Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power aware computing
biblio
Performance Modeling and Assessment of Unified Video Surveillance System Based on Ubiquitous SG-eIoT
Submitted by aekwall on Mon, 04/13/2020 - 9:27am
Fog computing
video terminals
unified video surveillance system
ubiquitous SG-eIoT
service latency parameters
service latency
Performance modeling
network load
electric Internet of Things(eIoT)
edge eIoT agent
video surveillance
Streaming media
Cloud Computing
Logic gates
Cameras
video signal processing
edge computing
delays
Metrics
pubcrawl
Human behavior
Resiliency
power aware computing
Internet of Things
biblio
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
message authentication
Training data
Tamper resistance
side-channel information
Side-channel attack
security of IoT
Scalability
pubcrawl
Power measurement
Power demand
power consumption
power aware computing
Physical Unclonable Function
modeling attack
Metrics
authentication
lightweight PUF
lightweight physical unclonable function
Internet of Things
internet
Integrated circuit modeling
Industrial Internet of Things
Human Factors
Human behavior
Hardware Security
field programmable gate arrays
external Internet
Cryptography
countermeasure method
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
biblio
Improving Energy Efficiency of Hadoop Clusters using Approximate Computing
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
Apache Hadoop
multicore computing security
Thermal-efficiency
thermal-aware data placement
thermal-aware approximate computing
tHadoop2
Pi MapReduce application
Pi
multicore computing platforms
Hadoop clusters
energy-efficient solutions
Energy-efficiency
approximate computing
Scalability
data handling
Hadoop
multiprocessing systems
parallel processing
pattern clustering
MapReduce
Metrics
energy conservation
pubcrawl
Resiliency
power aware computing
biblio
Run-time Detection and Mitigation of Power-Noise Viruses
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
data corruptions
multicore computing security
voltage noise data
voltage emergencies
Viruses (medical)
Threshold voltage
system crashes
run-time system
run-time estimation
resonance detection
power-noise virus mitigation
power-noise virus detection
power-noise attacks
power viruses
operating frequency
multicore microprocessors
security
Arm multicore processor
Resonant frequency
multiprocessing systems
Microprocessors
Benchmark testing
computer viruses
system-on-chip
microcontrollers
regression analysis
Metrics
pubcrawl
Resiliency
power aware computing
Scalability
biblio
A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Submitted by aekwall on Mon, 12/30/2019 - 11:15am
UBP
privacy
pubcrawl
Resiliency
Scalability
secure vehicular platform
security mechanism
Traffic congestion
traffic engineering computing
Prediction algorithms
user behavior profiling
VANET
VCC
vehicle computing service requests
vehicle storing service requests
vehicular cloud computing
vehicular cloud servers
Vehicular fog computing
edge computing
security
Cloud Computing
computer architecture
data privacy
Data processing
data servers
Decoy technology
distributed processing
Fog computing
encryption
energy consumption reduction
Fog Computing and Security
fog computing architecture
fog computing system
Monitoring
power aware computing
biblio
A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
particle swarm optimization
Trojan horses
trojan horse detection
Side Channel Analysis technology
RTL circuits
pubcrawl
PSO NN method
Principal Component Analysis algorithm
principal component analysis
Power demand
power consumption data
power consumption
power aware computing
Artificial Neural Networks
particle swarm optimisation
neural network Trojan detection
neural nets
malicious modifications
invasive software
intelligent neural networks algorithm
Integrated circuit modeling
HSPICE power consumption simulation
hardware Trojan detection
Hardware
Cryptography
biblio
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
integrity checking program generation
composability
pubcrawl
Human behavior
Resiliency
timing information
Raspberry Pi
POWERALERT
Power measurement
power aware computing
power attestation
network round-trip time
Nash equilibrium strategy
Kernel
attestation
integrity checking
game-theoretic strategy
game theory
Frequency measurement
Current measurement
code segment
checking code
attestation systems
Adaptation models
Protocols
security
data integrity
biblio
Minimum energy quantized neural networks
Submitted by grigby1 on Mon, 06/11/2018 - 2:24pm
iso-accuracy depending
automated minimum-energy optimization
BinaryNets
complex arithmetic
fixed point arithmetic
fundamental trade-off
generic hardware platform
higher precision operators
int4 implementations
int8 networks
arbitrary fixed point precision
low precision weights
Minimum Energy
minimum energy QNN
QNN training
Quantized Neural Network
quantized neural networks
wider network architectures
network on chip security
resilience
Resiliency
Scalability
Hardware
neural nets
energy consumption
telecommunication security
Neural networks
Training
deep learning
pubcrawl
Memory management
Metrics
Random access memory
system-on-chip
energy conservation
power aware computing
Mobile communication
approximate computing
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
probability parameters
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
domain specific architectural language
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
probability
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
formal verification
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
« first
‹ previous
1
2
3
4
next ›
last »