Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Silicon
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
Uncertainty-Aware Opinion Inference Under Adversarial Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
Robustness
Probabilistic logic
probabilistic model
probabilistic soft logic
probability
Probability density function
PSL
pubcrawl
resilience
Resiliency
possible adversarial attacks
security of data
Silicon
Training
uncertain evidence
uncertainty
uncertainty-aware opinion inference
unknown opinions
white box adversarial attacks
White Box Security
data mining tasks
adversarial collective opinion inference
adversarial evidence
black box adversarial attacks
collective subjective logic
composability
Compositionality
computational complexity
CSL
Data mining
Adv-COI
Data models
Decision Making
highly scalable opinion inference
inference mechanisms
learning (artificial intelligence)
logic-rule based structured data
Metrics
minimax techniques
biblio
Integrated High Power Micro Magnets for MEMS Sensors and Actuators
Submitted by aekwall on Mon, 02/24/2020 - 9:55am
neodymium alloys
integrated high power micromagnets
iron alloys
magnetic MEMS
Magnetic separation
MEMS sensors
Micro magnets
microactuators
micromagnet arrangements
elemental semiconductors
permanent magnetic structures
remanent magnetization
Si-NdFeB
silicon frames
size 25.0 mum to 2000.0 mum
size 8.0 inch
substrate conditioning procedures
Resiliency
cleanroom environment
boron alloys
back-end-of-line compatible integration
Permanent magnets
Micromechanical devices
magnetic resonance imaging
Substrates
Surface treatment
Silicon
Magnetic flux
remanence
Compositionality
Resists
microsensors
pubcrawl
biblio
Symmetric-Key Multi-Factor Biometric Authentication Scheme
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
multi-factor
symmetric-key multifactor biometric authentication scheme
smart-card
Silicon
Servers
security attacks
Resiliency
pubcrawl
ProVerif
ProVeri
private key cryptography
password
multifactor authentication
authentication
Metrics
identity password
Human Factors
Germanium
Cryptography
Cao and Ge's scheme
Burrows-Abadi-Needham (BAN) logic
biometrics (access control)
biometric techniques
biometric
authorisation
biblio
SECO: A Scalable Accuracy Approximate Exponential Function Via Cross-Layer Optimization
Submitted by aekwall on Mon, 01/20/2020 - 10:49am
pubcrawl
exponential operation
exponentiation
fault tolerant control
gradient methods
intrinsic error resilience
neural nets
Nickel
Observers
optimisation
power consumption
exponential function unit
Resiliency
runtime optimization method
Scalability
scalable accuracy approximate exponential function
SECO
signal processing
signal processing applications
Silicon
spiking neuron models
Taylor expansion
Design Time
approximate computing
approximate EFU designs
approximation theory
arithmetic units
convergence
Cross-Layer Approximation
cross-layer design method
Cross-layer optimization
deep neural networks
design space
adaptive exponential integrate-fire neuron model
Dynamic Accuracy Scaling
Eigenvalues and eigenfunctions
energy-accuracy-optimal approximate multiplier
energy-efficient computing
Error analysis
error analysis method
Error Modeling
error-resilient applications
Exponential Function
biblio
Film Bulk Acoustic Wave Resonator for Trace Chemical Warfare Agents Simulants Detection in Micro Chromatography
Submitted by aekwall on Mon, 01/13/2020 - 11:08am
polymer films
Micro Gas chromatography
microchannel flow
microchromatography
microfabricated separation column
microfabrication
microfluidic channel
microsensors
polymer coated film bulk acoustic resonators
Human behavior
pubcrawl
Resiliency
Scalability
Silicon
Surface treatment
thin film sensors
trace chemical warfare agent simulant detection
CWA detection
acoustic resonators
acoustic transducers
bulk acoustic wave devices
Chemical warfare agents
Chemicals
chromatographic analysis
chromatography
Coatings
acoustic coupling
Detectors
FBAR sensor
Film bulk acoustic resonator
Film bulk acoustic resonators
film bulk acoustic wave resonator
Gas chromatography
gas sensors
biblio
Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+
Submitted by grigby1 on Mon, 12/30/2019 - 1:19pm
Mathematical model
TLA+
TLA
Silicon
Scalability
Resiliency
pubcrawl
ProVerif
protocol correctness
pre-meditated correctness
passive attacker
mutual key
communicating parties
liveness property
key agreement protocol verification
ING
GDH
formal verification
exponentiation
divide and conquer key distribution protocol
DC DHKE
Cryptography
Cryptographic Protocols
contributory group key agreement
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by grigby1 on Thu, 12/05/2019 - 9:47am
Physical layer
telecommunication security
Task Analysis
Silicon
security
secure physical layer network coding
secure communication
secrecy analysis
Resiliency
resilience
Receivers
pubcrawl
Predictive Metrics
physical layer security
coding theory
noisy channel
noiseless network
Noise measurement
network coding
Metrics
forward error correction
error correction codes
error correction
cyber physical systems
Cryptography
computation and forward
Compositionality
composability
biblio
A comparative analysis of channel coding for molecular communication
Submitted by aekwall on Mon, 11/25/2019 - 1:07pm
cyclic codes
single nanomachine
Silicon
nanomachines
Nanoelectromechanical systems
molecular communication via diffusion
molecular communication (telecommunication)
molecular communication
MCvD
electromagnetic waves
Dogs
Task Analysis
communication via diffusion
Bose-Chaudhuri-Hocquenghem codes
BCH codes
Reed-Solomon codes
channel coding
Metrics
composability
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »