Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering
biblio
A Clustering-Based Obstacle Segmentation Approach for Urban Environments
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
image segmentation
urban environment
stereo vision
stereo image processing
sensors
robots
recall metric
pubcrawl170111
precision metric
obstacle detection
object detection
KITTI object detection benchmark
autonomous navigation
Image edge detection
hand-labeled image evaluation
disparity map
collision prevention
collision avoidance
clustering-based obstacle segmentation approach
Clustering algorithms
clustering
Cameras
Benchmark testing
biblio
Motion, Captured: An Open Repository for Comparative Movement Studies
Submitted by grigby1 on Tue, 03/07/2017 - 1:04pm
annotation
clustering
community
crowd-sourcing
database
machine-learning
motion capture
movement
open-source
pubcrawl170201
Repository
translation
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 12:02pm
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
biblio
Density Sensitive Hashing
Submitted by BrandonB on Wed, 05/06/2015 - 12:04pm
locality sensitive hashing
Vectors
search problems
random projection
Quantization (signal)
projective function
principal component analysis
Nearest neighbor searches
LSH
Binary codes
high dimensional nearest neighbor search
geometric structure
file organisation
Entropy
DSH
density sensitive hashing
Databases
clustering
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 10:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime
biblio
Terms Mining in Document-Based NoSQL: Response to Unstructured Data
Submitted by BrandonB on Tue, 05/05/2015 - 1:30pm
document-based NoSQL
Viterbi algorithm
unstructured data storage
Unstructured Data Mining
topics mining
text analysis
terms mining
terms
term classification
Semantics
pattern clustering
pattern classification
NoSQL database
NoSQL
analytics-as-a-service framework
document handling
Dictionaries
Databases
database management systems
data mining techniques
Data mining
clustering
Classification algorithms
classification
Big Data
Big Bata
association rules
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 1:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
biblio
Synchrophasor Data Baselining and Mining for Online Monitoring of Dynamic Security Limits
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
security monitoring
power system reliability
power system security
power system stability
power transfer measurement
random forest (RF)
SBSA
SCADA measurements
SCADA systems
seasonal security margins
security
power engineering computing
Stability criteria
synchrophasor
synchrophasor data baselining
synchrophasor-based situational awareness
system interfaces
system reliability
system stress
system visibility
Table lookup
network backbone buses
Baselining
clustering
critical interfaces
Data mining
dynamic security assessment (DSA)
dynamic security limits
look-up tables
medoid clustering
Monitoring
angle shifts
nomograms
online monitoring
PAM clustering
partitioning around medoids (PAM)
pattern clustering
phase-angle differences
phasor measurement
phasor measurement unit (PMU)
Phasor measurement units
biblio
Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
Intelligent Transportation Systems
vehicles
vehicle-to-vehicle/infrastructure
V2X communications
radio access networks
proximity services
Protocols
ProSe
next generation cellular networks
LTE core network
LTE based device-to-device
LTE
Logic gates
ITS
4G mobile communication
dynamic clusters
distributed ProSe architecture
delays
D2D communications
D2D
CVN core network
CVN
Clustering algorithms
clustering
cellular vehicular networks
cellular radio
authorization
advanced 4G networks
« first
‹ previous
1
2
3
4
5
6
7
8