Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
greedy algorithms
biblio
Development and Analysis of Sparse Spasmodic Sampling Techniques
Submitted by grigby1 on Fri, 04/28/2023 - 11:52am
compressive sampling
Sparse Spasmodic Sampling
Sparse Representation
Electrocardiogram (ECG)
Compressive Sensing Reconstruction
Compressive Sensing acquisition
compressive sensing (CS)
Biomedical measurement
greedy algorithms
Reconstruction algorithms
pubcrawl
compressed sensing
cyber-physical system
simulation
sensors
composability
privacy
Generators
Resiliency
resilience
biblio
SATCOM Jamming Resiliency under Non-Uniform Probability of Attacks
Submitted by grigby1 on Fri, 08/26/2022 - 9:48am
Markov processes
Sweeping Jamming Attack
SATCOM Resiliency
Markov Decision Process
greedy algorithms
Computer simulation
Computing Theory
q-learning
Reinforcement learning
pubcrawl
Compositionality
military communication
composability
Computational modeling
Conferences
Resiliency
resilience
biblio
GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
information distribution scheduling algorithm
data popularity
Distributed cache scheduling
future network architecture
GDGCA
gene driven cache scheduling algorithm
gene driven greedy caching algorithm
ICN edge router
ICN environment
ICN scenario
information centered concept
content cache replacement
information epilepsy
Information Gene
information gene value
information-centric network
optimal simulation model
Poisson data volumes
QoE index
satisfaction degree
self-caching network
user-centered concept
information entropy
Data models
Resiliency
pubcrawl
simulation
internet
resource allocation
telecommunication network routing
Throughput
ICN
Information Centric Networks
Scalability
scheduling
greedy algorithms
Stochastic processes
cache storage
Scheduling algorithms
telecommunication scheduling
information-centric networking
Accurate Poisson stream
cache capacity
Content analysis
biblio
Fast Generation Redispatch Techniques for Automated Remedial Action Schemes
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
IEEE 24-bus system
automated intrusion response
automated remedial action schemes
contingency analysis
fast generation redispatch techniques
fast greedy algorithm
generation cost
generation redispatch
IEEE 118-bus systems
greedy algorithms
online application
online RAS applications
optimal power flow
power system operational security
power system resiliency
power systems resiliency
remedial action scheme
resilience-oriented optimal power flow
Generators
security of data
Resiliency
pubcrawl
composability
internet
optimisation
Mathematical model
Automated Response Actions
cyberattack
power engineering computing
power system security
failure analysis
Load flow
power generation dispatch
power system stability
Linear programming
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
A Hybrid Algorithm for Influence Maximization of Social Networks
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
NP problem
Secure File Sharing
resilience
Resiliency
pubcrawl
wikipedia
voting situation
Time complexity
social networks
social networking (online)
social network
Peer-to-peer computing
optimisation
optimal solution
Big Data
influence maximization
hybrid distribution value accumulation algorithm
Hybrid algorithm
hill climbing
Heuristic algorithms
greedy algorithms
greedy algorithm
Gnutella node-to-node file sharing network
Encyclopedias
dissemination process
dissemination effect
computational complexity
activation effect
biblio
Edge-Based Shortest Path Caching for Location-Based Services
Submitted by grigby1 on Tue, 02/18/2020 - 10:54am
location-based services
Web Caching
tree data structures
shortest route
shortest path queries
Scalability
road network topology
Resiliency
resilience
R-tree-based cache lookup algorithm
querying origin
query processing
path caching services
path caches
path cache
Metrics
pubcrawl
location based-services
location based services
large-scale path query processing
large-scale
historical path results
greedy-based cache construction algorithm
greedy algorithms
graph theory
Google Maps
edge-based shortest path caching
edge-based shortest path cache
edge-based path cache structure
caching services
cache storage
biblio
Exact Sparse Signal Recovery via Orthogonal Matching Pursuit with Prior Information
Submitted by aekwall on Mon, 02/17/2020 - 1:23pm
exact recovery probability
Upper bound
sensing matrix
random matrix
prior information
prior distribution information
orthogonal matching Pursuit algorithm
orthogonal matching pursuit (OMP)
OMP
nonzero entries
Matching pursuit algorithms
linear model
K-sparse signals
greedy algorithms
exact sparse signal recovery
Resiliency
compressed sensing
Closed-form solutions
sensors
signal processing security
gaussian distribution
Indexes
probability
privacy
computer security
Metrics
matrix algebra
Iterative methods
composability
pubcrawl
1
2
next ›
last »