Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Clustering algorithms
biblio
Fuzzy clustering of incomplete data based on missing attribute interval size
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
interval data set
TICI data set
standards
similar object cluster identification
pubcrawl170107
Prototypes
pattern clustering
nearest neighbor rule
missing attribute interval size
Iris
Interval size
interval median
Algorithm design and analysis
incomplete data clustering
Incomplete Data
fuzzy set theory
fuzzy clustering
fuzzy c-means algorithm
Fuzzy C-Means
data structures
data handling
Clustering algorithms
Breast
biblio
Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
Intelligent Transportation Systems
vehicles
vehicle-to-vehicle/infrastructure
V2X communications
radio access networks
proximity services
Protocols
ProSe
next generation cellular networks
LTE core network
LTE based device-to-device
LTE
Logic gates
ITS
4G mobile communication
dynamic clusters
distributed ProSe architecture
delays
D2D communications
D2D
CVN core network
CVN
Clustering algorithms
clustering
cellular vehicular networks
cellular radio
authorization
advanced 4G networks
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:33pm
MapReduce
threat level
situational understanding
security events
security data mining
security companies
security
scalable multicriteria data clustering
scalable graph clustering algorithms
scalable data summarisation
Prototypes
pattern clustering
parallel algorithms
Open wireless architecture
multicriteria evaluation techniques
MR-TRIAGE workflow
Algorithm design and analysis
large security datasets
large security data sets
Internet attacks
graph theory
Electronic mail
distributed algorithms
Data mining
Computer crime
computational complexity
commodity hardware
Clustering algorithms
Big Data security intelligence applications
Big Data
attack attribution
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
A Fuzzy Clustering-Based Credibility Model for Trust Assessment in a Service-Oriented Architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:53pm
human computer interaction
web services
Web Service
Trusted Computing
trust assessment
trust
Social network services
service-oriented architecture
Robustness
pattern clustering
majority rating
Clustering algorithms
fuzzy set theory
fuzzy clustering
Equations
customer satisfaction
credibility model
Credibility
consumer ratings
consumer credibility
Computational modeling
Communities
« first
‹ previous
…
6
7
8
9
10
11
12
13
14