iSCSI
block device
NAS storage
open-source filesystem ZFS
storage hardware
storage pool
subvolume
ZFS
BIOS Security
Metrics
Cloud Computing
Scalability
Conferences
Bandwidth
tools
Hardware
storage management
pubcrawl
security
Resiliency
resilience
public domain software
Human Factors
performance evaluation
data management
backup storage
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
biblio
Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
SDN structure
network security
Performance analysis
performance criteria
performance values
Resiliency
Routing protocols
SDN
SDN controller
network performance
SDN technology
Software Defined Network
software defined networking
Software Defined wireless Network
traditional network structure
traditional network used today
wireless network technologies
pubcrawl
network interruption
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET structure
MANET routing protocols
MANET
DoS attack
DoS
controller
computer network security
Compositionality
communication technologies
Bandwidth
Ad Hoc Network Security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »