Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Pipelines
biblio
Inner edge detection of PET bottle opening based on the Balloon Snake
Submitted by grigby1 on Mon, 02/08/2021 - 1:03pm
automation
balloon snake
bottles
center location methods
composability
computer vision
Data mining
edge detection
feature extraction
Gray-scale
Grayscale weighting average method
Image edge detection
inner edge detection
machine vision
Metrics
Noise figure
PET bottle opening
Pipelines
Polyethylene
Positron emission tomography
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Raw Cardinality Information Discovery for Big Datasets
Submitted by grigby1 on Fri, 12/11/2020 - 2:00pm
data analysis
Data mining
Monitoring
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
Cloud Computing
Topology
Big Data
metadata
microsoft windows
Measurement
Compositionality
query processing
Hadoop
Pipelines
back-end Big Data systems
Big Data sets
Cardinality
data separation
elastic
elasticsearch
events
grafana
HDFS
Java
logs
Map Reduce
parallel discovery data store infrastructure
raw cardinality information discovery
rocksdb
search queries
Metadata Discovery Problem
biblio
High Performance Data Encryption with AES Implementation on FPGA
Submitted by grigby1 on Tue, 12/01/2020 - 12:46pm
AES
AES encryption algorithm
AES implementation
Big Data
BIGDATA
composability
Cryptography
Data Security
encryption
encryption speed
field programmable gate arrays
FPGA
high performance data encryption
high speed
IDS
intrusion detection system
low latency
Pipelines
pubcrawl
Random access memory
resilience
Resiliency
biblio
Digitized Trust in Human-in-the-Loop Health Research
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
security of data
Trusted Computing
computer architecture
pubcrawl
trustworthiness
collaboration
blockchain technology
data privacy
Pipelines
groupware
Artificial Intelligence
hospitals
Human behavior
human trust
AI systems
collaborative health research environments
data transformations
digitized trust
human researchers
human-in-the-loop health research
biblio
Design and Analysis of SIC: A Provably Timing-Predictable Pipelined Processor Core
Submitted by grigby1 on Mon, 10/05/2020 - 1:00pm
Compositionality
Hardware
microprocessor chips
monotonicity
multi-core
Multicore processing
multicore timing analysis
multiprocessing systems
pipeline processing
Pipelines
pipelining
pubcrawl
real-time systems
SIC
Silicon carbide
standard in-order pipeline design
strictly in-order core
Task Analysis
timing
timing anomalies
timing compositionality
timing predictability
timing-predictable pipelined processor core
WCET
WCET analysis
worst-case execution time
biblio
WASPP: Workflow Automation for Security Policy Procedures
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
Information Reuse and Security
Compositionality
Resiliency
ad hoc solutions
administrative policies
automated event response solutions
Automated Response Actions
automation
composability
generalized event response solutions
human intuition
information security specialists
Monitoring
organisational aspects
Pipelines
pubcrawl
security of data
Security Operations Center
security policy procedures
SoC
suspicious event
Systematics
tools
University networks
WASPP
workflow automation
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
computer network security
IP networks
Scalability
Servers
telecommunication traffic
Kernel
Resiliency
pubcrawl
Metrics
internet
telecommunication network routing
Bandwidth
Pipelines
Switches
telecommunication switching
adaptive filters
adaptive spoofed IP traffic filtering
design adaptive mechanisms
end-to-end routing
HCF system
in-network system
IP popularity
IP-to-Hop-Count mapping table
IP2HC
memory resources
memory usage
NETHCF
programmable switches
Tofino switch
adaptive filtering
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 10:33am
Data models
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
optimisation
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
approximation theory
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
graph segmentation operator
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
biblio
Hardware Trojan Insertion and Detection in Asynchronous Circuits
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
asynchronous circuit
asynchronous circuits
asynchronous hardware Trojan circuits
cyber physical systems
deep learning
delays
Hardware
hardware trojan
hardware Trojan insertion
hardware Trojan threats
Latches
logic design
neural network
Pipelines
pubcrawl
Random Forest
resilience
Resiliency
Routing
supply chain security
synchronous hardware Trojan
Trojan detection methods
trojan horse detection
Trojan horses
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
composability
computer network management
Metrics
network hypervisor
network management
network topology
network virtualization
networking fabrics
Pipelines
pubcrawl
resilience
Resiliency
Routing
software defined networking
software-defined networking
Switches
Virtual machine monitors
virtual machines
virtual network
virtualisation
Virtualization
white box cryptography
white visor
white-box switch
1
2
3
next ›
last »