Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
parallel algorithms
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
Adaptation models
Predictive models
pubcrawl
resilience
Resiliency
optimization
Scalability
Computational modeling
Stochastic processes
Load modeling
optimisation
ensemble model
inference mechanisms
approximation theory
parallel algorithms
uncertainty handling
asynchronous parallel surrogate optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
parallel optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
Concurrency
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrent computing
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
Metrics
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
pubcrawl
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
biblio
Big Provenance Stream Processing for Data Intensive Computations
Submitted by aekwall on Mon, 09/23/2019 - 9:40am
Big Data
data integrity
Resiliency
Human behavior
pubcrawl
composability
Twitter
Metrics
data analysis
Provenance
Big Provenance
big provenance stream processing
Business
data intensive computations
Data Lake
data provenance
data-parallel frameworks
Lakes
on-the-fly provenance processing
Out of order
out-of-order provenance streams
parallel algorithm
parallel algorithms
parallel stream
Partitioning algorithms
provenance events
Sparks
stream processing
tagging
biblio
Parallel Reconstruction of Three Dimensional Magnetohydrodynamic Equilibria in Plasma Confinement Devices
Submitted by grigby1 on Thu, 08/23/2018 - 10:59am
composability
confinement
Cray XC30 supercomputer
cyber-physical systems
data parallelism
Force
formal analysis
fusion data
Magnetohydrodynamics
Mathematical model
Nickel
parallel algorithms
parallel reconstruction
parallel V3FIT
plasma confinement devices
plasma equilibria
plasma magnetohydrodynamics
plasma simulation
plasma toroidal confinement
privacy
pubcrawl
resilience
Resiliency
stellarators
three dimensional magnetohydrodynamic equilibria
three dimensional plasma equilibrium reconstructions
three dimensional plasma reconstruction code
Three-dimensional displays
Tokamak devices
tokamaks
biblio
Scalability of CPU and GPU Solutions of the Prime Elliptic Curve Discrete Logarithm Problem
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
big integer libraries
bit-length system
CPU solutions
cryptographic systems
Cryptography
ECDLP
elliptic curve asymmetric cryptographic systems
elliptic curve discrete logarithm problem
Elliptic curves
gpu
GPU solutions
graphics processing units
Measurement
microprocessor chips
parallel algorithms
Parallel Collision Search based solution
parallel processing
parallelism metrics
Partitioning algorithms
Pollard Rho
pubcrawl
public key cryptography
Scalability
security scalability
sequential algorithms
biblio
Critical Node Detection Problem Solving on GPU and in the Cloud
Submitted by grigby1 on Wed, 03/08/2017 - 1:33pm
Approximation algorithms
Cloud Computing
CNDP
critical node detection problem
data structures
Electronic mail
gpu
graph theory
graph-theoretical problem
graphics processing units
NP-complete problem
optimisation
parallel algorithms
Performance analysis
pubcrawl170112
Runtime
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 10:47am
Algorithm design and analysis
application program interfaces
collision probability
Conferences
Cryptographic Hash Function
Cryptography
data preservation
Digital Forensics
digital signature
digital signatures
file organisation
hash computation
hashing algorithms
information security
MD5
Multicore processing
Multicore Processors
OpenMP
OpenMP API
parallel algorithm
parallel algorithms
probability
Program processors
SHA-1
SHA-1 algorithm
standard hash function
standards
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 10:02am
Algorithm design and analysis
application program interfaces
collision probability
Conferences
Cryptographic Hash Function
Cryptography
data preservation
Digital Forensics
digital signature
digital signatures
file organisation
hash computation
hashing algorithms
information security
MD5
Multicore processing
Multicore Processors
OpenMP
OpenMP API
parallel algorithm
parallel algorithms
probability
Program processors
SHA-1
SHA-1 algorithm
standard hash function
standards
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:33pm
Algorithm design and analysis
attack attribution
Big Data
Big Data security intelligence applications
Clustering algorithms
commodity hardware
computational complexity
Computer crime
Data mining
distributed algorithms
Electronic mail
graph theory
Internet attacks
large security data sets
large security datasets
MapReduce
MR-TRIAGE workflow
multicriteria evaluation techniques
Open wireless architecture
parallel algorithms
pattern clustering
Prototypes
scalable data summarisation
scalable graph clustering algorithms
scalable multicriteria data clustering
security
security companies
security data mining
security events
situational understanding
threat level