Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
search problems
biblio
Accelerated Approximate Nearest Neighbors Search Through Hierarchical Product Quantization
Submitted by grigby1 on Fri, 05/22/2020 - 1:27pm
multiple low-dimensional codebooks
Cartesian product
FPGA-tailored architecture
hardware acceleration
hierarchical PQ
Hierarchical product Quantization
High-Dimensional Indexing
HPQ
mathematics computing
approximate search
nearest neighbor search
Online Indexing
product quantization
query answering
Regression
Search Space
similarity search
vector quantization
nearest neighbour methods
machine learning
pubcrawl
field programmable gate arrays
Artificial Intelligence
pattern classification
neural nets
Metrics
Measurement
learning (artificial intelligence)
search problems
regression analysis
classification
query processing
information retrieval
accelerated Approximate Nearest Neighbors search
ANN search
biblio
Indexing in k-Nearest Neighbor Graph by Hash-Based Hill-Climbing
Submitted by grigby1 on Fri, 05/22/2020 - 1:25pm
file organisation
nearest neighbor search
vector quantization
Upper bound
SIFT1M datasets
query assignment process
nearest neighbor graph
k-nearest neighbor graph
Inverted index
indexing
hill-climbing
hashing-based seed generation
hashing
hash-based hill-climbing
GIST1M datasets
pubcrawl
Euclidean distance
Binary codes
approximation theory
approximate nearest neighbor search
query processing
Clustering algorithms
principal component analysis
graph theory
Acceleration
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
biblio
Harmony search algorithm-based airflow control of an oscillating water column-based wave generation power plants
Submitted by grigby1 on Fri, 04/24/2020 - 3:08pm
Stators
power generation
power generation control
power takeoff
privacy
pubcrawl
resilience
Resiliency
Rotors
search problems
stalling behavior
OWC plant
three-term control
Torque
traditionally tuned PID controller
Turbines
uncontrolled plant
Wave energy
wave power generation
wave power plants
Wells turbine
Harmony Search Algorithm (HSA)
asynchronous generators
Atmospheric modeling
composability
controlled plant
DFIG
doubly fed induction generator
Doubly Fed Induction Generator (DFIG)
Doubly fed induction generators
generated power
harmony search algorithm
airflow control
HSA-tuned controller
hydraulic turbines
Mathematical model
Metrics
multiple oscillating water column plant
NEREIDA wave generation power plant
oscillating behaviors
Oscillating Water Column (OWC)
oscillating water column-based wave generation power plants
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:21am
multicarrier NOMA systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
Communication Systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
optimisation
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
game theory
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
index search
resilience
Resiliency
composability
pubcrawl
secret-sharing scheme
secret sharing
Secrecy Computation
Search methods
multiple keyword search
main searching functions
logical disjunctive
logical conjunctive
Cryptography
disjunctive searching
direct searching
conjunctive searching
computation cost
search problems
searchable encryption
Cloud Computing
Servers
query processing
Public key
Indexes
encryption
biblio
Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
Dynamic searchable encryption
resilience
Resiliency
composability
pubcrawl
Trusted Computing
text analysis
search problems
search pattern hiding
link-list structures
keyword searching
encrypted critical data
dynamic searchable symmetric encryption
Cryptography
DSSE systems
data encapsulation
blind storage
searchable encryption
untrusted cloud server
privacy
storage management
Servers
Indexes
Cloud Computing
encryption
biblio
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
search problems
program assemblers
pubcrawl
Representation-Learning
resilience
Resiliency
reverse engineering
robust clone search engine
robust vector representation
search engines
optimizations
Semantics
Software
static code analysis
static representation robustness
Static-Analysis
Syntactics
vector representation
Vectors
Vulnerability-Search
dynamic clone search approaches
assembly clone search engine
assembly code representation learning model
assembly function
binary clone search
Binary-Code-Search
Cloning
code obfuscation techniques
compiler optimization options
composability
Asm2Vec
feature engineering process
Human behavior
invasive software
learning (artificial intelligence)
lexical semantic relationships
malware
optimising compilers
optimization
biblio
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search
Submitted by grigby1 on Tue, 01/21/2020 - 10:25am
learning rate
two-dimensional grid
Training
threat detection rate
security of data
search problems
Resiliency
resilience
pubcrawl
policy-based governance
optimization parameters
Optimization methods
one-dimensional parameter optimization
network structure
Metrics
insider threat
learning (artificial intelligence)
insider threat detection method
Human behavior
grid search
deep learning model
deep learning
deep belief net
composability
collaboration
belief networks
adaptive systems
adaptive optimization DBN
adaptive optimization
Adaptation models
biblio
A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
linear feedback shift register based stream cipher
decision technique
DNA computing
DNA Cryptanalysis
DNA molecules
DNA sticker model based algorithm
DNA-based algorithm
Electron tubes
genetic bases
key stream bit
LFSR
LFSRs equation
cryptographic systems
molecular biophysics
molecular computing
NLFSR
NLFSRs
nonlinear feedback shift register based stream cipher
parallel computations
parallel search
shift registers
Sticker-Model
TEST TUBE
feedback
Computational modeling
resilience
pubcrawl
Human behavior
Metrics
Cryptography
cryptanalysis
search problems
Ciphers
DNA
privacy
Resiliency
stream cipher
biocomputing
biological operations
Adelman's DNA computing experiment
algebra
algebraic code
bit string
cipher characters
computability model
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »