Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Submitted by grigby1 on Fri, 02/08/2019 - 3:15pm
pubcrawl
heterogeneous data
Human behavior
input logs preprocessing
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
network sensors
Feature Selection
pyspark
Python
python API
Resiliency
security
security of data
Task Analysis
apache spark
feature extraction
data mining techniques
Data mining
data complexity
cybersecurity threats
cybersecurity attacks
cyber security
computational complexity
composability
Complexity theory
big data security analytics
Big Data
artificial intelligence security
Artificial Intelligence
application program interfaces
biblio
Adversarial mRMR against Evasion Attacks
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
security
novel adversary-aware feature selection algorithm
pattern classification
Perfect Knowledge attack scenarios
popular filter algorithms
pubcrawl
Resiliency
robust feature selection algorithms
Scalability
mRMR
security of data
security sensitive applications
Time complexity
Traditional Wrapped Feature Selection algorithm
Training
TWFS
WAFS
wrapped adversarial feature selection algorithm
Feature Selection
adversarial mRMR
adversary attacks
Adversary Models
Classification algorithms
computational complexity
evasion attacks
FAFS
feature extraction
adversarial feature selection
feature selection process
filter model
filtering algorithms
Human behavior
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity
biblio
Signal Reception for Successive Interference Cancellation in NOMA Downlink
Submitted by grigby1 on Mon, 01/21/2019 - 11:34am
adaptive filtering
Channel estimation
computational complexity
matching filter
Metrics
pubcrawl
Resiliency
Scalability
SIC
biblio
A Trace-Based Performance Study of Autoscaling Workloads of Workflows in Datacenters
Submitted by grigby1 on Mon, 12/10/2018 - 10:42am
resources
operational behavior
provisioning policies
pubcrawl
real world traces
resilience
Resiliency
resource allocation
resource management
Monitoring
Scalability
scheduling
simulation
Task Analysis
time related autoscaling complexity metrics
trace based simulation
work factor metrics
allocation policies
memory related autoscaling complexity metrics
Measurement
Human Factors
elasticity metrics
datacenters
datacenter operators
Data models
customer experience
computer centres
computational complexity
Cloud Computing
autoscaling
autoscaler
application domains
Analytical models
biblio
An augmented cubature Kalman filter for nonlinear dynamical systems with random parameters
Submitted by grigby1 on Fri, 09/28/2018 - 2:18pm
Mobile communication
time-of-arrival estimation
time difference of arrival
TDOA measurements
state vector
Resiliency
resilience
random sensor positions
random parameters
pubcrawl
Probability density function
Nonlinear dynamical systems
nominal values
Noise measurement
mobile source localization
augmented cubature Kalman filter
Metrics
Kalman filters
estimation accuracy
estimation
Dynamical Systems
discrete nonlinear dynamical systems
cubature point
Cubature Kalman filter
computational complexity
composability
CKF
Bayesian filtering problem
Bayes methods
augmented system
biblio
Scalable stochastic-computing accelerator for convolutional neural networks
Submitted by grigby1 on Thu, 06/07/2018 - 2:06pm
pubcrawl
Weight parameter retraining
system-on-chip
Stochastic computing
scalable stochastic-computing accelerator
SC-based neural networks
Resiliency
resilience
Recognition accuracy
arrays
Neural Network Resilience
neural nets
convolutional neural networks
convolutional neural network
convolution
ConvNets
computational complexity
Biological neural networks
biblio
PKI Mesh Trust Model Based on Trusted Computing
Submitted by grigby1 on Wed, 05/30/2018 - 2:54pm
Metrics
Trusted Platform Module
Trusted Computing
trust model
Scalability
Robustness
Resiliency
public-key infrastructure
public key infrastructure
public key cryptography
Public key
pubcrawl
PKI Trust Models
PKI mesh trust model
authentication
Mesh networks
Human Factors
Human behavior
Electric breakdown
computer security
computer science
computational complexity
certification path processing
certification authorities
certification
certificate path processing
Bridges
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »