Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data structures
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
Bloom filter
Cloud Computing
Cryptography
data structures
Encrypted Cloud Database
encryption
frequency distribution
Fuzzy Cryptography
Fuzzy Query
fuzzy query scheme
fuzzy set theory
fuzzy string matching scheme
Indexes
Metrics
noise vector
pubcrawl
query processing
Resiliency
Resistance
S-BF
Scalability
secure fuzzy query
statistical attack
string matching
vector index
biblio
Additive and Subtractive Cuckoo Filters
Submitted by aekwall on Mon, 01/11/2021 - 12:32pm
Scalability
pubcrawl
standards
query processing
data structures
privacy
Indexes
quality of service
Fingerprint recognition
Throughput
Additives
Table lookup
addition operations
additive cuckoo filter
ASCF
Bloom filters
bucket indexes
cuckoo filters
cuckoo hashing
exclusive-OR operation
high-speed lookups
set membership queries
space cost
space efficiency
space inflation
space-efficient data structures
subtraction operations
subtractive cuckoo filter
data deletion
biblio
Improving Efficiency of Pseudonym Revocation in VANET Using Cuckoo Filter
Submitted by aekwall on Mon, 01/11/2021 - 12:31pm
Compression
CRLs
data deletion
Data models
data structures
filtering algorithms
Fingerprint recognition
Information filters
privacy
pseudonyms
pubcrawl
Scalability
standards
VANETs
vehicular ad hoc networks
biblio
Dynamic Graphs on the GPU
Submitted by aekwall on Mon, 01/11/2021 - 12:31pm
Scalability
Memory management
pubcrawl
graph theory
data structures
privacy
maintenance engineering
Sparse matrices
arrays
Gold
graphics processing units
hash table
adjacency lists
deletion speedups
dynamic
dynamic graph data structures
dynamic updates
gpu
graph
data deletion
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
Big Data
big data privacy
Big data privacy top
big data security
Cloud Computing
cloud environment
cloud server
data privacy
Data Security
data security challenges
data storage
data structures
Human behavior
internet
Metrics
Organizations
pubcrawl
resilience
Resiliency
Scalability
security of data
security threats
semistructured data
sensitive data storage
Servers
storage management
Structured Data
Unstructured Data
biblio
Exploring Metadata Search Essentials for Scientific Data Management
Submitted by grigby1 on Fri, 12/11/2020 - 1:59pm
astronomy computing
Complexity theory
Compositionality
data management
data structure
data structures
HDF5
indexing
indexing data structure
meta data
metadata
metadata attributes
metadata characteristics
Metadata Discovery Problem
Metadata Indexing
metadata indexing methodologies
metadata queries
Metadata Search
pubcrawl
query processing
real-world astronomy observation dataset
resilience
Resiliency
Scalability
scientific data management
scientific file formats
search problems
tree data structures
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
biblio
GEMˆ2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain
Submitted by aekwall on Mon, 11/16/2020 - 12:11pm
Cryptography
data integrity
Data models
Resiliency
pubcrawl
composability
Metrics
blockchain
consensus protocol
query processing
data structures
Distributed databases
smart contracts
Indexes
blockchain technology
storage management
outsourcing
Outsourced Database Integrity
smart contract
ADS maintenance cost
authenticated data structure
Authenticated query
authenticated range queries
gas-efficient structure
GEM2-tree
hybrid storage architecture
hybrid-storage blockchain
immutability property
meta-data
range query
trusted storage
unique gas cost model
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
Cloud Computing
Scalability
Cryptography
encrypted data
encryption
data privacy
searchable encryption
Resiliency
Human behavior
pubcrawl
query processing
data structures
fuzzy set theory
Indexes
cloud services
user privacy
Dictionaries
file organisation
database indexing
fuzzy search
keyword misspellings
search patterns
search services
secure fuzzy search schemes
substring matching
wildcard
wildcard-based multikeyword fuzzy search scheme
WMFS scheme
Computing Theory and Privacy
biblio
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
security of data
pubcrawl
cyber security
data structures
ontologies (artificial intelligence)
information retrieval
Ontology
automatic tagging
CVE entities
cyber security professionals
cyber security territory
cyber threat intelligence article
cyber threat intelligence unstructured data
GATE framework
JAPE feature
latest threat intelligence
latest useful threat intelligence
semantics extraction
Structured Data
threat intelligence
unstructured cyber threat intelligence data
Unstructured Data
artificial intelligence security
1
2
3
4
5
6
7
next ›
last »