Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
TV
biblio
Automated content detection on TVs and computer monitors
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
Image edge detection
TV
television
system manufacturing process
rectangle recognition
quality tests
pubcrawl170111
notebook
Monitoring
line detection algorithms
Inspection
image segmentation
Algorithm design and analysis
image comparison metrics
edge detection algorithms
edge detection
Computers
computer monitors
computer displays
computer aided manufacturing
automatic optical inspection
automatic inspection system images
automated content detection
biblio
The optimal contracts in continuous time under Knightian uncertainty
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
optimal control
Yttrium
uncertainty
TV
pubcrawl170108
pubcrawl170107
principal-agent problems
optimization
optimisation
optimal control theory
continuous time system
optimal contracts
optimal contract
Knightian uncertainty
g-expectation framework
financial management
differential equations
contracts
continuous time systems
biblio
Audio fingerprinting to identify TV commercial advertisement in real-noisy environment
Submitted by BrandonB on Mon, 05/04/2015 - 11:49am
Noise
TV commercial advertisement identification
TV
Transforms
Time-frequency Analysis
television broadcasting
Servers
salient audio peak pair fingerprints
Robustness
real-noisy environment
acoustic noise
Fingerprint recognition
feature extraction
Databases
CQT
Constant Q Transform
audio signal processing
audio fingerprinting extraction method
Audio fingerprinting
audio content identification
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 3:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
A novel trust evaluation method for Ubiquitous Healthcare based on cloud computational theory
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
Pragmatics
user profile attributes
uncertainty handling
uncertain reasoning
UH environment
ubiquitous healthcare
ubiquitous computing
TV
Trusted Computing
trust evaluation method
cloud computational theory
MIMICs
Medical services
MATLAB software
MATLAB
health care
Generators
Conferences
cloud theory
Cloud Computing
biblio
A low-cost dual energy CT system with sparse data
Submitted by BrandonB on Thu, 04/30/2015 - 12:43pm
ART-TV
Computed tomography
Detectors
dual energy CT system
Energy states
Image reconstruction
material discrimination
reconstruction
Reconstruction algorithms
sparse samples
TV
X-ray imaging
X-rays
« first
‹ previous
1
2