Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational geometry
biblio
Resilient Vector Consensus in Multi-Agent Networks Using Centerpoints
Submitted by aekwall on Tue, 07/27/2021 - 2:12pm
Computing Theory
resilience
Approximation algorithms
centerpoint
composability
Compositionality
computational geometry
computer science
Computing Theory and Resilience
convergence
fault tolerant networks
Partitioning algorithms
pubcrawl
resilient consensus
Robustness
Two dimensional displays
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
energy conservation
wireless sensor networks
voronoi diagram paradigm
Voronoi diagram
sensed data
secure data exchange
Resiliency
pubcrawl
providing security
Protocols
military surveillance
environmental monitoring
energy efficient encryption
energy consumption
Aggregation
encryption
efficient encryption
Decryption Technique
decryption
DEAVD protocol compresses data
data encryption
data communication
data aggregation
cyber physical systems
Cryptography
Cryptographic Protocols
computational geometry
composability
biblio
Standardization of Gram Matrix for Improved 3D Neural Style Transfer
Submitted by grigby1 on Fri, 12/11/2020 - 2:53pm
Solid modeling
Metrics
neural net architecture
neural style transfer
pubcrawl
resilience
Resiliency
Scalability
Shape
Mathematical model
standardization
standardized Gram matrix based loss function
stereo image processing
style similarity
Three-dimensional displays
Two dimensional displays
voxel
2D binary monochromatic images
learning (artificial intelligence)
image representation
image colour analysis
Image color analysis
image classification
convolutional neural network architecture
convolutional neural nets
computational geometry
color information
classifier network training
binary models
binary 3D voxel representation
3D voxelized objects
3D neural style transfer
3D geometries
biblio
Multimodal Biometrics Feature Level Fusion for Iris and Hand Geometry Using Chaos-based Encryption Technique
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
computational geometry
physiological attributes
pattern recognition system
Multimodal system
multimodal biometrics feature level fusion
morphological operations
Moments
matching process
iris features
Iris
image fusion
hand geometry features
Hand geometry
genuine acceptance rate
false rejection rate
false acceptance rate
Cryptography
chaos-based encryption technique
Chaos encryption
behavioral attributes
multimodal biometric system
biometric encryption
Iris recognition
image matching
feature extraction
resilience
chaos
Scalability
Resiliency
Metrics
pubcrawl
biblio
Symmetric Eigen-Wavefunctions of Quantum Dot Bound States Resulting from Geometric Confinement
Submitted by grigby1 on Tue, 12/17/2019 - 12:31pm
privacy
wave functions
symmetry
symmetric properties
Symmetric matrices
symmetric eigen-wavefunctions
Strain
Shape
semiconductor quantum dots
Resiliency
resilience
Quantum dots
quantum dot symmetry related effects
quantum dot shapes
quantum dot bound states
pubcrawl
bound states
intrinsic geometric symmetry
group theory
group representation theory
geometric confinement
finite element analysis
Ellipsoids
Eigenvalues and eigenfunctions
cyber-physical systems
cyber-physical system
Crystals
crystal structure
crystal periodic structure
confinement
computational geometry
composability
biblio
Towards a theory of free-lunch privacy in cyber-physical systems
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Human behavior
Smart homes
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy
optimization
multiparametric programming
mathematical programming
human factor
computational geometry
Heating systems
free-lunch privacy mechanism
Decision Making
data-informed decision making processes
data utility
Data protection
data privacy protection
data privacy
cyber-physical systems
Computing Theory
biblio
Parallel Algorithms for Constructing Range and Nearest-Neighbor Searching Data Structures
Submitted by grigby1 on Wed, 08/02/2017 - 1:28pm
computational geometry
data structures
MapReduce
Metrics
nearest neighbor search
nearest-neighbor search
pubcrawl
range search
sampling
biblio
A new mesh simplification algorithm based on quadric error metric
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
Measurement
vertices geometric information
triangular mesh
solid modelling
real-time interactive problem
quadric error metric
pubcrawl170111
mesh simplification algorithm
mesh simplification
3D image processing
Image Processing
Image edge detection
equilateral triangles
Computer graphics
Computational modeling
computational geometry
Approximation algorithms
Algorithm design and analysis
biblio
The HCI Stereo Metrics: Geometry-Aware Performance Analysis of Stereo Algorithms
Submitted by grigby1 on Wed, 03/08/2017 - 2:03pm
multidimensional performance evaluation
surface smoothness
Surface reconstruction
stereo image processing
stereo algorithms
stacked bar charts
semantic cues
root mean squared error
radar charts
pubcrawl170111
planar surfaces
performance evaluation
object detection
Algorithm design and analysis
Middlebury dataset
mean square error methods
human computer interaction
HCI stereo metrics
ground truth disparity maps
geometry-aware performance analysis
fine geometric structures
edge fattening
depth discontinuities
computational geometry
Benchmark testing
biblio
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
Cuboid
system security
smart cards
Smart card
Servers
remote login password authentication scheme
password
One way function
Fingerprint recognition
cuboid diagonal
3-D geometry
Computers
computational geometry
Bismuth
biometrics (access control)
biometric value
authorisation
authentication
3D environment
1
2
next ›
last »