Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
QoS
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
A Software Defined Self-Aware Network: The Cognitive Packet Network
Submitted by BrandonB on Wed, 05/06/2015 - 9:56am
SAN
telecommunication security
telecommunication computing
Storage area networks
software radio
software defined self-aware network
Software Defined Networks
Software
self-aware networks
self-aware computer network
security
SDN
autonomic communications
quality of service
QoS
network security
measurement based goal driven behaviour
energy savings
energy consumption
delays
CPN
cognitive radio
cognitive packet network
biblio
VirtueMAN: A software-defined network architecture for WiFi-based metropolitan applications
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
QoS
wireless LAN
wireless access point
WiFi-based metropolitan application
VirtueMAN
telecommunication traffic
software-defined network architecture
software defined networking
security
SDN-based network architecture
quality of service
authentication
Protocols
Mobile communication
IP-independent forwarding scheme
intranetwork distributed cross-layer traffic control protocol
internet
IEEE 802.11 Standards
Heart beat
distributed network-wide controller
configurable user access control
authorisation
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
« first
‹ previous
1
2
3
4
5