Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
biblio
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
game theoretic security
zero-sum game
undirected tree
undirected topology
system L2 gain
Stackelberg equilibrium
security-aware sensor placement problem
optimal sensor placement strategy
Networked Control System
game-theoretic framework
game leader
detector decision
attacker-detector game
attacker decision
attack signals
Symmetric matrices
security of data
Nash Equilibrium
Cyber-physical attacks
networked control systems
Predictive Metrics
Human Factors
Games
optimisation
trees (mathematics)
sensor placement
pubcrawl
game theory
security
Scalability
Monitoring
Detectors
biblio
On Integrating Knowledge Graph Embedding into SPARQL Query Processing
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Approximation algorithms
Time factors
SPARQL query processing
research problems
query languages
query language
NN search algorithm
Nearest Neighbor Searching
knowledge graph embedding
KGE
Covariance matrices
search problems
nearest neighbor search
query processing
graph theory
nearest neighbour methods
Measurement
optimisation
Metrics
standards
Mathematical model
pubcrawl
biblio
Stacked K-Means Hashing Quantization for Nearest Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
hypercube increases
target data
stacked k-means hashing quantization
SKMH
similar approximation ability
optimizing time
multilayer lower-dimensional cubes
mentioned optimizing process
KMH method
KMH divides
K-means Hashing
k-means
information available online
improved hashing method
pubcrawl
higher-dimensional cubes
High-dimensional Vectors
fast nearest neighbor search
codes data
binary code optimizing
high dimensional data
low-dimensional subspaces
nearest neighbor search
search problems
Measurement
optimisation
Metrics
biblio
An Adaptive Routing Scheme Based on Q-learning and Real-time Traffic Monitoring for Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
Monitoring
traffic monitoring
traffic load congestion
telecommunication traffic
Routing
real-time systems
real-time
q-learning
Prediction algorithms
performance optimization
packet transmission
optimisation
NoC
network-on-chip
network routing
network congestion
network on chip security
monitor
learning (artificial intelligence)
Heuristic algorithms
DyXY routing
dynamical routing schemes
dynamical routing
dynamical Q-learning routing approach
computer architecture
C-XY routing
adaptive routing scheme
Metrics
Resiliency
resilience
Scalability
biblio
Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
evolutionary computation
Neural Network Security
security situation prediction
Neurons
network security situation awareness
hybrid rice optimization algorithm
HRO
Evolutionary algorithms
BP Neural Network
BP network security posture prediction method
backpropagation neural network
Backpropagation
Biological neural networks
security of data
Prediction algorithms
optimisation
Metrics
neural nets
Communication networks
optimization
Resiliency
resilience
policy-based governance
pubcrawl
security
collaboration
biblio
Modelling of submerged oscillating water columns with mass transfer for wave energy extraction
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
submerged oscillating water column
momentum equations
numerical analysis
Numerical models
numerical time-domain model
ocean waves
oscillating-water-column devices
OWC
pipe flow
positive flow
reduced environmental loads
regular wave conditions
resonance amplification
simplified structural design
mass transfer mechanism
submerged oscillating water columns
submerged resonant duct
surface level
time-domain analysis
turbine induced damping
Turbines
Water conservation
water flows
wave energy converter
wave energy converters
wave energy extraction
weir
oscillating behaviors
composability
damping
completely submerged systems
air chamber
adiabatic air compressibility
Acceleration
wave power plants
wave power generation
hydraulic turbines
Atmospheric modeling
optimisation
Metrics
System performance
Load modeling
Design engineering
Mathematical model
Resiliency
resilience
pubcrawl
privacy
design optimization
floating fixed structures
fluid oscillations
H2O
hydro turbine
Hydrodynamics
mass transfer
biblio
Matlab Simulation of Algorithms for Face Detection in Video Surveillance
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video image
Viola-Jones waterfall method
resource optimization
Kanade-Lucas-Tomasi algorithm
Hausdorff distance
geometric models
faces
Face detection
detection problems
MATLAB
face recognition
MatLab simulation
video surveillance system
video surveillance
feature extraction
object detection
video signal processing
object tracking
digital camera
Cameras
optimisation
Metrics
Algorithms
detection
pubcrawl
Human behavior
Resiliency
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
multicarrier NOMA systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
Communication Systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
optimisation
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
game theory
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
biblio
A Secure and Power-Efficient Constellations for Physical Layer Security
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
communication security
wireless networks
wireless channels
symmetrical constellations
symbol error rate performance
SER performance
power-efficient constellations
power-efficiency
polarization modulation
Monte Carlo simulation
Monte Carlo methods
double-layer constellations
double layers constellations
telecommunication security
8
4
16-order double-layer constellations
physical layer security
error statistics
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »