Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Approximation methods
biblio
Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running Forever
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
MinMCP
WRSN
wireless sensor networks
sensor node
recharging routes
optimisation
NP-hard
mobile computing
Mobile communication
mobile charger
Algorithm design and analysis
minimum mobile charger problem
Measurement
large-scale wireless rechargeable sensor networks
inapproximability bound
energy-constrained MC
distance constrained vehicle routing problem
approximation theory
Approximation methods
Approximation algorithms
1536086
biblio
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
Algorithm design and analysis
Approximation algorithms
Approximation methods
Computers
Conferences
NP-completeness
optimisation
polynomial approximation
polynomial-time approximation schemes
polynomials
Robot sensing systems
time-constrained data harvesting
wireless sensor networks
WSN
1536086
biblio
Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks
Submitted by el_wehby on Fri, 05/25/2018 - 2:48pm
Mobile communication
wireless access network
Throughput
telecommunication traffic
SRA
source-destination pair
shared relay assignment
rounding mechanism
Relays
relay networks (telecommunication)
mobile system
mobile computing
Approximation algorithms
Max-Total Throughput
Max-Min Throughput
many-to-one traffic
M21 traffic
fairness
cooperative networks
cooperative communication
close-to-optimal performance
Bismuth
approximation theory
Approximation methods
1536086
biblio
SPAA-Aware 2D Gaussian Smoothing Filter Design Using Efficient Approximation Techniques
Submitted by grigby1 on Wed, 03/08/2017 - 1:03pm
Error Tolerant Applications
speed-power-area-accuracy
SPAA-aware 2D Gaussian smoothing filter design
SPAA metric
smoothing methods
rounding-off Gaussian kernel coefficient
pubcrawl170111
portable multimedia devices
nearest pixel approximation
limited battery lifetime
Kernel
Image edge detection
Gaussian Smoothing Filter
Gaussian processes
adders
energy-efficient designs
energy-efficient approximate 2D GSF architecture
energy-efficient approximate 2D Gaussian smoothing filter architecture
Energy-efficiency
Edge-detection
edge detection
computer architecture
Complexity theory
approximation theory
approximation technique
Approximation methods
Approximate design
biblio
Fuzzy Optimization of Automobile Supply Chain Network of Considering Risks
Submitted by grigby1 on Wed, 03/08/2017 - 12:56pm
fuzzy price
transportation costs
total profit risk minimization
supply chains
supply chain network
supply chain management
risks
risk management
pubcrawl170110
profitability
Pricing
optimization
optimisation
Industries
fuzzy set theory
Approximation methods
fuzzy optimization
Fuzzy
distribution centers
discretization points
discrete fuzzy problem
Cplex 12.6
continuous fuzzy problem
component suppliers
component plants
automotive components
automobiles
automobile supply chain network
automobile
biblio
"On compressed sensing image reconstruction using linear prediction in adaptive filtering"
Submitted by grigby1 on Tue, 02/21/2017 - 11:35am
Noise
Wiener filters
Stochastic processes
spatial domain adaptive Wiener filter
sparsity
Sparse matrices
sensors
Robbins-Monro stochastic approximation
random noise
pubcrawl170104
Prediction algorithms
prediction
Nyquist rate requirement
nonparametric approach
adaptive filter
MRI
Modified-RM approximation
magnetic resonance imaging
Image reconstruction
distance based linear prediction
CS reconstruction problem
compressive sampling
compressed sensing
Approximation methods
Approximation algorithms
adaptive filters
adaptive filtering
biblio
Asymptotic analysis of failed recovery probability in a distributed wireless storage system with limited sum storage capacity
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
optimal storage allocation strategy
wireless storage
wireless sensor networks
Wireless communication
wireless channels
wireless channel conditions
System recovery
storage size
storage nodes
storage management
storage allocation
signal-to-noise ratio
Signal to noise ratio
resource management
probability
Approximation methods
maximum distance separable coding
limited sum storage capacity constraint
failed recovery probability
failed recovery
exponential order
distributed wireless storage systems
Distributed storage system
distributed storage node
distributed memory systems
Distributed databases
Decoding
Capacity planning
asymptotic failed recovery probability
asymptotic analysis
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
1
2
next ›
last »