Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hierarchical Control
biblio
An Intelligent Energy Router for Managing Behind-the-Meter Resources and Assets
Submitted by aekwall on Mon, 05/03/2021 - 12:09pm
Resiliency
pubcrawl
Predictive Metrics
optimization algorithm
DC-coupled systems
energy router
Hierarchical Control
intelligent grid nodes
power electronic interface
Router Systems Security
file
Data-Driven Reinforcement Learning Control of Large CPS Networks using Multi-Stage Hierarchical Decompositions
Submitted by aranya on Thu, 01/16/2020 - 4:02pm. Contributor:
Aranya Chakrabortty
machine learning
Reinforcement learning
Hierarchical Control
power systems
Posters
1931932
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Wed, 05/06/2015 - 8:58am
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Thu, 04/30/2015 - 1:06pm
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness