Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
parallel processing
biblio
A Study of Big Data Security on a Partitional Clustering Algorithm with Perturbation Technique
Submitted by
grigby1
on Mon, 12/28/2020 - 11:40am
Accuracy
Big Data
big data privacy
big data security
Clustering algorithms
Clustering Tme
Conferences
data privacy
Distributed databases
execution time
F-Socre Measure
Hadoop distributed file system
HDFS
Human behavior
Metrics
parallel processing
partitional clustering algorithm
Partitioning algorithms
pattern clustering
PCA
Perturbation methods
perturbation technique
Precision
principal component analysis
privacy preserving
pubcrawl
resilience
Resiliency
Scalability
security
security of data
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by
grigby1
on Wed, 12/02/2020 - 1:01pm
pubcrawl
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
network topology
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
equipment failure
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
massive topology degradation
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
biblio
Guest Editorial: Advances in Parallel Graph Processing: Algorithms, Architectures, and Application Frameworks
Submitted by
grigby1
on Tue, 12/01/2020 - 3:38pm
collaboration
composability
computer architecture
Heuristic algorithms
Human behavior
Human Factors
Internet-scale Computing Security
Metrics
parallel processing
Policy Based Governance
pubcrawl
resilience
Resiliency
Scalability
scientific computing
Special issues and sections
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by
grigby1
on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by
grigby1
on Fri, 10/30/2020 - 11:19am
I-O Systems
i-o systems security
security
Aggregates
Benchmark testing
collective MPI-IO functions
Cray XC40 parallel computers
Haswell processors
high volume noncontiguous requests
input-output programs
Intel KNL
internode communication contention
intranode aggregation
Libraries
message passing
MPI collective I/O
MPI processes
non-contiguous I/O
Parallel I/O
parallel jobs
parallel processing
performance evaluation
Production
Program processors
pubcrawl
request redistribution
Scalability
two-phase I/O
Writing
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by
grigby1
on Fri, 10/30/2020 - 11:15am
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
biblio
Development of Models in Resilient Computing
Submitted by
grigby1
on Tue, 10/06/2020 - 12:40pm
Biological system modeling
checkability
Circuit faults
computational checkability
Computational modeling
computing development
computing evolution factors
Computing Theory
critical applications
elastic computing
elasticity
evolutionary computation
evolutionary development
fuzzy set theory
growth challenge
harsh resistance
irreversible development processes
modelling
parallel processing
Perturbation methods
perturbations
problem solving
pubcrawl
resilience
Resiliency
resilient computing
Resistance
resistive computing
resistivity
resource boundaries
resource niche
reversible and irreversible processes
reversible development processes
smarter elasticity
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by
grigby1
on Fri, 08/28/2020 - 2:34pm
Cryptography
encryption
learning (artificial intelligence)
security
data analysis
Distributed databases
pubcrawl
Resiliency
Access Control
Medical services
health care
Big Data
Data protection
parallel processing
Metrics
electronic health records
resilience
information retrieval
Scalability
big data technologies
data frequency
electronic medical records
Elliptic curves
Hadoop
Hadoop distributed file system
healthcare data
patient data
secure pattern-based data sensitivity framework
sensitive information protection
Sensitivity
special big data analytics methods
big data security in the cloud
biblio
Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
Submitted by
aekwall
on Mon, 08/24/2020 - 12:51pm
security
Cloud Computing
Scalability
Cryptography
encryption
Big Data
data privacy
data encryption
Resiliency
pubcrawl
privacy
Metrics
MapReduce
parallel processing
Proposals
cloud
Human Factors
Hadoop distributed file system
anonymous privacy-preserving scheme
data decryption
MapReduce framework
network operating systems
secure hash algorithm
big data privacy
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by
aekwall
on Mon, 07/27/2020 - 11:14am
Intrusion Detection
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
machine learning
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
performance evaluation
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
cybersecurity intrusion detection
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
1
2
3
4
5
6
next ›
last »