Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance analysis
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
Measures of Network Centricity for Edge Deployment of IoT Applications
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
big data security metrics
Buildings
Cloud Computing
Computational modeling
edge computing
Fog computing
IoT
Metrics
Monitoring
Network Centricity
Performance analysis
pubcrawl
Resiliency
Scalability
sensors
Servers
biblio
Critical Node Detection Problem Solving on GPU and in the Cloud
Submitted by grigby1 on Wed, 03/08/2017 - 1:33pm
Approximation algorithms
Cloud Computing
CNDP
critical node detection problem
data structures
Electronic mail
gpu
graph theory
graph-theoretical problem
graphics processing units
NP-complete problem
optimisation
parallel algorithms
Performance analysis
pubcrawl170112
Runtime
biblio
Performance analysis of various wavelet thresholding techniques for despeckiling of sonar images
Submitted by grigby1 on Wed, 03/08/2017 - 1:03pm
image statistic
wavelet thresholding technique
Vishnu shrink
speckle noise
speckle
sonar image despeckling
Sonar image
Quality metrics
pubcrawl170111
Performance analysis
noise reduction
Noise
Neigh shrink
Bayes shrink
image segmentation
Image quality
Image Processing
Image edge detection
image denoising
Entropy
DWT Thresholding techniques
DWT
discrete wavelet transforms
discrete wavelet transform
denoising
biblio
Analysis of the Gradient-Descent Total Least-Squares Adaptive Filtering Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 8:27am
Signal processing algorithms
Vectors
total least-squares
stochastic-gradient adaptive filtering algorithm
Stochastic processes
steady-state mean-square deviation
steady-state analysis
Steady-state
Stability criteria
stability
adaptive filtering
Rayleigh quotient
Performance analysis
mean-square deviation
Least squares approximations
gradient-descent total least-squares algorithm
energy-conservation
Algorithm design and analysis
adaptive filters
biblio
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Submitted by rvmeush on Fri, 09/26/2014 - 12:04pm
Computerized monitoring
dynamic analysis
Filters
Heuristic algorithms
Information analysis
information security
Performance analysis
privacy
Reactive power
Runtime
Symbolic Execution
taint analysis
testing
« first
‹ previous
1
2
3
4
5
6
7
8