Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
Locality-Sensitive Hashing Scheme Based on Heap Sort of Hash Bucket
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
locality-sensitive hashing algorithm
tree searching
tree search method
space complexity
Sorting
Resiliency
query processing
pubcrawl
Pattern recognition
NNS
nearest neighbour methods
nearest neighbor search
nearest neighbor query
machine learning
C2LSH
locality sensitive hashing
Image detection
Heapsort
heap sort of hash bucket algorithm
hash table
Hash functions
hash algorithms
file organisation
data sorting
Cryptography
computational complexity
Compositionality
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
Asymptotically Optimal Pruning for Nonholonomic Nearest-Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
distance evaluations
tree searching
set theory
sampling-based motion planning algorithms
pruning techniques
Path Planning
optimal pruning
nonholonomic constraints
k-d tree algorithm
geodesic distance
explicit distance comparisons
exact Nearest-Neighbor Search
pubcrawl
differential geometry
computationally demanding task
asymptotic properties
asymptotic computational bottleneck
nearest neighbor search
search problems
computational complexity
nearest neighbour methods
Measurement
Metrics
mobile robots
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
biblio
Uncertainty-Aware Opinion Inference Under Adversarial Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
Robustness
Probabilistic logic
probabilistic model
probabilistic soft logic
probability
Probability density function
PSL
pubcrawl
resilience
Resiliency
possible adversarial attacks
security of data
Silicon
Training
uncertain evidence
uncertainty
uncertainty-aware opinion inference
unknown opinions
white box adversarial attacks
White Box Security
data mining tasks
adversarial collective opinion inference
adversarial evidence
black box adversarial attacks
collective subjective logic
composability
Compositionality
computational complexity
CSL
Data mining
Adv-COI
Data models
Decision Making
highly scalable opinion inference
inference mechanisms
learning (artificial intelligence)
logic-rule based structured data
Metrics
minimax techniques
biblio
Enabling Adaptive Deep Neural Networks for Video Surveillance in Distributed Edge Clouds
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video surveillance
two-stage delay-aware graph searching approach
task scheduling
remote clouds
network delay
network cameras
intelligent video surveillance task scheduling problem
input video segment
feature similarity
distributed edge clouds
computing delay
adaptive DNN model selection method
adaptive deep neural networks
NP-hard
Computation offloading
deep neural networks
Cloud Computing
scheduling
edge computing
video signal processing
image segmentation
computational complexity
resource allocation
neural nets
Metrics
graph theory
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »