Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Joints
biblio
A soft exosuit for patients with stroke: Feasibility study with a mobile off-board actuation unit
Submitted by el_wehby on Mon, 05/14/2018 - 2:26pm
stroke rehabilitation
mobile off-board actuation unit
paretic limb
patient rehabilitation
poststroke gait tracking
real-time gait detection
research-focused actuation unit
Robot sensing systems
Soft exosuit
medical robotics
stroke-specific design
stroke-specific exosuit
textile components
textile garments
Textiles
unilateral assistance
wearable robot
actuators
Legged locomotion
Joints
human-robot interaction
gait training
gait metrics
gait analysis
Foot
exosuit
Exoskeletons
control algorithm
community-based rehabilitation
chronic stroke population
cable driven actuators
body-worn system
assistive forces
1446464
biblio
Motion estimation with accurate boundaries
Submitted by grigby1 on Wed, 03/08/2017 - 1:06pm
Joints
video coding
scalable interactive video coding scheme
pubcrawl170111
multiresolution metric
MSE
moving average processes
motion estimation
motion boundary
Measurement
matching metrics
local dense estimation scheme
Accuracy
Image resolution
image matching
image filtering
Image edge detection
image domain
Image coding
edge-preserving filters
edge-aware moving average filter
edge detection algorithm
edge detection
compressible motion field
biblio
"Dynamic defense strategy against advanced persistent threat with insiders"
Submitted by abfox on Tue, 02/14/2017 - 11:01am
game theory
two-layer game model
security of data
pubcrawl170101
Nash Equilibrium
malicious gain
Joints
information-trading game
Games
advanced persistent threat
dynamic defense strategy
defense/attack game
cyber security
Cost function
Computers
computer security
attack process
APT
biblio
Fault subspace selection and analysis of relative changes based reconstruction modeling for multi-fault diagnosis
Submitted by BrandonB on Wed, 05/06/2015 - 1:32pm
industrial processes
Tennessee Eastman benchmark process
related statistical characteristics analysis
regression analysis
reconstruction-based fault diagnosis
reconstruction modeling
principal component analysis
partial least squares
online fault diagnosis
multifault diagnosis
multi-fault diagnosis
Monitoring
Libraries
Joints
joint fault effects
abnormal process behaviors
historical fault library
historical fault data
fault subspace selection strategy
fault subspace selection
fault diagnosis
Data models
combinatorial mathematics
combinatorial fault nature analysis
Analytical models
analysis-of-relative changes based reconstruction modeling
analysis of relative changes
alarming signal elimination
aggregative reconstruction-based fault diagnosis strategy
aggregative fault subspace calculation
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
Fingerprint information maximization for content identification
Submitted by BrandonB on Mon, 05/04/2015 - 10:30am
information bottleneck method
quantizer optimization
Quantization (signal)
optimization
optimisation
mutual information across
Mutual information
learning based fingerprint
Joints
information retrieval
Information maximization
Approximation methods
Information bottleneck
greedy optimization
fingerprint information maximization
filter optimization
distortion channel
Dictionaries
Databases
Content Identification
content fingerprint
Audio fingerprinting
biblio
Shared Experiences of Technology and Trust: An Experimental Study of Physiological Compliance Between Active and Passive Users in Technology-Mediated Collaborative Encounters
Submitted by BrandonB on Thu, 04/30/2015 - 12:50pm
Particle measurements
Trusted Computing
trust in technology
trust
technology-mediated collaborative encounters
shared experiences
Reliability
physiology
physiological compliance (PC)
physiological compliance
passive user
Atmospheric measurements
Optical wavelength conversion
multiuser technological environment
multitask environment
multiprogramming
multiagent systems
Monitoring
Joints
groupware
Group performance
Biomedical monitoring
biblio
Reducing Mistrust in Agent-Human Negotiations
Submitted by BrandonB on Thu, 04/30/2015 - 12:37pm
Educational institutions
Intelligent systems
Joints
multi-agent systems
multiissue negotiation
face-to-face negotiation
Instruments
computational agent
Context
socially intelligent agent
Economics
online negotiation
software agents
Trusted Computing
agent-human negotiation
agent-human negotiations
online negotiation setting
socially intelligent agents
software agent
trusting individual
online interaction