Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
convergence
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Distributed Fixed-Time Secondary Controller for DC Microgrids
Submitted by aekwall on Mon, 07/20/2020 - 10:31am
Electrical Engineering
Voltage control
time delays
Resiliency
Regulators
proportional current sharing
power distribution reliability
power distribution control
Microgrids
Heuristic algorithms
graph theory
fixed-time control approach
fixed-time control
fixed-time based secondary controller
pubcrawl
electric current control
droop control
distributed power generation
distributed fixed-time secondary controller
DC voltage deviation
DC microgrids
DC microgrid
DC distribution systems
current sharing
convergence
Control Theory and Resiliency
Communication networks
centralized secondary controller
biblio
A PSO clustering based RFID middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
policy-based governance
security of data
security
RFID middleware
Resiliency
resilience
radiofrequency identification
radio frequency identification
pubcrawl
PSO clustering scheme
PSO clustering
Acceleration
particle swarm optimization
particle swarm optimisation
middleware security
middleware
Data Security
data availability
convergence
composability
Clustering algorithms
Birds
biblio
Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
algorithmic approaches
Power Grid Vulnerability Assessment
Voltage measurement
SCADA
power system stability
power related errors
power grid control systems
power flow cyber-attack vulnerabilities
power flow constraints
Numerical Resilience
Load flow
Economic dispatch
cyber-attacks
contingency analysis
attack models
security of data
Metrics
power grids
convergence
control systems
composability
Smart Grid
power system security
power engineering computing
state estimation
Indexes
Resiliency
resilience
pubcrawl
biblio
A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Linear systems
zero vulnerability encrypted password
Vulnerability
security
Router Systems Security
router mechanism
Resiliency
resilience
pubcrawl
process control
Metrics
Mathematical model
Aerodynamics
internet
high-level security
encryption
Cryptography
convergence
control systems
computer network security
authorisation
authentication
Approximation error
biblio
The Roving Proxy Framewrok for SMS Spam and Phishing Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
roving proxy framework
unsolicited e-mail
Training
testing
spam detection
SMS Spam
SMS phishing detection
SMishing attacks
SMishin
Servers
Scalability
BYOD security
pubcrawl
Phishing
Mobile handsets
Metrics
Human Factors
Human behavior
feature extraction
convergence
Computer crime
biblio
A Swarm Intelligence Approach to Avoid Local Optima in Fuzzy C-Means Clustering
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
pattern clustering
swarm intelligence global optimization method
optimization process
NP-hard
inter-cluster similarity
hill climbing method
fuzzy self-tuning particle swarm optimization
fuzzy clustering task
fuzzy c-means clustering
FST-PSO
clustering analysis
Linear programming
Compositionality
Partitioning algorithms
Task Analysis
computational complexity
fuzzy set theory
Fuzzy logic
Clustering algorithms
particle swarm optimization algorithm
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
pubcrawl
biblio
SECO: A Scalable Accuracy Approximate Exponential Function Via Cross-Layer Optimization
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
pubcrawl
exponential operation
exponentiation
fault tolerant control
gradient methods
intrinsic error resilience
neural nets
Nickel
Observers
optimisation
power consumption
exponential function unit
Resiliency
runtime optimization method
Scalability
scalable accuracy approximate exponential function
SECO
signal processing
signal processing applications
Silicon
spiking neuron models
Taylor expansion
Design Time
approximate computing
approximate EFU designs
approximation theory
arithmetic units
convergence
Cross-Layer Approximation
cross-layer design method
Cross-layer optimization
deep neural networks
design space
adaptive exponential integrate-fire neuron model
Dynamic Accuracy Scaling
Eigenvalues and eigenfunctions
energy-accuracy-optimal approximate multiplier
energy-efficient computing
Error analysis
error analysis method
Error Modeling
error-resilient applications
Exponential Function
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
network systems
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
incorporating establishment
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
DDoS Attack
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
anomalous express
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »