Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Audio Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 11:29am
Scalability
optimization-based audio texture synthesis
optimization-based visual transfer method
optimized loss
pubcrawl
random noise
reference audio style
resilience
Resiliency
optimization
social media
social networking (online)
sound texture model
Spectrogram
statistical analysis
texture synthesis
Two dimensional displays
visualization
feedforward neural nets
audio signal processing
audio style transfer
Auditory system
CNNs
convolution
convolution neural networks
Deep Neural Network
feature extraction
audio content
human auditory system
image style transfer
image texture
Metrics
Neural networks
neural style transfer
optimisation
biblio
Realistic measurement protection schemes against false data injection attacks on state estimators
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
maximum total ROI
FDIA
power system state estimation
Computing Theory
alternative measurement protection schemes
cost-benefit analysis
false data injection attacks
ignored cost-benefit issue
imminent cyber-physical security issue
state estimation
metric return
realistic measurement protection schemes
realistic MPS
return on investment
state estimators
Steiner tree problem
Steiner trees
Security Metrics
Metrics
Indexes
optimization
optimisation
power engineering computing
Smart Grids
power system security
trees (mathematics)
security of data
cyber-physical security
risk management
performance evaluation
pubcrawl
false data injection attack
graph theory
biblio
Trust aware node scheduling protocol for target coverage using rough set theory
Submitted by grigby1 on Thu, 08/23/2018 - 10:46am
target coverage
Protocols
pubcrawl
quality of service
resource scarcity
rough set theory
Rough sets
scheduling strategy
sensors
probability
target coverage problem
telecommunication scheduling
trust
trust aware node scheduling protocol
trust values
Wireless Sensor Network
wireless sensor networks
Human behavior
autonomous operation
computer theory
coverage maximization
coverage probability
decision rules
Energy Efficiency
energy efficient coverage protocol
fault tolerance
active nodes
Human Factors
lifetime
Monitoring
network efficiency
network lifetime
node states
optimisation
biblio
An energy-efficient wireless image transmission method based on adaptive block compressive sensing and softcast
Submitted by grigby1 on Thu, 08/23/2018 - 10:41am
SoftCast
power allocation
power allocation factors
privacy
pubcrawl
radical evolution
radiocommunication
receiving image qualities
resilience
Resiliency
sampling rate
optimization
SR
staggering rate
telecommunication power management
transmission distortion
visual communication
Wireless communication
wireless image transmission
wireless multimedia communication
wireless sensor networks
energy consumption
adaptive block compressive sensing
Communication system security
composability
compressed sensing
compression distortion
compressive sampling
cyber-physical systems
data compression
distortion
energy conservation
ABCS-SoftCast
energy-distortion model
energy-efficient wireless image transmission method
energy-efficient wireless image transmission scheme
image block
Image coding
Image communication
information and communication technology
Multimedia communication
optimisation
biblio
Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
optimisation
jamming mitigation
Kalman filter
Kalman filter based tracking mechanism
Kalman filters
MANET
Mesh networks
Metrics
mobile jammer
motion measurement
next generation mission critical wireless networks
jamming attack avoidance
optimization goal
pubcrawl
resilience
Resiliency
spectral utilization
tracking
Unmanned Aerial Vehicles
VANET
wireless mesh networks
beam null border
3D spatial filtering
3D spatial reuse
3D UAV mesh networks
3D wireless mesh networks
adaptive beam nulling
aircraft communication
antennas
attack mitigation
autonomous aerial vehicles
3D mesh
Compositionality
directional antenna
disruptive attacks
distributed adaptive beam nulling
distributed mechanism
Extraterrestrial measurements
Interference
interference suppression
Jamming
biblio
Shortfall-Based Optimal Security Provisioning for Internet of Things
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
Resiliency
telecommunication network topology
Stochastic Computing Security
Stochastic computing
stochastic allocation
shortfall-based optimal security provisioning
security resource allocation plan
security infrastructure
security
Scalability
risk minimization
risk measure
risk management
resource management
resource allocation
computer network security
resilience
pubcrawl
Pareto optimization
optimization problem
optimization
optimisation
network security
Investment
Internet-of-Things scenarios
Internet of Things
Electronic mail
Economics
continuous topology changes
biblio
A generalized stochastic N-m security-constrained generation expansion planning methodology using partial transmission distribution factors
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
security-constrained analyses
power system security
power transmission economics
pubcrawl
resilience
Resiliency
Scalability
security
security criteria
security-constrained
power system reliability
Stochastic computing
Stochastic Computing Security
stochastic problem
Stochastic processes
stochastic programming
stochastic security-constrained generation capacity expansion planning problem
Transmission line matrix methods
two-stage problem
uncertainty
optimization
generalized stochastic N-m security-constrained generation expansion planning methodology
Generators
line outage distribution factors
Linear distribution factors
Load flow
Load modeling
load scenarios
multiple-line outages
optimisation
generalized generation distribution factors
optimization problem
partial transmission distribution factors
Planning
post-contingency constraints
power generation dispatch
power generation planning
power generation scheduling
power markets
biblio
Next Generation Automotive Architecture Modeling and Exploration for Autonomous Driving
Submitted by el_wehby on Fri, 05/25/2018 - 3:23pm
next generation automotive architecture modeling
timing
system integration
Software Architecture
Software
sensors
security
road vehicles
optimization
optimisation
Automotive engineering
mobile robots
mechanical engineering computing
heterogeneous components
hardware architecture
design metrics validation
control engineering computing
computer architecture
Autonomous Driving
Autonomous automobiles
1553757
biblio
An Efficient Control-Driven Period Optimization Algorithm for Distributed Real-Time Systems
Submitted by el_wehby on Fri, 05/25/2018 - 3:22pm
optimization
system schedulability
Search methods
scheduling
schedulability constraints
sampling periods
real-time systems
Real-time embedded control system
real-time embedded control functions
programming
piecewise linear function
period optimization
Partitioning algorithms
approximated functions
optimisation
GP formulations
geometric programming
distributed systems
Distributed real-time systems
control-driven period optimization algorithm
control systems
control performance
control models
control loops
communication resources
automotive industrial case study
1553757
biblio
Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running Forever
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
MinMCP
WRSN
wireless sensor networks
sensor node
recharging routes
optimisation
NP-hard
mobile computing
Mobile communication
mobile charger
Algorithm design and analysis
minimum mobile charger problem
Measurement
large-scale wireless rechargeable sensor networks
inapproximability bound
energy-constrained MC
distance constrained vehicle routing problem
approximation theory
Approximation methods
Approximation algorithms
1536086
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »