Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trees (mathematics)
biblio
An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
parallel processing
faster query execution
high memory footprint
in-memory indexes
K-NN search
MatDot codes
matrix multiplication
model parallelism
model-parallel architecture
MRPT
multiple random projection trees
nearest neighbor estimation
fast k-nearest neighbors
query response time
query time
single compute node
single processing node
storage constraints
storage-optimal MatDot Codes
storage-optimal recovery threshold
straggler and failure tolerance
straggler-prone environment
Systematics
worker nodes
nearest neighbor search
Indexes
Data models
Computational modeling
Big Data
trees (mathematics)
Metrics
Measurement
nearest neighbour methods
data storage
query processing
mathematics computing
pubcrawl
high-dimensional data
Approximation algorithms
approximate nearest neighbor algorithms
candidate points
coded computing
coded matrix multiplication
computation efforts
computation strategy
distributed computing cluster
distributed processing
Euclidean distance calculations
biblio
A Local Integral Hash Nearest Neighbor Algorithm
Submitted by grigby1 on Fri, 05/22/2020 - 2:37pm
Metrics
trees (mathematics)
tree structure
tree data structures
tree based algorithms
search problems
pubcrawl
nearest neighbour methods
nearest neighbor search algorithm
nearest neighbor search
Nearest neighbor algorithm
access tree
Measurement
local integral hash nearest neighbor algorithm
Local integral hash
high dimensional data
fast search algorithm
fast retrieval algorithms
data distribution characteristics
computer image algorithm
hash algorithms
biblio
A Method of Conflict Detection for Security Policy Based on B+ Tree
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
network security
trees (mathematics)
tree data structures
security policy
security
Redundancy
pubcrawl
Protocols
policy-based governance
policy conflict
Policy Based Governance
B+ tree
network management system
Libraries
Indexes
detection algorithms
conflict detection
computer network security
computer network management
Communication networks
collaboration
B+ tree-based security policy conflict detection method
biblio
Towards a Framework for Engineering Smart-Grid-Specific Privacy Requirements
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
pubcrawl
trees (mathematics)
threat tree analysis
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
security of data
security
Scalability
Safety
Resiliency
resilience
collaboration
project-specific refinement
privacy requirements engineering method
privacy
policy-based governance
Metrics
Human Factors
Human behavior
high level privacy requirement
electric system
data privacy
Context
composability
biblio
AvTA Based Assessment of Dependability Considering Recovery After Failures and Attacks on Vulnerabilities
Submitted by grigby1 on Mon, 03/02/2020 - 1:34pm
Software
OR gates
probabilities
probability
pubcrawl
Reliability
resilience
Resiliency
security of data
maintenance engineering
software failures
software fault tolerance
software reliability
SREs
successful recovery events
System recovery
trees (mathematics)
failure analysis
Attack Tree Analysis
availability tree analysis
AvTA models
Building automation system
computer security
criticality oriented analysis
cyber security subtrees
dependability assessment
ATA technique
FMEA
FMECA
Hardware
ICS recovery
IMECA
instrumentation and control system
instrumentation and control systems
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Non-Repudiation and End-to-End Security for Electric-Vehicle Charging
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
composability
cryptographic solution
Cryptography
electric vehicle charging
electric-vehicle-charging ecosystem
GDPR
Human behavior
long-term nonrepudiation end-to-end security
Merkle authentication trees
Metrics
Netherlands
pubcrawl
Repudiation
Resiliency
trees (mathematics)
biblio
Comment Spam Detection via Effective Features Combination
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
Human behavior
Web sites
user experience
trees (mathematics)
spam detection
Scalability
pubcrawl
Metrics
internet
Human Factors
blog spam dataset
gradient boosting tree algorithm
feature extraction
feature combination
Detectors
Decision trees
comment spam detection
boosting
Blogs
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
Oases: An Online Scalable Spam Detection System for Social Networks
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
social communities
DHT based overlay
Distributed databases
load-balancing
malware disseminators
Oases
online scalable spam detection system
progressive aggregation tree
resource allocation
decentralized DHT-based tree overlay deployment
social spam
spam classifiers
spammers
trees (mathematics)
Twitter data
Vegetation
Web-based social networks
Metrics
invasive software
Human behavior
pubcrawl
Routing
Peer-to-peer computing
online social networks
social networking (online)
Twitter
Scalability
pattern classification
internet
unsolicited e-mail
spam detection
Training
community-based opportunities
content polluters
« first
‹ previous
1
2
3
4
5
6
next ›
last »