Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 12:45pm
load balancing
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
nearest neighbor search
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
Measurement
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
machine learning algorithms
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
Distributed Average Consensus Algorithm for Damage Assessment of Power Distribution System
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
Damage Assessment
switch status
sensing units
power distribution system
PDS
outage
numerical simulations
IEEE 123-node test case
distributed consensus algorithm
distributed average consensus algorithm
disaster event
pubcrawl
communication capability
Agent
communication graph
Topology
disasters
distribution networks
distribution network
graph theory
Resiliency
resilience
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 3:47pm
recursive community structure
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
functional coherency
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
tensors
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
pubcrawl
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
biblio
Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
cyber-physical system
tunnels
system components
synthesis problem
supervisory controller
supervisor synthesis
required computational time
reduced order systems
model reduction steps
lengthy synthesis procedures
even unsolvable synthesis procedures
dependency graphs
Cyber Dependencies
Discrete-Event Systems
Scalability
discrete event systems
actuators
Compositionality
Human Factors
data visualisation
automata
sensors
cyber-physical systems
Analytical models
Metrics
graph theory
pubcrawl
Resiliency
biblio
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
naval CPS
Anomalies
CPS anomalies
cyber-physical system
data and information quality
data streams
data-driven decision system
digital subsystems
information quality measures vectors
Marine vehicles
naval cyber-physical anomaly propagation analysis
naval engineering computing
naval propulsion management system
optimized supervisory control
programmable logical controller
propagation analysis
quality assessed graph
system graph
Analytical models
Scalability
Data models
cyber-physical systems
Resiliency
pubcrawl
graph theory
Computational modeling
Metrics
security of data
cyber-attacks
Anomaly Detection
sensors
Human Factors
Compositionality
programmable controllers
navigation
Cyber Dependencies
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 12:04pm
automated vulnerability testing
vulnerability scans
vulnerability assessments
virtual environment
suboptimal decision making
individual attack paths
executable attack graphs
end-to-end process
cyber risk reduction
cyber risk assessments
cyber risk assessment uncertainty
cyber risk assessment process
cyber attack graphs
AVRA
computer network security
automated vulnerability and risk analysis
automatic test software
attack graphs
Predictive Metrics
security issues
risk analysis
Decision Making
reachability analysis
graph theory
composability
pubcrawl
Resiliency
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
query processing
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
encryption
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
nearest neighbor search
encrypted graph
distributed environment
data privacy
Cryptography
confidentiality
computer network security
composability
cloud environment
Cloud Computing
attack graphs
advanced encryption standard algorithm
active attacks
Predictive Metrics
Measurement
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »