Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Aggregates
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
biblio
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
question answering (information retrieval)
learning (artificial intelligence)
lexical gap problem
MB-NET
meta data
metadata
Metadata Discovery Problem
natural language processing
performance improvements
pubcrawl
large-scale English cQA data sets
question retrieval
Resiliency
Scalability
Semantics
text analysis
Text Mining
Vectors
Web
word processing
distributed word representation learning
basic category powered model
category information metadata
category powered models
community question answering
Compositionality
Computational modeling
Context modeling
cQA archives
distributed processing
Aggregates
distributed word representation modeling
fisher kernel
fixed-length vectors
information retrieval
internet
Kernel
Knowledge Discovery
large-scale automatic evaluation experiments
large-scale Chinese cQA data sets
biblio
Institutional Repository Digital Object Metadata Enhancement and Re-Architecting
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
meta data
search problems
Scalability
Resiliency
pubcrawl
open metadata API
open access repositories
object representation
Object recognition
object discovery
Metadata Discovery Problem
metadata access
metadata
administrative object management
Libraries
institutional repository digital object metadata enhancement
information architecture
Guidelines
full text application program interface
DOI assignment
digital object identifier
digital libraries
Compositionality
application program interfaces
Aggregates
administrative object processing
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
"Water treatment in context: resources and African religion"
Submitted by grigby1 on Tue, 02/21/2017 - 1:11pm
risk factor
filtration processes
hydraulic conductivity
Microorganisms
mixtures
mortality rates
organization dependence
physical entrapment
point-of-use
pubcrawl170104
filtration
sub-Saharan Africa
surface water sources
testing
water filtration methods
Water pollution
water supply
water supply availability
water treatment
concrete filtration
Africa
African religion
Aggregates
bacterial count tests
cement mixture
cements (building materials)
compressive strength
Concrete
absorption
concrete mixtures
Containers
contaminants
contaminated water source
drinking water availability
drinking water filtration
effluent
effluents
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
Models and tools for the high-level simulation of a name-based interdomain routing architecture
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
packet-level models
Topology
telecommunication traffic
telecommunication network topology
telecommunication network routing
sensitivity analysis
Routing
reusable traffic model
reusable topology model
reusable deployment model
Peer-to-peer computing
aggregate models
network topology
modular design
internet
high-level simulation methodology
global network architecture operation
global network architecture deployment
complex-dynamic behavior
clean slate name-based interdomain routing architecture
Approximation methods
Aggregates
biblio
C-BAS: Certificate-Based AAA for SDN Experimental Facilities
Submitted by BrandonB on Mon, 05/04/2015 - 2:50pm
Aggregates
authentication
authentication authorization and accounting management mechanisms
authorisation
authorization
C-BAS
certificate-based AAA architecture
computer architecture
computer network management
Databases
patchy AAA infrastructure
Public key
robust AAA infrastructure
SDN experimentation facilities
Servers
software defined networking
biblio
A framework for characterisation of complex systems and system of systems
Submitted by BrandonB on Mon, 05/04/2015 - 2:43pm
Ontologies
Unified modeling language
Systems engineering and theory
Systems
system-of-systems characterisation
system of systems
Rail transportation
quantitative characterization
programming
Ontology
ontologies (artificial intelligence)
Aggregates
Metrics
Measurement
Indexes
formal development
emergence notion
Complexity theory
complexity
complex systems characterisation
collaboration
« first
‹ previous
1
2
3
4
5
next ›
last »