Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
scalable verification
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
blockchain based applications
blockchain context
Compositionality
Cryptographic Protocols
decentralized schemes
distributed ledgers
distributed network
Elliptic curve cryptography
elliptic curve multiplications
encrypted data
Homomorphic encryption
Human behavior
mathematical operations
Metrics
Predictive Metrics
pubcrawl
public key cryptography
publicly-verifiable randomness
random beacons
random key generation
random number generation
Resiliency
Scalability
scalable distributed random number generation
scalable verification
verifiable random function
verifiable random functions
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
attacker model
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
default plugin specifications
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
leaked context
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
Scalability
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
biblio
A Hierarchical Approach to Self-Timed Circuit Verification
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
Resiliency
pubcrawl
Computational modeling
Iterative methods
Logic gates
timing
Scalability
Predictive Metrics
Compositionality
Wires
Integrated circuit modeling
hardware description languages
scalable verification
Theorem Proving
ACL2 theorem prover
arbitrated merge
asynchronous circuit modeling
asynchronous circuit verification
combinational circuits
flip-flops
greatest common divisor
greatest common divisor circuit model
hardware description language
hierarchical verification
iterative self-timed circuits
Latches
link joint model
link-joint style
mechanical theorem proving
non deterministic behavior
self-timed circuit verification
timing circuits
biblio
Stealthy Trojan Detection Based on Feature Analysis of Circuit Structure
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
circuit structure
Compositionality
design methods
feature analysis
formal verification
hardware trojan
invasive software
ISCAS benchmarks
malicious HT
Predictive Metrics
pubcrawl
Resiliency
Scalability
scalable verification
scalable verification framework
static detection method
stealthy
stealthy Trojan detection
Stealthy Trojan node
trustiness verification methods
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
Linux Operating System Security
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Formal Specification
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
operating systems
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
scalable verification
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
biblio
Parallel Verification of Software Architecture Design
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
computer architecture
Resiliency
pubcrawl
Production
Software systems
Unified modeling language
Software Architecture
model checking
program verification
Scalability
Predictive Metrics
Compositionality
object-oriented programming
scalable verification
Bottleneck
Circular Dependency
Component-Based Software
component-based software system
large-scale complex software systems
monolithic architecture
multi-threading
multithreaded environment
parallel verification
software architecture design
software architecture verification
biblio
Incremental Abstraction for Diagnosability Verification of Modular Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
Detectors
Resiliency
pubcrawl
Synchronization
feedback
control systems
computational complexity
Complexity theory
automata
Scalability
Production systems
Predictive Metrics
Compositionality
formal verification
verification
fault diagnosis
scalable verification
abstraction
diagnosability
diagnosability verification
Discrete-Event Systems
forbidden loops
incremental abstraction
modular system
Modular systems
nonblocking
parallel lines
polynomial complexity
scalable production system
simple detector automata
uncertain loops
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
Hardware
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Scalability
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
scalable verification
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
SystemC VP
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
biblio
Input Elimination Transformations for Scalable Verification and Trace Reconstruction
Submitted by aekwall on Mon, 03/16/2020 - 9:38am
Resiliency
pubcrawl
computational complexity
Complexity theory
Logic gates
Scalability
Predictive Metrics
Compositionality
Registers
formal verification
model checking
2QBF variant
connectivity verification
Cost accounting
fast- lossy preprocess
input elimination transformations
input reparameterization
merging
netlist transformations
scalable verification
trace reconstruction
verification complexity
verification scalability
biblio
Interactive and Automated Debugging for Big Data Analytics
Submitted by grigby1 on Fri, 06/28/2019 - 9:37am
and data cleaning
automated debugging
Big Data
Compositionality
data provenance
data-intensive scalable computing (DISC)
debugging and testing
fault localization
Metrics
pubcrawl
resilience
Resiliency
Scalability
scalable verification
test minimization
1
2
3
4
next ›
last »