Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
resource allocation
biblio
A Resource Management Model for Real-time Edge System of Multiple Robots
Submitted by
grigby1
on Thu, 12/17/2020 - 12:54pm
authorisation
day industrial productions
edge computing
fault detection
fault location
hierarchical management
Human behavior
Human Factors
industrial robots
isolation model
light-weight edge devices
lightweight edge device
mission-critical resource classification
multi-robot systems
multilevel security data isolation transmission
multiple robot arms
multiple robots
novel resource management model
operating systems (computers)
policy-based governance
pubcrawl
real-time edge system
resilience
Resiliency
resource access control
resource allocation
resource isolation
resource security access control
resource security isolation protection
robot hardware modules
Robot Operating System
robot operating systems
security
security of data
software modules
telecommunication security
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by
aekwall
on Mon, 12/14/2020 - 11:38am
5G
composability
Compositionality
Evolutionary algorithms
Grey Wolf optimizer
Interference
joint user association-power allocation
multi-access systems
multiple base stations
NOMA
NOMA networks
Non-Orthogonal Multiple Access (NOMA)
nonorthogonal multiple access networks
orthogonal clusters
particle swarm optimisation
particle swarm optimization
physical resource block allocation
power allocation
PSO
pubcrawl
Receivers
resource allocation
resource management
Signal to noise ratio
Silicon carbide
Swarm Intelligence
swarm intelligence algorithms
user association
user grouping procedure
weighted sum rate maximization
biblio
CoDRL: Intelligent Packet Routing in SDN Using Convolutional Deep Reinforcement Learning
Submitted by
grigby1
on Wed, 12/02/2020 - 1:03pm
CoDRL model
Convolution layer
Convolutional Deep Reinforcement Learning
convolutional layer
convolutional neural nets
coupled congestion control
current SDN systems
Deep Deterministic Policy Gradient (DDPG)
Deep Deterministic Policy Gradients deep agent
deep reinforcement learning
deep reinforcement learning agent
dynamic packet routing
dynamic traffic engineering
flexible traffic engineering
gradient methods
intelligent packet routing
less efficient resource utilization
mean network delay
network congestion
network data
network performance
Packet loss rate
pubcrawl
q-learning
real-time modification
resilience
Resiliency
resource allocation
routing computation
routing configuration
routing optimization
routing strategies
Scalability
SDN controller
Software Defined Network (SDN)
software defined networking
telecommunication control
telecommunication network routing
telecommunication traffic
biblio
A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks
Submitted by
grigby1
on Wed, 12/02/2020 - 12:53pm
coupled congestion control
end-to-end transparency
fixed network providers
high bandwidth utilization
internet
Load management
load-balancers
low computational complexity
mobile network providers
multiple paths
ORTA
Out of order
packet level load balancing research
packet reordering problem
per-packet load balancing
Proposals
pubcrawl
receiver sides
Receivers
resilience
Resiliency
resource allocation
Robustness
Routing protocols
Scalability
TCP end-points
TCP packet reorderings
TCP sender end-hosts
TCP traffic
telecommunication congestion control
telecommunication traffic
Transparent reordering robust TCP proxy
transport protocols
biblio
Congestion aware traffic grooming in elastic optical and WiMAX network
Submitted by
grigby1
on Wed, 12/02/2020 - 12:52pm
Bandwidth
Base stations
BVT (Bandwith Variable Transponder)
congestion aware traffic
coupled congestion control
Coupled Congestion Control 2019
Elastic Optical Network
internet
internet accessibility
Light trail WiMAX (World Interoperability for Microwave Access Network)
network congestion
network resource consumption
network resource utilization
network topologies
OLT (Optical Line Terminal)
ONU (Optical Network Unit)
Passive Optical Network
Passive optical networks
pubcrawl
Relays
resilience
Resiliency
resource allocation
Routing
Scalability
telecommunication congestion control
telecommunication network routing
telecommunication network topology
telecommunication traffic
Traffic grooming
WDM-PON (Wavelength Division Multiplexed Passive Optical Network)
WiMax
WiMAX network
wireless networks
Wireless-Optical/Optical-Wireless Network
Worldwide Interoperability Microwave Access Network
biblio
Intelligent Resource Scheduling at Scale: A Machine Learning Perspective
Submitted by
grigby1
on Tue, 12/01/2020 - 3:37pm
ad-hoc heuristics
Cloud Computing
cloud-scale
collaboration
composability
data centers
exhibited heterogeneity
Human behavior
Human Factors
intelligent resource scheduling
Internet-scale Computing Security
Internet-scale systems
large-scale resource scheduling
Large-scale systems
learning (artificial intelligence)
machine learning
Metrics
ML
multidimensional resource requirements
nonfunctional constraints
performance-centric node classification
Policy Based Governance
Processor scheduling
pubcrawl
quality of service
resilience
Resiliency
resource allocation
resource management
Resource Scheduling
Scalability
scheduling
server characteristics
Servers
straggler
straggler mitigation
Task Analysis
workload
biblio
Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse?
Submitted by
grigby1
on Tue, 12/01/2020 - 3:36pm
bandwidth cost
bidding curve
Cloud Computing
cloud service provider
collaboration
composability
computer centres
convex programming
cost reduction
cost-saving performance
CSP
data centers
datacenters
deregulated electricity market
Electricity supply industry
Geographic load balancing
geographical load balancing
GLB
Human behavior
Human Factors
IEEE transactions
Internet-scale Computing Security
Internet-scale service
joint bidding
joint electricity procurement
Linear programming
Load management
market prices
Metrics
multiple geo
Policy Based Governance
price uncertainty
Pricing
Procurement
pubcrawl
real-time systems
realistic setting
resilience
Resiliency
resource allocation
Scalability
standards
strategic bidding
total electricity
uncertainty
wholesale markets
workloads
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by
grigby1
on Tue, 11/17/2020 - 1:49pm
5G mobile communication
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
delays
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
Fog Radio Access Network
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
load balancing technology
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by
grigby1
on Tue, 11/17/2020 - 1:41pm
security of data
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
Virtual machining
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
operating systems
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
para-virtualization technique
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by
grigby1
on Fri, 09/04/2020 - 2:16pm
Scalability
invasive software
resource allocation
resource management
machine learning
pubcrawl
Metrics
Resiliency
resilience
Training
learning (artificial intelligence)
Neural networks
neural nets
malware
Human Factors
neural network
control flow graphs
decoy process
decoy processes
defensive deception
flow graphs
Heating systems
heatmap training mechanism
Probes
resource utilization consistency
BIOS Security
1
2
3
4
5
6
7
8
next ›
last »