Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data structures
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
GPU-based approach
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
parallel algorithms
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
data structures
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
feature extraction
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
biblio
GEMˆ2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
outsourcing
unique gas cost model
trusted storage
range query
meta-data
immutability property
hybrid-storage blockchain
hybrid storage architecture
GEM2-tree
gas-efficient structure
authenticated range queries
Authenticated query
authenticated data structure
ADS maintenance cost
smart contract
Outsourced Database Integrity
Cryptography
storage management
blockchain technology
Indexes
smart contracts
Distributed databases
data structures
query processing
consensus protocol
blockchain
Metrics
composability
pubcrawl
Resiliency
Data models
data integrity
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
biblio
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
cyber threat intelligence article
artificial intelligence security
Unstructured Data
unstructured cyber threat intelligence data
threat intelligence
Structured Data
semantics extraction
latest useful threat intelligence
latest threat intelligence
JAPE feature
GATE framework
cyber threat intelligence unstructured data
security of data
cyber security territory
cyber security professionals
CVE entities
automatic tagging
Ontology
information retrieval
ontologies (artificial intelligence)
data structures
cyber security
pubcrawl
biblio
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
data structures
Servers
security threats
Scalability
pubcrawl
policy-based governance
NDN environment
NDN
named data networking
information-centric networking
information caching
ICN project
hash table data structure
hash table
fine-grained access control
encryption
Access Control
data segmentation
data privacy
data management
Cryptography
CP-ABE access control scheme
CP-ABE
content publishers
content distribution
computer network security
collaboration
CipherText Policy Attribute Based Encryption
CHTDS
automation
authorisation
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
arrays
user privacy in the cloud
text searching
string matching problem
simple data structure
semitrusted cloud providers
privacy-preserving matching algorithm
privacy preserving pattern
index arrays
encrypted index
distributed cloud-based datasets
distributed cloud-based data storage
privacy preserving
confidentiality
Cloud Computing
storage management
Scalability
Indexes
data structures
pattern matching
Distributed databases
Metrics
pubcrawl
Resiliency
data privacy
user data
Cryptography
biblio
Decision Fusion Based on Joint Low Rank and Sparse Component for Hyperspectral Image Classification
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
Hyperspectral imaging
SVM classifier
Support vector machines
Sparse matrices
Sparse and low rank matrix decomposition
rank component
pubcrawl
principal component analysis
pattern classification
Metrics
Matrix decomposition
low rank matrix decomposition
image fusion
Compositionality
hyperspectral imagery
hyperspectral image classification
hyperspectral data
feature extraction
discriminative information
DFJLRS
decomposition
decision fusion based on joint low rank and sparse component method
decision fusion
data structures
cyber physical systems
biblio
Fast Detection and Mitigation to DDoS Web Attack Based on Access Frequency
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
internet
Web servers
Web request
web applications
Time-frequency Analysis
storage space
security of data
Resiliency
realtime attack response
pubcrawl
Protocols
Processing time
Metrics
IP networks
access frequency
immediate defense mechanism
Human behavior
hacker botnets
DDoS Web attack
DDoS attack mitigation
DDoS Detection and Mitigation
DDoS Attacks
DDoS attack detection
data structures
Computer crime
composability
botnet
attack packets
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Kernel
Scalability
Resiliency
resilience
Random access memory
pubcrawl
PDB file
microsoft windows
Metrics
Memory Forensics
Application's data
information forensics
Human Factors
Human behavior
Forensics
digital evidence
Debugging information
debugging
data structures
Data mining
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »