Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Central Processing Unit
biblio
Application of Artificial Intelligence in the National Airspace System – A Primer
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
Industries
US transportation system
UAS operators
transportation performance
scheduling
resiliency solution sets
Resiliency
operation performance parameters
pubcrawl
national airspace system
NAS Operations Theory
NAS Modernization Program
intelligent NAS environment
aerospace control
graphics processing units
FAA
delays
Control Theory and Resiliency
Central Processing Unit
artificial intelligence technology
Artificial Intelligence
air transport operators
air traffic control
AI
aerospace industry
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
scratchpad volatile memory
client workstation
client-server systems
Educational institutions
large number of clients
open source
Open Source solution
operating system
public domain software
client computer
security privacy constraints
University of Texas
user workstation security
virtualized computing
Windows clients
workstation configuration
Workstations
Windows Operating System Security
Servers
security
pubcrawl
Metrics
Resiliency
composability
Streaming media
Protocols
computer network security
data privacy
Linux
applications on-demand
Blades
block level streaming
campus computing
campus setting
Central Processing Unit
biblio
A First Look at Browser-Based Cryptojacking
Submitted by grigby1 on Mon, 11/19/2018 - 12:15pm
Monero
Google
Human behavior
internet
Java
JavaScript code
marketing data processing
Metrics
mining
financial data processing
online front-ends
pubcrawl
resilience
Resiliency
source code (software)
Web sites
website
cryptocurrency
bitcoin
blockchain
botnet
browser mining
browser-based mining
Browsers
Central Processing Unit
Coinhive
advertisement revenue
cryptocurrency Monero
Cryptography
cryptojacking
Data mining
data privacy
electronic money
ethics
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
PeerDirect
graphics processing units
Hardware
hardware tools
hardware-software solution
high-speed networks
Inspection
Mellanox
Napatech
Nvidia
graphics processing unit
pubcrawl
real-time data analysis
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
data communication
Central Processing Unit
computer architecture
computer network
computer network security
computing devices
CPU
CUDA
data analysis
bit rate 80.0 Gbit/s
data transmission networks
data volume real-time processing
deep packet inspection
DMA
DPDK
dpi
firewall
GPUDirect
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
Power demand
wireless LAN
WiFi energy consumption
WiFi broadcast frames
Unicast
trace-driven simulation
telecommunication traffic
telecommunication power management
suspend mode
smartphone energy saving
smart phones
Protocols
AP-assisted broadcast traffic management
Ports (Computers)
packet round-trip time
Nexus One
network capacity
IEEE 802.11 Standard
high power active mode
HIDE system
energy consumption
energy conservation
computer network management
Central Processing Unit
1536086
biblio
Security threat identification using energy points
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
pubcrawl
software engineering
software development lifecycle
Software
security threat identification
security process
security of data
security mechanisms
security breaches
SDLC
Scientific Computing Security
Resiliency
Central Processing Unit
Power demand
power aware computing
Metrics
energy points
energy consumption
energy based denial of service attacks
DoS attack
cosmic Method
Computers
Computer crime
Compositionality
biblio
An efficient diagnosis method to deal with multiple fault-pairs simultaneously using a single circuit model
Submitted by BrandonB on Wed, 05/06/2015 - 2:32pm
Integrated circuit modeling
stuck-at faults
single circuit model
nonequivalent-fault pairs
Multiplexing
multi-pair diagnosis
Logic gates
IWLS'05 benchmark circuit
ISCAS'89 benchmark circuit
automatic test pattern generation
fault pairs diagnosis
Fault injection
fault diagnosis
diagnosis-aware ATPG method
diagnosis pattern generation
Circuit faults
Central Processing Unit
biblio
Smart diagnose procedure for data acquisition systems inside dams
Submitted by BrandonB on Tue, 05/05/2015 - 9:16am
microcontrollers
Voltage measurement
Transducers
testing
Temperature measurement
system
structural engineering computing
smart diagnose procedure
signal processing
short-circuit
Sensor
RS485 communication protocol standard
Protocols
protocol
open-circuit
Central Processing Unit
microcontroller
field buses
Electronics packaging
differential signal
diagnose
Data Transmission
data loggers
data logger
data acquisition system
data acquisition
dams
dam monitoring
dam
communication bus
biblio
Bootstrapping Trust in Commodity Computers
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Humans
Web server
Trusted Platform Module
Trusted Computing
trust
tpm
Secure Boot
privacy
information security
Banking
Hardware
Data Security
computer security
Code Identity
Central Processing Unit
Cellular phones
Bootstrap
« first
‹ previous
1
2