Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
Animated Geo-temporal Clusters for Exploratory Search in Event Data Document Collections
Submitted by BrandonB on Tue, 05/05/2015 - 12:25pm
geo-referenced search results
visual analytics technique
visual analytics
spatio-temporal data
pattern clustering
navigation
map views
internet
information visualisation
information retrieval
human-computer information retrieval
History
animated geo-temporal clusters
event data document collections
equivalent text based exploratory search engine
Encyclopedias
Electronic publishing
document image processing
document handling
Data visualization
data visualisation
coordinated timeline
computer animation
animation
biblio
Synchrophasor Data Baselining and Mining for Online Monitoring of Dynamic Security Limits
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
security monitoring
power system reliability
power system security
power system stability
power transfer measurement
random forest (RF)
SBSA
SCADA measurements
SCADA systems
seasonal security margins
security
power engineering computing
Stability criteria
synchrophasor
synchrophasor data baselining
synchrophasor-based situational awareness
system interfaces
system reliability
system stress
system visibility
Table lookup
network backbone buses
Baselining
clustering
critical interfaces
Data mining
dynamic security assessment (DSA)
dynamic security limits
look-up tables
medoid clustering
Monitoring
angle shifts
nomograms
online monitoring
PAM clustering
partitioning around medoids (PAM)
pattern clustering
phase-angle differences
phasor measurement
phasor measurement unit (PMU)
Phasor measurement units
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
biblio
LUT based secure cloud computing #x2014; An implementation using FPGAs
Submitted by BrandonB on Tue, 05/05/2015 - 8:24am
Games
Table lookup
suitable hardware platform
security requirements
security of data
secure cloud computing scheme
program security
pattern clustering
LUT based secure cloud computing
look-up table
k-means clustering algorithm
Big Data
FPGA
Formalization
field programmable gate arrays
encryption
data sharing
data security problem
cryptographic techniques
Cloud Computing
big data processing
biblio
Urban traffic commuting analysis based on mobile phone data
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
OD information
urban traffic commuting analysis
trip generation mechanism
trip attraction
traffic information systems
traffic information extraction
Statistics
Sociology
real-time systems
pattern clustering
Base stations
mobile phone data acquisition
Mobile handsets
mobile computing
Mobile communication
k-means clustering algorithm
feature extraction
data acquisition
Cities and towns
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:33pm
MapReduce
threat level
situational understanding
security events
security data mining
security companies
security
scalable multicriteria data clustering
scalable graph clustering algorithms
scalable data summarisation
Prototypes
pattern clustering
parallel algorithms
Open wireless architecture
multicriteria evaluation techniques
MR-TRIAGE workflow
Algorithm design and analysis
large security datasets
large security data sets
Internet attacks
graph theory
Electronic mail
distributed algorithms
Data mining
Computer crime
computational complexity
commodity hardware
Clustering algorithms
Big Data security intelligence applications
Big Data
attack attribution
biblio
A Fuzzy Clustering-Based Credibility Model for Trust Assessment in a Service-Oriented Architecture
Submitted by BrandonB on Thu, 04/30/2015 - 12:53pm
human computer interaction
web services
Web Service
Trusted Computing
trust assessment
trust
Social network services
service-oriented architecture
Robustness
pattern clustering
majority rating
Clustering algorithms
fuzzy set theory
fuzzy clustering
Equations
customer satisfaction
credibility model
Credibility
consumer ratings
consumer credibility
Computational modeling
Communities
« first
‹ previous
1
2
3
4
5
6
7
8
9