Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indexes
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
biblio
An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation
Submitted by grigby1 on Fri, 05/22/2020 - 1:39pm
parallel processing
faster query execution
high memory footprint
in-memory indexes
K-NN search
MatDot codes
matrix multiplication
model parallelism
model-parallel architecture
MRPT
multiple random projection trees
nearest neighbor estimation
fast k-nearest neighbors
query response time
query time
single compute node
single processing node
storage constraints
storage-optimal MatDot Codes
storage-optimal recovery threshold
straggler and failure tolerance
straggler-prone environment
Systematics
worker nodes
nearest neighbor search
Indexes
Data models
Computational modeling
Big Data
trees (mathematics)
Metrics
Measurement
nearest neighbour methods
data storage
query processing
mathematics computing
pubcrawl
high-dimensional data
Approximation algorithms
approximate nearest neighbor algorithms
candidate points
coded computing
coded matrix multiplication
computation efforts
computation strategy
distributed computing cluster
distributed processing
Euclidean distance calculations
biblio
Parallel Implementation of K-Nearest-Neighbors for Face Recognition
Submitted by grigby1 on Fri, 05/22/2020 - 1:39pm
graphics processing units
Time complexity
parallel CUDA implementation
parallel architectures
KNN classifier
k-nearest-neighbours classifier
Instruction sets
countless classification algorithms
nearest neighbor search
Sorting
pubcrawl
image classification
face recognition
nearest neighbour methods
Measurement
Metrics
Classification algorithms
pattern classification
Indexes
biblio
Nearest Neighbor Subsequence Search in Time Series Data
Submitted by grigby1 on Fri, 05/22/2020 - 1:28pm
horizontal pruning
TINN nodes
TINN model
TINN graph
time series nearest neighbor subsequence search
time series datasets
Time Series Data
temporal sequence data
Temperature sensors
subsequence similarity match problem
Subsequence Mining
similarity vectors
similarity search support
sensor data
range interval diversity properties
query processing strategy
Data mining
Bridges
augmented relationship graph model
Agriculture
nearest neighbor search
query processing
Time series analysis
graph theory
Meteorology
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
pubcrawl
time series
biblio
Indexing in k-Nearest Neighbor Graph by Hash-Based Hill-Climbing
Submitted by grigby1 on Fri, 05/22/2020 - 1:25pm
file organisation
nearest neighbor search
vector quantization
Upper bound
SIFT1M datasets
query assignment process
nearest neighbor graph
k-nearest neighbor graph
Inverted index
indexing
hill-climbing
hashing-based seed generation
hashing
hash-based hill-climbing
GIST1M datasets
pubcrawl
Euclidean distance
Binary codes
approximation theory
approximate nearest neighbor search
query processing
Clustering algorithms
principal component analysis
graph theory
Acceleration
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
biblio
DURS: A Distributed Method for k-Nearest Neighbor Search on Uncertain Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 1:22pm
distributed system
nearest neighbor search
uncertain graphs
social networking (online)
scalable search
Scalability
Market research
k-nearest neighbor search
k-nearest neighbor queries
k-nearest neighbor
DURS
pubcrawl
biology
query processing
graph theory
probability
nearest neighbour methods
Measurement
Metrics
computer science
Indexes
Correlation
biblio
Generalized Reconstruction-Based Contribution for Multiple Faults Diagnosis with Bayesian Decision
Submitted by aekwall on Mon, 05/18/2020 - 9:48am
belief networks
smearing effect
multiple faults diagnosis
multiple fault diagnosis
Multi-dimensional reconstruction based contribution
industrial process
generalized reconstruction-based contribution
data-driven fault diagnosis method
bayesian decision
process monitoring
fault detection
Covariance matrices
fault diagnosis
Monitoring
numerical simulation
numerical analysis
Human Factors
principal component analysis
Indexes
cyber physical systems
PCA
Metrics
pubcrawl
Resiliency
Bayes methods
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 1:42pm
Metrics
Neural Network Security
training process
local minimum point
LM-BP algorithm
Levenberg-Marquardt algorithms
evaluation
computer network security evaluation method
computer networks
BP Neural Network
Backpropagation
Training
neural nets
Communication networks
Safety
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
biblio
Research of Computer Network Security Evaluation Based on Backpropagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:42pm
Backpropagation
Neural Network Security
Virus
prediction
loopholes
evaluation
computer viruses
computer networks
computer network security evaluation
BP Neural Network
backpropagation neural network
security
Biological neural networks
Metrics
neural nets
Communication networks
Mathematical model
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
biblio
Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
algorithmic approaches
Power Grid Vulnerability Assessment
Voltage measurement
SCADA
power system stability
power related errors
power grid control systems
power flow cyber-attack vulnerabilities
power flow constraints
Numerical Resilience
Load flow
Economic dispatch
cyber-attacks
contingency analysis
attack models
security of data
Metrics
power grids
convergence
control systems
composability
Smart Grid
power system security
power engineering computing
state estimation
Indexes
Resiliency
resilience
pubcrawl
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »