Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer games
biblio
Agent based simulation of a payment system for resilience assessments
Submitted by grigby1 on Mon, 12/03/2018 - 12:52pm
Metrics
Swedish payment system
supply chain risk assessment
Supply Chain
Scalability
Resiliency
resilience assessments
resilience
pubcrawl
Petroleum
payment system
Online banking
multi-agent systems
Agent based modeling
gaming simulation approach
gaming simulation
Games
fuel retailing
food retailing
financial data processing
digital simulation
computer games
computer based role playing game
Computational modeling
Analytical models
agent based simulation
biblio
A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication
Submitted by grigby1 on Mon, 11/19/2018 - 11:14am
image authentication
Watermarking
Scalability
Resiliency
resilience
pubcrawl
privacy
positioning data privacy
mobile computing
message authentication
location-based games
Image Processing
augmented reality
Human behavior
Games
data privacy
Cryptography
Computer hacking
computer games
Cloud Computing
cheating scenario problem
authentication
augmented reality cloud gaming
biblio
An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector
Submitted by K_Hooper on Wed, 01/10/2018 - 10:11am
pubcrawl
Human Factors
immersive cyber security awareness learning platform
immersive systems
Industries
industry requirement
learning management system
paper-based training
Personnel
potential attackers
human factor
rapid digitalisation
Resiliency
secured interaction
security breaches
security of data
Systematic Requirement Engineering
threat analysis
Training
gamification elements
composability
computer games
computer science education
computer security
cyber-attacks
cyber security awareness
cyber security program
E-Learning
Gamification
Companies
Hospitality
hospitality businesses
hospitality employees
hospitality industry
hospitality sector
hotel industry
Human behavior
human error
biblio
An ensemble model with hierarchical decomposition and aggregation for highly scalable and robust classification
Submitted by grigby1 on Thu, 12/28/2017 - 12:17pm
highly scalable classification
Xgboost
Training
sub-model training
sub-model integration
regression analysis
pubcrawl
Predictive models
pattern classification
model decomposition
Metrics
machine learning
Logistics
logistic regression
learning (artificial intelligence)
binary classification problem
Hearthstone
game state information
flexible robust scheme
feature extraction
extreme gradient boosted decision trees
ensemble model
deep learning
decomposition
Decision trees
Data models
computer games
computer game
Computational modeling
Compositionality
biblio
Evaluating Physical Movement As Trigger for Transitioning Between Environments in Virtual Reality
Submitted by grigby1 on Thu, 05/18/2017 - 2:05pm
computer games
design
digital media
Metrics
pubcrawl
Resiliency
Scalability
virtual reality
work factor metrics
biblio
Profiling of automobile drivers using car games
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
driving log generation
vehicle data
User profiling
traffic engineering computing
Simulator
pubcrawl170115
Part profiles
keystroke identification
Gears
gaming
Games
Acceleration
driving characteristics
digital simulation
Computers
computer games
Computational modeling
car games
biometrics
behavioral patterns
automobiles
automobile driver profiling
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
biblio
Managing shared contexts in distributed multi-player game systems
Submitted by BrandonB on Wed, 05/06/2015 - 1:17pm
Protocols
war games
SINS
Silicon compounds
shared context mapping
Semantics
security of data
secure infrastructure for networked systems
reliable middleware framework
Receivers
real-time systems
anonymous publish-subscribe
network losses-delay
multiplayer maze game
middleware
message passing
Lamport Paxos protocol
Irrigation
distributed transactional key-value store
distributed multiplayer game systems
delays
computer games
biblio
DeepQA Jeopardy! Gamification: A Machine-Learning Perspective
Submitted by BrandonB on Tue, 05/05/2015 - 12:29pm
real-world business problems
Newton-Raphson logistic regression
NLP algorithms
NLP question-and-answer system
nongame play
Pattern recognition
Pipelines
positive-to-negative ratio
question answering (information retrieval)
question-and-answer pairs
natural language processing (NLP)
regularization term
Structured Data
text analysis
Training
training instances
true-false labels
Unstructured Data
Watson gamification
Watson machine-learning pipelines
Games
algorithm engineering
business data processing
business domain
computer games
configuration settings
data engineering techniques
DeepQA Jeopardy! gamification
domain gamification
extreme class imbalance
Accuracy
Gamification
ingested corpus sets
large-scale natural language processing question-and-answer system
learning (artificial intelligence)
Logistics
machine learning
machine learning algorithms
machine-learning process
natural language processing
biblio
Synthesizing perception based on analysis of cyber attack environments
Submitted by BrandonB on Tue, 05/05/2015 - 11:40am
Equations
Vulnerability
vulnerabilities types
toxicity metrics
social aspects of automation
perception synthesis
offensive activities
Measurement
India CTF
InCTF characteristics
Hacking
hackers
Games
framework
adversory behavior
defensive activities
Cyber situational awreness
cyber situational awareness
cyber intensive games
cyber attack intensity
cyber attack environments
cyber attack aggression
Computer hacking
computer games
Computer crime
assets protection
analytic hierarchy process
« first
‹ previous
1
2
3
next ›
last »