Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Silicon
biblio
Hybrid silicon CMOS-carbon nanotube physically unclonable functions
Submitted by grigby1 on Mon, 06/11/2018 - 2:48pm
nanotube array
Transistors
Silicon
security tokens
security
Resiliency
resilience
PUF circuit
PUF
pubcrawl
physically unclonable functions
Physically unclonable
nanotube transistors
analog silicon circuit
Microelectronics Security
Metrics
Metals
hybrid silicon CMOS-carbon nanotube
electronic devices
Contact resistance
Computational modeling
composability
CMOS analogue integrated circuits
CMOS
carbon nanotubes
carbon nanotube
biblio
A K-nearest neighbor locally search regression algorithm for short-term traffic flow forecasting
Submitted by grigby1 on Mon, 06/11/2018 - 2:44pm
nearest neighbour methods
traffic flow vector
traffic flow data
traffic control
Silicon
short-term traffic flow forecasting
search problems
root mean squared error
road traffic
regression analysis
Real-Time Traffic Control
real-time systems
pubcrawl
Predictive models
Prediction algorithms
optimal nearest neighbors
Baoanbei intersection
nearest neighbor search
Metrics
Measurement
mean square error methods
locally search strategy
local similarity
k-NN model
k-nearest neighbor locally weighted regression algorithm
K-nearest neighbor locally search regression algorithm
k-nearest neighbor
k-LSR algorithm
Indexes
forecasting theory
forecasting
data-driven method
biblio
Privacy-Preserving and Multi-Dimensional Range Query in Two-Tiered Wireless Sensor Networks
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
multidimensional range query protocol
wireless sensor networks
two-tiered wireless sensor networks
Silicon
sensor electronic devices
Resiliency
resilience
query processing
pubcrawl
Protocols
probability attacks
privacy-preserving range query
PERQ
network accountability
Biomedical monitoring
Monitoring
modular arithmetic range query mechanism
Metrics
Heart rate
generalized distance-based range query mechanism
differential attacks
data privacy
data integrity
cyclic modular verification scheme
Cryptographic Protocols
composability
Collusion Attacks
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 2:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
biblio
SRAM voltage scaling for energy-efficient convolutional neural networks
Submitted by grigby1 on Thu, 06/07/2018 - 2:06pm
Si
memory power intensive
memory size 8 KByte
Micromechanical devices
neural nets
Neural Network Resilience
pubcrawl
Random access memory
resilience
Resiliency
low-power embedded system
Silicon
silicon-on-insulator
size 28 nm
SRAM chips
SRAM voltage scaling
Training
UTBB FD-SOI CMOS
voltage 310 mV
energy-efficient convolutional neural network
bit error injection
Bit error rate
CMOS memory circuits
ConvNet training
convolutional neural networks
deep learning
electronic engineering computing
elemental semiconductors
energy conservation
approximate SRAM
energy-quality tradeoff
error resiliency
floating-point classification accuracy
Hardware
Hardware Implementation
IoE platform
learning (artificial intelligence)
low-power electronics
biblio
On optimal diversity in network-coding-based routing in wireless networks
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
packet transmissions
wireless sensor networks
wireless networks
Topology
single path routing protocol
Silicon
shortest path routing
Routing protocols
Routing
CTP
optimal diversity
opportunistic routing protocols
ONCR
network-coding-based routing
network coding
greedy algorithms
greedy algorithm
1536086
biblio
On achieving SDN controller diversity for improved network security using coloring algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 9:51am
Scalability
telecommunication network management
telecommunication control
Susceptible-Infectious-Susceptible epidemic model
Surfaces
software defined networking
Software algorithms
SIS
Silicon
security performance
security
SDN security
SDN paradigm rings flexibility
SDN controller diversity
SDN control plane
scalability issue
Color
Resiliency
pubcrawl
network programmability
network management
network design
neighboring controllers
multicontrollers deployment
malicious controller
improved network security
diversity
distributed controllers system
distributed control
computer network security
Communication networks
coloring algorithm
biblio
Parameter selection for swarm intelligence algorithms \#x2014; Case study on parallel implementation of FSS
Submitted by K_Hooper on Wed, 05/02/2018 - 9:37am
number-of-iterations
swarm intelligence algorithms
Swarm Intelligence
Sociology
Silicon
SI algorithms
search problems
pubcrawl
problem complexity
population size
parameter selection
parallel implementation
optimisation
complex optimization problems
Iterative methods
FSs
Frequency selective surfaces
Fish School Search
Fish
execution time
Correlation
computational intelligence
computational complexity
composability
Complexity theory
biblio
CVSS-Based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
Silicon
SIEM systems
SIEM
Security Metrics
security information and event management system
security events
risk management
risk assessment
Resiliency
resilience
Reliability
pubcrawl
Prototypes
network characteristics
attack graphs
Measurement
integrated security metrics
cyber situational awareness
CVSS-based probabilistic risk assessment
CVSS
countermeasure selection
computer network security
computer network risk assessment
composability
Common Vulnerability Scoring System
authentication
attacker characteristics
Attack Modeling
biblio
A factored evolutionary optimization approach to Bayesian abductive inference for multiple-fault diagnosis
Submitted by grigby1 on Thu, 02/15/2018 - 10:46am
human factor
static fault isolation
Silicon
Resiliency
resilience
pubcrawl
Noise measurement
multiple-fault diagnosis problem
multiple fault diagnosis
Metrics
Logic gates
inference mechanisms
Human Factors
Bayes methods
Human behavior
FEA
fault trees
fault diagnosis
fault detection
factored evolutionary optimization approach
factored evolutionary algorithm
evolutionary computation
diagnostic Bayesian networks
Complexity theory
belief networks
Bayesian abductive inference
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »