Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information retrieval
biblio
A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
file content
wildcard SE construction
storage management
security proxy
searchable encryption
Resiliency
resilience
pubcrawl
potential storage solution
on-premises storage
local malicious staff
local index
information retrieval
Indexes
index database
Amazon S3
enterprises
encryption
efficient wildcard searchable encryption
efficient encryption
database indexing
Cryptography
constantly small storage footprint
composability
cloud storage backends
cloud storage
cloud databases
Cloud Computing
Buildings
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
Cross Domain Regularization for Neural Ranking Models Using Adversarial Learning
Submitted by grigby1 on Wed, 05/01/2019 - 11:27am
adversarial learning
deep learning
Generative Adversarial Learning
information retrieval
Metrics
pubcrawl
Resiliency
Scalability
biblio
Towards Data-driven Vulnerability Prediction for Requirements
Submitted by aekwall on Mon, 03/04/2019 - 10:50am
Resiliency
pubcrawl
composability
information retrieval
software requirements
software security
Software Vulnerability
Traceability
Vulnerability prediction
Automated Secure Software Engineering
biblio
Method of Textual Information Authorship Analysis Based on Stylometry
Submitted by grigby1 on Fri, 02/22/2019 - 4:02pm
natural language processing
Ukrainian scientific texts
textual information authorship analysis
text content monitoring
text analysis
stylometry technologies usage
stylometry
stop words
statistical linguistic analysis
reference text fragment
Radio frequency
pubcrawl
Porter stemming algorithm (Porter stemmer)
Porter stemmer
NLP methods
author publications
Monitoring
Metrics
linguometry
Linguistics
linguistic analysis
information retrieval
Indexes
Human behavior
glottochronology
formal approach
Dictionaries
Correlation
Content analysis
computational linguistics
biblio
MM: A New Framework for Multidimensional Evaluation of Search Engines
Submitted by grigby1 on Fri, 02/08/2019 - 4:36pm
composability
cyber physical systems
information retrieval
multidimensional search
pubcrawl
readability
resilience
Resiliency
retrieval evaluation
trustworthiness
Trustworthy Systems
understandability
biblio
Enhancing Sampling and Counting Method for Audio Retrieval with Time-Stretch Resistance
Submitted by grigby1 on Mon, 01/21/2019 - 12:27pm
LSH
turning point alignment method
Turning
time-stretch resistance
time-stretch
state-of-the-art methods
state-of-the-art audio retrieval method
Sampling and Counting Method
retrieval performance
Resists
Resistance
Resiliency
pubcrawl
Philips-like fingerprints
noise distortions
massive audio dataset
Acoustic Fingerprints
information retrieval
Indexes
ideal audio retrieval method
Human behavior
Fingerprint recognition
fingerprint matching
Filtering
distortion
composability
audio track
audio signal processing
audio retrieval
audio fingerprint
Acoustic signal processing
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
biblio
Approximate nearest neighbors by deep hashing on large-scale search: Comparison of representations and retrieval performance
Submitted by grigby1 on Mon, 06/11/2018 - 3:42pm
large-scale search
search problems
retrieval performance
representation performance
query processing
pubcrawl
nearest neighbour methods
nearest neighbor search
nearest neighbor approximation
Metrics
Measurement
approximate nearest neighbor search algorithms
information retrieval
high-dimensional datasets
hashing techniques
feedforward neural nets
deep hashing
data structures
data representation
convolutional neural network
convolution
CNN feature
biblio
Research on an Agent-Based Intelligent Social Tagging Recommendation System
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personalized recommendation
user interest mining
tagging
social tagging users
social tagging recommendation
social networking (online)
Social Agents
Servers
self-adaptive recommendation strategy
self-adaptive recommendation
Scalability
resource management
recommender systems
pubcrawl
personalized recommendation strategy
Adaptation models
multi-agent systems
intelligent social tagging recommendation system
information retrieval
Human Factors
Human behavior
Filtering
equilibrium selection
Data models
Data mining
computer architecture
common preference group recommendation strategy
common preference group recommendation
Agent technology
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »