Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Equations
biblio
Cyber-Physical Systems Modeling Method Based on Modelica
Submitted by grigby1 on Wed, 04/20/2022 - 9:52am
composability
Computational modeling
CPS modeling
CPS Simulation
Data models
Equations
Integrated circuit modeling
Mathematical model
Metrics
Object oriented modeling
pubcrawl
resilience
Resiliency
simulation
Solid modeling
biblio
A Scene-Driven Modeling Reconfigurable Hardware-in-Loop Simulation Environment for the Verification of an Autonomous CPS
Submitted by grigby1 on Wed, 04/20/2022 - 9:50am
hardware-in-loop simulation
Visual object
simulation
Scene-driven
Resiliency
resilience
Reconfigurable
pubcrawl
modeling
Metrics
Mathematical model
Atmospheric modeling
Force
Equations
Data models
cyber-physical system
CPS Simulation
CPS modeling
computer architecture
Computational modeling
composability
biblio
On the Speedup of Recovery in Large-Scale Erasure-Coded Storage Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
networked storage system testbed
XOR-coded storage system
XOR-based erasure codes
XOR operations
vulnerability window
Strips
storage management
single-node failure recovery
single-node failure
replace recovery algorithm
recovery algorithm
parallelized architecture
node failures
Algorithm design and analysis
Mathematical model
large-scale erasure-coded storage systems
hill-climbing technique
Generators
fault tolerant computing
fast recovery solution
Equations
encoding
Distributed databases
data redundancy
availability guarantees
biblio
Diagnosis of multiple faults with highly compacted test responses
Submitted by BrandonB on Wed, 05/06/2015 - 2:31pm
field return analysis
yield ramp-up
Response Compaction
process learning
probability
Multiple Faults
multiple fault probability
multiple fault diagnosis
MISR compactor
Mathematical model
logic diagnosis
linear properties
integrated circuit yield
integrated circuit testing
Accuracy
faulty signatures
fault diagnosis
Equations
embedded test
Diagnosis
defects cluster
compressed test responses
Compaction
compacted test responses
Circuit faults
built-in self-test
built-in self test
biblio
Applied formal methods for hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:38am
integrated circuits
verification techniques
Vectors
Trojan horses
Trojan assurance level
silicon structure
model checking
Mathematical model
malicious hardware modifications
invasive software
chip development process
integrated circuit design
Hardware
formal verification
formal methods
formal hardware Trojan detection
Equations
electronic engineering computing
design phase
data structures
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
biblio
Random Manhattan Indexing
Submitted by BrandonB on Tue, 05/05/2015 - 1:29pm
Mathematical model
Vectors
vector space model
text analysis
sparse Cauchy random projections
RMI
retrieval models
random projection
random Manhattan indexing
natural language text
Computational modeling
Manhattan distance
L1 normed VSM
indexing
Equations
dimensionality reduction technique
dimensionality reduction
data reduction
Context
biblio
Entropy constrained exemplar-based image inpainting
Submitted by BrandonB on Tue, 05/05/2015 - 1:28pm
edge detection
Entropy
entropy constrained exemplar-based image inpainting
Equations
false edge propagation
Image color analysis
Image edge detection
Image reconstruction
image restoration
old painting restoration
photograph restoration
PSNR
structural similarity index
biblio
Synthesizing perception based on analysis of cyber attack environments
Submitted by BrandonB on Tue, 05/05/2015 - 12:40pm
Equations
Vulnerability
vulnerabilities types
toxicity metrics
social aspects of automation
perception synthesis
offensive activities
Measurement
India CTF
InCTF characteristics
Hacking
hackers
Games
framework
adversory behavior
defensive activities
Cyber situational awreness
cyber situational awareness
cyber intensive games
cyber attack intensity
cyber attack environments
cyber attack aggression
Computer hacking
computer games
Computer crime
assets protection
analytic hierarchy process
1
2
3
next ›
last »