Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
Connected wireless camera network deployment with visibility coverage
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
NP-hard discrete setting
wireless sensor networks
Wireless Connectivity
Wireless communication
watchman tour problem
visibility coverage
video surveillance
surveillance application
sensor placement
Relays
optimisation
NP-hard geometric setting
2-approximation algorithm
geometric minimum guarding network
connected wireless camera network deployment
Computers
computational complexity
Cameras
camera networks
Buildings
art gallery problem
ART
approximation theory
1536086
biblio
Reliable Stream Scheduling with Minimum Latency for Wireless Sensor Networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
NP-hardness
wireless sensor networks
transmission scheduling
telecommunication scheduling
telecommunication network routing
telecommunication network reliability
synchronisation
stream transmissions
sensor placement
scheduling
routing algorithms
Reliability engineering
Packet loss
optimisation
Algorithm design and analysis
multistream scheduling problem
Monitoring
link burstiness
indoor testbed
indoor radio
frequency distributions
end-to-end reliability requirements
end-to- end latency
data trace
data streams
computational complexity
burst length
1536086
biblio
Verification of Randomized Security Protocols
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
Upper bound
standard cryptographic primitives
sequences
sequence
secret sec
secrecy problem
randomized security protocol Verification
pubcrawl
Protocols
protocol verification
probability
privacy
policy-based collaboration
Complexity theory
nonsatisfiability problem
monadic first order logic
matching lower bound
Indistinguishability
formal logic
encryption
Electronic mail
Cryptographic Protocols
coNEXPTIME
computational complexity
computability
Compositionality
biblio
The Authorization Policy Existence Problem
Submitted by grigby1 on Wed, 05/16/2018 - 1:44pm
Control Theory
Resiliency
Access Control
computational complexity
Computing Theory
fixed-parameter tractability
pubcrawl
resilience
satisfiability
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
Cloud Task Scheduling Based on Swarm Intelligence and Machine Learning
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
Processor scheduling
machine learning algorithm
multicriteria decision
NP-complete problem
operations research
optimisation
optimization
parallel computing
particle swarm optimization
machine learning
pubcrawl
resource allocation
scheduling
scheduling technique
Swarm Intelligence
task makespan minimization
virtual machines
Ant colony optimization
Load management
load balancing scheduling
learning (artificial intelligence)
Honey Bee Optimization
execution time minimization
distributed computing
computational complexity
composability
CloudSim toolkit package
CloudSim
Cloud task scheduling
cloud environments
cloud environment
Cloud Computing
approximation techniques
biblio
Parameter selection for swarm intelligence algorithms \#x2014; Case study on parallel implementation of FSS
Submitted by K_Hooper on Wed, 05/02/2018 - 10:37am
number-of-iterations
swarm intelligence algorithms
Swarm Intelligence
Sociology
Silicon
SI algorithms
search problems
pubcrawl
problem complexity
population size
parameter selection
parallel implementation
optimisation
complex optimization problems
Iterative methods
FSs
Frequency selective surfaces
Fish School Search
Fish
execution time
Correlation
computational intelligence
computational complexity
composability
Complexity theory
biblio
Block RLS algorithm for surveillance video processing based on image sparse representation
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
image representation
video surveillance
Transforms
Training
surveillance video processing
Surveillance video
surveillance
Scalability
Resiliency
pubcrawl
Least squares approximations
image sparse representation
background subtraction
Image reconstruction
Image Processing
Human behavior
dictionary learning
Dictionaries
computational complexity
compressed sensing system
compressed sensing
BRLS algorithm
block recursive least square algorithm
block recursive least square
biblio
A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Submitted by grigby1 on Mon, 03/19/2018 - 1:51pm
Nonlinear distortion
image enhancement
image filtering
limited knowledge
LK
median filtering
median filters
Metrics
noise figure 50 dB to 70 dB
Histograms
PSNR
pubcrawl
resilience
Resiliency
Scalability
Support vector machines
SVM detection
adaptive filtering
histogram stretching
high-dimensional SPAM features
gradient-based pixel-domain attack
gradient methods
gradient estimation
gradient descent methodology
global image manipulations
Forensics
forensic techniques
feature extraction
estimation theory
equalisers
Detectors
computational complexity
adaptive histogram equalization
biblio
Multicore implementation of EME2 AES disk encryption algorithm using OpenMP
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
multicore computing security
standards
Speed up
Software algorithms
Scalability
Resiliency
resilience
pubcrawl
Organizations
multiprocessing systems
Multicore processing
multicore implementation
AES
Multicore Computing
multicore compatible parallel implementation
Metrics
full disk encryption
encryption
Encrypt Mix Encrypt V2 Advanced Encryption Standard
EME2 AES disk encryption algorithm
EME2 AES
Cryptography
computational complexity
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »