Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Weight measurement
biblio
Multilayer Network Modeling and Stability Analysis of Internet of Battlefield Things
Submitted by grigby1 on Fri, 02/24/2023 - 4:45pm
actuators
multilayer network
coupling weight
Human Factors
Weight measurement
Internet of battlefield things
iobt
Stability criteria
Couplings
pubcrawl
resilience
network topology
stability
Nonhomogeneous media
Scalability
Analytical models
Resiliency
biblio
The Trustworthiness Measurement Model of Component-based Software Based on the Subjective and Objective Weight Allocation Method
Submitted by grigby1 on Wed, 08/03/2022 - 4:13pm
pubcrawl
Conferences
Software
Correlation
composability
Component-Based Software
software reliability
Measurement
trustworthiness
software quality
analytic hierarchy process
Weight measurement
weight
biblio
False Data Injection Attacks in Smart Grid Using Gaussian Mixture Model
Submitted by grigby1 on Thu, 12/02/2021 - 3:20pm
Compositionality
Density measurement
Human behavior
Human Factors
Mathematical model
Power measurement
pubcrawl
resilience
Resiliency
Smart Grids
Smart Grid Sensors
state estimation
Time measurement
Weight measurement
biblio
A Reinforcement Learning-Based Virtual Machine Placement Strategy in Cloud Data Centers
Submitted by grigby1 on Thu, 07/08/2021 - 2:25pm
pubcrawl
Weight measurement
Virtual machining
virtual machine security
virtual machine placement
virtual machine
security
Resiliency
resilience
Reinforcement learning
Cloud Computing
NP-hard problem
High performance computing
Energy Savings.
energy consumption
data centers
Cyber Physical System
Cryptography
composability
cloud data centers
biblio
Research on Sensitivity Audit Scheme of Encrypted Data in Power Business
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Predictive Metrics
informatization construction
known plaintext attacks
plaintext attacks
power business data sensitivity
power engineering computing
Power industry
power production
power system economics
power system security
Frequency measurement
pubcrawl
security demonstration
sensitive data audit
Sensitivity
sensitivity audit scheme
Standard Network Data Security System
standards
transparent encryption
Weight measurement
Data protection
Scalability
Resiliency
Human behavior
Business
ciphertext data
Compositionality
Cryptography
data information
Data models
Security Audits
data resource
Data Security
data security protection
data storage
decryption key
Electricity supply industry
encrypted data
encryption
encryption audits
biblio
A Collaborative Multi-Metric Interface Ranking Scheme for Named Data Networks
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
Weight measurement
Named-Data Networking (NDN)
multimetric robust interface ranking scheme
minimum network delay
maximum satisfaction rate
Interface ranking
forwarding interface modes
Data messages
data forwarding
Content-Centric Networking (CCN)
content sharing
collaborative multimetric interface ranking scheme
content name
Scalability
NDN
named data networking
delays
collaboration
Routing protocols
Mathematical model
internet
Routing
pubcrawl
Human behavior
Resiliency
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
SIMT collaborative filtering algorithm
hybrid collaborative filtering recommendation algorithm
K nearest neighbor recommendation
Matrix decomposition
multiple similarity influence factors
recommedation algorithm
recommendation list
recommender systems
similarity measure
heuristic similarity
trust measure
trust model
trust propagation theory
user trust network
user trust relationship computing model
Weight measurement
Computing Theory and Trust
Conferences
data sparsity
cold start
Compositionality
clustering algorithm
Heuristic algorithms
pattern clustering
collaboration
Clustering algorithms
clustering
Prediction algorithms
collaborative filtering
composability
pubcrawl
nearest neighbour methods
Trusted Computing
biblio
Integrity of a common operating picture in military situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:41pm
Microwave integrated circuits
Wireless communication
Weight measurement
situational awareness information
situational awareness
military situational awareness
military operations
military computing
military command and control
C2
integrity
Decision Making
COP integrity
common operating picture integrity
Common Operating Picture
command and control systems
command and control
Cameras
biblio
Learning to predict subject-line opens for large-scale email marketing
Submitted by BrandonB on Mon, 05/04/2015 - 2:24pm
marketing data processing
Weight measurement
subject-line open rate prediction learning
subject-line keywords
subject line syntax
subject line performance
subject
random forest based model training
Predictive models
Postal services
performance prediction accuracy improvement
open e-mail rates
Accuracy
learning (artificial intelligence)
learning
large-scale e-mail marketing
human editors
feature extraction
Email
Electronic mail
deals
Business
attribution scoring iterative method