Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
search problems
biblio
A Two-Stage Genetic Programming Hyper-Heuristic for Uncertain Capacitated Arc Routing Problem
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
poor routing policies
vehicle routing
UCARP
Two-Stage GPHH
two-stage genetic programming hyper-heuristic
TS-GPHH
Task Analysis
Statistics
Sociology
single-objective GPHH
search problems
routing policy
Routing
Robustness
pubcrawl
complex uncertain capacitated arc routing problem
optimization
MultiObjective GP
multi-objective.
MOGP
interpretable routing policies
human trust
Human behavior
graph theory
GPHH
GP-evolved routing policies
genetic algorithms
effective routing policies
Complexity theory
biblio
Trust of Humans in Supervisory Control of Swarm Robots with Varied Levels of Autonomy
Submitted by grigby1 on Tue, 12/01/2020 - 1:35pm
pubcrawl
trust-related human factors
Task Analysis
target foraging task
Switches
swarm supervisory control
swarm robots
swarm robotics
supervisory control
search problems
search algorithm
robust trust
robots
Resiliency
resilience
Robot Trust
passively monitoring operators
multi-robot systems
mobile robots
mixed-initiative LOA
Manuals
manual LOA
levels of autonomy
human-robot interaction
human operator
Human Factors
Human behavior
fully autonomous LOA
flocking swarm
automation
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
UUCA: Utility-User Cooperative Algorithm for Flexible Load Scheduling in Distribution System
Submitted by grigby1 on Fri, 11/20/2020 - 2:07pm
resilience
peak load reduction
Peak to average power ratio
peak to average ratio (PAR)
policy-based governance
power distribution economics
power generation scheduling
Pricing
privacy
pubcrawl
residential customers
Metrics
Resiliency
Scalability
Schedules
search problems
smart grid consumer privacy
smart grid deployment
smart power grids
utility
utility-user cooperative algorithm
UUCA
flexible appliance rescheduling
commercial customers
composability
Cost function
demand response analysis
demand side management
distribution grid
Distribution system
Distribution System Operator (DSO)
electricity cost (EC)
electricity cost decrement
collaboration
flexible load
Harmony search (HS) optimization
harmony search optimization technique
heuristic search techniques
Human behavior
industrial customers
Job shop scheduling
load flow control
Load modeling
load scheduling
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
box times
white box cryptography
white-box Ramsey problem
white-box model
white-box hardness
white-box complexity
the Ramsey problem
TFNP problems
succinct black-box
Ramsey theory
hard property
graph size
graph property testing
description size
collision-resistant hashing
Resiliency
black-box hardness
black-box complexity
search problems
Resistance
Integrated circuit modeling
pubcrawl
Complexity theory
computational complexity
testing
Metrics
Computational modeling
Cryptography
graph theory
composability
biblio
A genetic algorithm for obtaining memory constrained near-perfect hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
near-perfect hashing
uniform data distribution
Statistics
Sociology
search problems
Resiliency
resilience
pubcrawl
operating systems
open-addressing double-hashing approach
nonlinear transformation
Next generation networking
binary search
memory-constrained applications
Memory management
hash table
hash algorithms
genetic algorithms
genetic algorithm
file organisation
fast items retrieval
Compositionality
Cohttps://ieeexplore.ieee.org/document/8402794mplexity theory
biblio
Discrete Locally-Linear Preserving Hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
locally linear preserving
unsupervised methods
Unsupervised Learning
unsupervised hashing method
unsupervised hashing algorithms
unsupervised hashing
search problems
Resiliency
resilience
pubcrawl
nearest neighbour methods
nearest neighbor search
matrix algebra
locally linear structure
anchor embedding
local weight estimation
local anchor embedding algorithm
image retrieval
Image coding
hash algorithms
graph theory
discrete locally-linear preserving hashing
discrete hashing
Compositionality
Binary codes
approximate adjacent matrix
anchor graph construction algorithm
biblio
Asymptotically Optimal Pruning for Nonholonomic Nearest-Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
distance evaluations
tree searching
set theory
sampling-based motion planning algorithms
pruning techniques
Path Planning
optimal pruning
nonholonomic constraints
k-d tree algorithm
geodesic distance
explicit distance comparisons
exact Nearest-Neighbor Search
pubcrawl
differential geometry
computationally demanding task
asymptotic properties
asymptotic computational bottleneck
nearest neighbor search
search problems
computational complexity
nearest neighbour methods
Measurement
Metrics
mobile robots
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »