Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Spatial databases
biblio
Comparative Analysis Of Crime Hotspot Detection And Prediction Using Convolutional Neural Network Over Support Vector Machine with Engineered Spatial Features Towards Increase in Classifier Accuracy
Submitted by grigby1 on Thu, 01/05/2023 - 2:21pm
Prediction algorithms
supply vector machines
Novel HDBSCAN Algorithm
Engineered Spatial Features
Crime hotspot
Spatial databases
support vector machine classification
convolutional neural network
support vector machine
Clustering algorithms
feature extraction
Classification algorithms
composability
Resiliency
resilience
Metrics
pubcrawl
machine learning
Support vector machines
biblio
A Differentially Private Task Planning Framework for Spatial Crowdsourcing
Submitted by grigby1 on Fri, 07/29/2022 - 4:49pm
Metrics
outsourced database security
Task Planning
Spatial databases
spatial crowdsourcing
privacy preserving
crowdsourcing
differential privacy
Laplace equations
pubcrawl
Planning
privacy
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
Submitted by grigby1 on Thu, 02/10/2022 - 3:18pm
Spatial databases
Reflective binary codes
Privacy-preserving
Indexes
encryption
encrypted spatial data
data privacy
Boolean range queries
biblio
Practical and Secure Circular Range Search on Private Spatial Data
Submitted by aekwall on Tue, 07/27/2021 - 2:04pm
Computing Theory
privacy
circular range search
cloud server
Computing Theory and Privacy
data privacy
encryption
index privacy
Indexes
pubcrawl
query privacy
Resiliency
search problems
Servers
spatial data
Spatial databases
biblio
A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
indexing
Z-curve
Spatial databases
spatial data
Resiliency
Redundancy
query processing
pubcrawl
privacy protection
Outsourced Database Integrity
Outsourced Database
Metrics
IT costs
indexing scheme
cloud
Indexes
encryption
Database Security
database querying
data redundancy
data privacy
data integrity
data centers
Cryptography
computer centres
composability
Cloud Security
Cloud Computing
biblio
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
stochastic incomplete feedback
nearest neighbor
real-time control
root mean square error
spatial correlation
spatial data recovery scheme
Spatial databases
stochastic data
stochastic feedback data
measurement uncertainty
Stochastic processes
stochastic traffic patterns
System performance
temporal correlation
temporal data recovery scheme
temporal model identification
time-critical traffic patterns
efficient temporal and spatial data recovery
Computational modeling
Correlation
CPS
cyber-physical system
cyber-physical systems
data handling
Data models
data recovery scheme
auto regressive integrated moving average
ETSDR scheme
feedback loss
incomplete feedback data
integral of absolute error
Mathematical model
mean absolute error
mean square error methods
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
The design of cybercrime spatial analysis system
Submitted by BrandonB on Mon, 05/04/2015 - 2:39pm
GIS data-structure
Spatial databases
spatial analysis system
Spatial analysis
security of data
Monitoring
IP tracking technology
IP networks
Internet searching
internet
Analytical models
GIS
geographic information systems
Data models
cybercrime prevention strategy
cybercrime monitoring design
Cybercrime
correlative analysis model
Computer crime
biblio
Authentication of k Nearest Neighbor Query on Road Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:36pm
query processing
Voronoi diagram
visual databases
third-party service provider
spatial query integrity
Spatial databases
Spatial database outsourcing
smart phones
Roads
road networks
road network k-nearest-neighbor query verification technique
Artificial Neural Networks
query authentication
outsourcing
location-based services
k nearest neighbor query
Google Android mobile devices
Generators
Euclidean space
database outsourcing paradigm
computational geometry
authentication
1
2
next ›
last »