Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
resource management
biblio
Secure Resource Allocation for Polarization-Based Non-Linear Energy Harvesting Over 5G Cooperative Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
telecommunication security
Radio frequency
Resiliency
pubcrawl
resource management
resource allocation
5G mobile communication
radio networks
cooperative communication
Numerical models
Integrated circuit modeling
radio spectrum management
energy harvesting
inductive power transmission
cognitive radio
cooperative cognitive radio networks
dual-polarized antennas
efficient resource allocation scheme
EH circuits
energy harvesting based 5G cooperative cognitive radio networks
Green wireless networks and communications
non-linear energy harvesting
nonlinear EH model
orthogonally dual-polarized antennas
polarization-based nonlinear energy harvesting
primary user
secure resource allocation
size-limited secondary users
transmitting antennas
Cognitive Radio Security
biblio
Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
resource management
Communication system security
wireless devices
radio networks
sensors
signal detection
wireless channels
wireless networks
Energy Efficiency
wireless nodes
radio spectrum management
Reinforcement learning
wireless network
cognitive radio
cognitive radio networks
spectrum sensing
Channel allocation
Dynamic Spectrum Allocation
spectrum access
spectrum resources
spectrum sensing techniques
wireless spectrum
Cognitive Radio Security
biblio
Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation
Submitted by aekwall on Mon, 03/01/2021 - 5:03pm
Scalability
machine learning
Resiliency
pubcrawl
deep learning
resource management
Wireless communication
Iterative methods
optimization
neural nets
telecommunication computing
Artificial Neural Networks
wireless
approximation theory
fading channels
xai
Transforms
OFDM modulation
Search Space
approximate symbolic explanation
channel gain
direct high-dimensional mapping
iterative WF threshold search process
Meijer G-function
neural network enabled water-filling power allocation
NN power allocation solution
OFDM sub-channels
slow iterative search
symbolic mapping
biblio
Providing Confidentiality in Optical Networks: Metaheuristic Techniques for the Joint Network Coding-Routing and Spectrum Allocation Problem
Submitted by grigby1 on Tue, 02/23/2021 - 2:34pm
security
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
public key cryptography
composability
telecommunication network routing
resource management
genetic algorithms
simulated annealing
network coding
genetic algorithm
Sociology
Statistics
Biological cells
spectrum utilization
elastic optical networks
joint network coding-routing
metaheuristic techniques
modified simulated annealing
NC-based RSA algorithms
network coding-based routing and spectrum allocation problem
novel metaheuristic algorithms
real-world network scenarios
routing and spectrum allocation
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
learning (artificial intelligence)
pubcrawl
Metrics
resilience
Resiliency
Throughput
optimization
5G mobile communication
radio access networks
composability
telecommunication computing
resource allocation
Dynamic scheduling
Radio Access Network
resource management
Reinforcement learning
Bit error rate
5G radio access network slicing
5G security
computational constraints
Dynamic Resource Allocation
dynamic resource optimization
frequency-time blocks
network optimization
network slice requests
network slicing
Q-learning solution
dynamic networks
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
sensors
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
iiot
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
IoT-IIoT networks
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
Resiliency
pubcrawl
composability
sybil attacks
resource management
Wireless communication
Metrics
Interference
radio networks
Resists
electronic commerce
DSA
Cost accounting
dynamic spectrum access
2D truthfulness
bid-independent sorting method
cost-efficient SUs
onlIne spectrum allocation
online spectrum auction
primary user Sybil-proof aUctioN mechAnisM
sequential matching approach
single secondary user
spectrum allocation efficiency
spectrum shortage problem
Sybil-proof spectrum auction mechanisms
Truthful user Sybil-proof aUctioN mechAnisM
Tsunami
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
computer network security
network security
Resiliency
pubcrawl
composability
detection
Sybil attack
graph theory
resource management
Metrics
sybil attacks
Web sites
Relays
integer programming
Communication Systems
Approximation algorithms
Bridges
detection method
Linear programming
Bipartite graph
anonymous communication system
computer program
Distribution strategy
enumeration attacks
Integer Linear Program
minimum malicious user
resource distribution
resource distribution process
suspicious malicious users
tor anonymous communication system
tor resource distribution
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
5G
composability
Compositionality
Evolutionary algorithms
Grey Wolf optimizer
Interference
joint user association-power allocation
multi-access systems
multiple base stations
NOMA
NOMA networks
Non-Orthogonal Multiple Access (NOMA)
nonorthogonal multiple access networks
orthogonal clusters
particle swarm optimisation
particle swarm optimization
physical resource block allocation
power allocation
PSO
pubcrawl
Receivers
resource allocation
resource management
Signal to noise ratio
Silicon carbide
Swarm Intelligence
swarm intelligence algorithms
user association
user grouping procedure
weighted sum rate maximization
biblio
Intelligent Resource Scheduling at Scale: A Machine Learning Perspective
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
ad-hoc heuristics
Cloud Computing
cloud-scale
collaboration
composability
data centers
exhibited heterogeneity
Human behavior
Human Factors
intelligent resource scheduling
Internet-scale Computing Security
Internet-scale systems
large-scale resource scheduling
Large-scale systems
learning (artificial intelligence)
machine learning
Metrics
ML
multidimensional resource requirements
nonfunctional constraints
performance-centric node classification
Policy Based Governance
Processor scheduling
pubcrawl
quality of service
resilience
Resiliency
resource allocation
resource management
Resource Scheduling
Scalability
scheduling
server characteristics
Servers
straggler
straggler mitigation
Task Analysis
workload
1
2
3
4
5
6
7
next ›
last »