Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
matrix algebra
biblio
An Empirical Study of Web Software Trustworthiness Measurement
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
internet
Web software trustworthiness measurement
web software
trustworthiness
Trusted Computing
security of data
pubcrawl
online accounting software
matrix algebra
Manganese
ISO/IEC 9126
ISO standards
automation
IEC standards
fuzzy set theory
fuzzy judgment matrix
factor analysis
evidence theory
evidence synthesis
Entropy
empirical analysis
confidence identification
composability
biblio
Analysis on Convergence of Stochastic Processes in Cloud Computing Models
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
cloud computing models
Stochastic computing
Stochastic Process
stochastic matrix
stochastic matrices
resource allocations
Rate of Convergence
matrix-defined systems
matrix algebra
Markov processes
complicated model
common stochastic processes
cloud computing systems
Cloud Computing
arbitrary stochastic processes
Eigenvalues and eigenfunctions
Biological system modeling
Steady-state
convergence
Stochastic processes
resource allocation
Scalability
Resiliency
pubcrawl
Computational modeling
security
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
Characterizing and Improving Stability in Neural Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
recurrent neural nets
visible flickering
Videos
video signal processing
temporally consistent stylized videos
temporal consistency loss
stylized images
stability improvement
Stability analysis
solution set
Scalability
Resiliency
resilience
Gram matrix representing style
recurrent convolutional network
real-time video style transfer
real-time systems
real-time methods
pubcrawl
optimization
Optical imaging
Optical computing
neural style transfer
Metrics
matrix algebra
Integrated optics
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
Analytical synthesis of reduced order observer for estimation of the bilinear dynamic system state
Submitted by grigby1 on Fri, 09/28/2018 - 3:18pm
reduced order systems
nonlinear observer
observer coefficients
observer dynamic equation
Observers
output signal
pubcrawl
reduced order observer
reduced order state observer
Nonlinear dynamical systems
resilience
Resiliency
scalar input
solvability
state observer
synthesis problem
vector output
Vectors
Industrial engineering
bilinear dynamic system
bilinear dynamic system state estimation
bilinear systems
composability
control system synthesis
Dynamical Systems
estimation error
Heuristic algorithms
analytical synthesis
Kalman filters
manufacturing
Mathematical model
matrix algebra
matrix canonization
matrix canonization technology
matrix coefficients
Metrics
biblio
Evaluation of metrics of susceptibility to cascading blackouts
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
Computing Theory
Western interconnection
susceptibility metric evaluation
power system redundancy
Power system protection
Power system operation
power system interconnection
power system faults
LODF matrix
line outage distribution factor matrix
DFAX matrix
cascading blackouts
blackouts
Redundancy
Security Metrics
Stress
power system reliability
power system planning
Springs
Metrics
network theory (graphs)
Correlation
Monitoring
matrix algebra
power system security
Measurement
pubcrawl
biblio
A centralized inter-cell rank coordination mechanism for 5G systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
MMSE receiver
conventional non interference-aware schemes
future fifth generation wireless system
game-theoretic interference pricing measure
intercell interference management mechanism
interference aware intercell rank coordination framework
interference pricing
interference resilience property
interference resilience trade-off
least mean squares methods
linear minimum mean squared error receivers
mean signal-to-interference-plus-noise ratio
centralized intercell rank coordination mechanism
MMSE receivers
multiple receive antennas
multiple transmit antennas
random matrix theory
rank adaptation
receiving antennas
space division multiplexing
spatial multiplexing
transmitter-receiver pair
transmitting antennas
antenna arrays
pubcrawl
matrix algebra
Interference
Receivers
radio receivers
radiofrequency interference
Signal to noise ratio
estimation
resilience
Throughput
Transmitters
game theory
5G mobile communication
MIMO
search problems
5G
Pricing
Monte Carlo methods
Monte Carlo simulations
Computing Theory
5G systems
brute-force exhaustive search algorithm
biblio
Reconstruction of measurements in state estimation strategy against cyber attacks for cyber physical systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:41am
Matrix decomposition
state estimation
singular value decomposition
security of data
sampling matrix
Resiliency
resilience
Reconstruction of measurements
pubcrawl
privacy
power systems
Pollution measurement
over-completed dictionary
Observability
composability
matrix algebra
machine learning
K-SVD
K-singular value decomposition
dictionary learning
Dictionaries
cyber-physical systems
cyber physical systems
Cyber Attacks
compressive sensing
compressive sampling
compressed sensing
biblio
Towards Access Control for Network Coding-Based Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
network coding-based named data networking
linear all-or-nothing transform
linear AONT
matrix algebra
Metrics
Mobile Application
mobile computing
ndnSIM
network coding
internet
network coding-based NDN
pubcrawl
resilience
Resiliency
Security analysis
telecommunication network routing
Transforms
content producer
authorisation
authorization
authorization key
composability
computational overhead
computer network security
content delivery
content delivery effectiveness
Access Control solution
content-oriented future Internet architecture
Cryptography
encoding
encoding matrix
encryption
in-network caching
information-intensive application
« first
‹ previous
1
2
3
4
5
6
next ›
last »