Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
inference mechanisms
biblio
Identifying Personal DNA Methylation Profiles by Genotype Inference
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
whole-genome sequencing
Resiliency
pubcrawl
privacy-sensitive data
privacy
predictive medicine
personalized medicine
personal DNA methylation profiles
Metrics
medical computing
Law
inference mechanisms
human health
bioinformatics
health care
genotype inference
genomics
genomic data
epigenetic element
DNA methylation data
DNA cryptography
DNA
data privacy
Cryptography
cryptographic scheme
Cancer
biomedical research community
biblio
Intelligent system of knowledge control with the natural language user interface
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Semantics
natural language interfaces
natural language processing
Natural languages
natural language user interface
output machine
parallel computations
parallel method
pubcrawl
Resiliency
Scalability
semantic analysis
natural language interface methods
semantic structures
Skolem-transformation
specialized inference machines
specialized module
standard knowledge
syntactic analysis
testing
test systems
Training
training systems
user interfaces
knowledge base
control systems
deductive inference
first-order predicate calculus
Human behavior
human-computer dialogue capabilities
inference machine
inference mechanisms
intellectual subsystem
intelligence
intelligent interpreter
intelligent system
Computers
knowledge based systems
knowledge control
knowledge processing systems
Knowledge quality control
Knowledge representation
lexical processor
machine testing systems
modern control
morphological analysis
natural language interface
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
biblio
A Collective, Probabilistic Approach to Schema Mapping
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
metadata
uncertainty handling
schema mapping optimization problem
Scalability
Resiliency
pubcrawl
probability
probabilistic reasoning techniques
probabilistic reasoning
Probabilistic logic
optimization
metadata-only approaches
Metadata Discovery Problem
metadata constraints
CMD
meta data
mapping selection
inference mechanisms
data structures
Data mining
Data engineering
Conferences
Compositionality
Companies
collective probabilistic schema mapping approach
collective mapping discovery
cognition
biblio
"Reconstruction-free inference on compressive measurements"
Submitted by grigby1 on Tue, 02/21/2017 - 1:10pm
Image reconstruction
SWIR
subNyquist sampling rates
SPC
spatial-multiplexing cameras
single-pixel camera
signal-to-noise ratios
short-wave infrared region
reconstruction-free inference
pubcrawl170104
pseudorandom spatial masks
nonlinear feature extraction
inference mechanisms
imaging devices
action recognition
Image coding
high-level visual inference problems
high-dimensional signals
feature extraction
face recognition
Face
Databases
correlational features
Correlation
compressive measurements
compressive cameras
coded measurements
Cameras
biblio
Verification of DNSsec Delegation Signatures
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
interactive theorem prover
Theorem Proving
Servers
security protocol verification
Public key
Protocols
model checking analysis
Isabelle/HOL
Isabelle-HOL
IP networks
internet
authentication
inference mechanisms
inductive approach
formal verification
DNSsec protocol
DNSsec delegation signatures
DNSsec
delegation signatures
Cryptographic Protocols
chain of trust
biblio
A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 8:57am
MANETs Security Issues
wireless links
security of data
Routing
Reliability engineering
Qualnet simulator 6.1
packet dropping attack
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
mobile ad hoc network
Ad hoc networks
MANET
Mamdani fuzzy inference system
malicious nodes
Intrusion Detection System (IDS)
intrusion detection system
inference mechanisms
Fuzzy sets
Fuzzy logic
data packets
Artificial Intelligence
biblio
Flow-based conflict detection in OpenFlow networks using first-order logic
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
Internet architecture
unreachable flows
transport protocols
Proposals
OpenFlow network architecture
OpenFlow controller
network elements
network devices
Media Access Protocol
management plane
knowledge based systems
IP networks
centralization architecture
inference mechanisms
inference engine
Indexes
flow-based conflict detection
first-order logic
control systems
control plane
computer network management
Clean Slate initiative
centralized controller
biblio
Evaluation of Bayesian and Dempster-Shafer approaches to fusion of video surveillance information
Submitted by BrandonB on Fri, 05/01/2015 - 9:39am
Kelly betting strategy
video surveillance information fusion
video surveillance
vehicles
vehicle reidentification
vehicle
uncertainty
traffic engineering computing
statistical parametric fusion methods
Shape
road vehicles
probability
probabilistic estimates
Mathematical model
Accuracy
inference mechanisms
fusion
evaluation
Dempster-Shafer method
Dempster-Shafer approach
Dempster-Shafer
Color
belief networks
Bayesian networks
Bayesian fusion approach
Bayesian
Bayes methods
« first
‹ previous
1
2
3
4
5