Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hashing
biblio
A Security Architecture for Cloud Data Using Hybrid Security Scheme
Submitted by grigby1 on Fri, 07/14/2023 - 10:49am
Compositionality
encryption audits
ECC DNA
data integrity
Resiliency
cloud storage
DNA
hashing
Systematics
computer architecture
Data Security
privacy
resilience
Metrics
pubcrawl
Organizations
Cloud Computing
encryption
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
biblio
USB Flash Drives Forensic Analysis to Detect Crown Jewel Data Breach in PT. XYZ (Coffee Shop Retail - Case Study)
Submitted by grigby1 on Wed, 06/08/2022 - 10:20am
Universal Serial Bus
USB Flash Drives
retail
Recipe
Crown Jewel
Credit Card Data
credentials
forensic
Information filters
Imaging
intellectual property security
pubcrawl
Media
hashing
intellectual property
Data Breach
composability
Companies
Access Control
Resiliency
resilience
policy-based governance
biblio
Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing
Submitted by aekwall on Wed, 07/07/2021 - 4:56pm
Task Analysis
Reliability
surveillance
hashing
information sharing
Law
social networking (online)
Steganography
TV
video recording
Video Security
video surveillance
pubcrawl
Metrics
Resiliency
Human behavior
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 12:08pm
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
biblio
Unit Regression Test Selection According To Different Hashing Algorithms
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Layout
hash algorithms
unit regression test selection
Testing process
regression test selection
in-depth review
hashing algorithms
hashing
resource usage
Manuals
security
Compositionality
regression analysis
testing
program testing
Force
Synchronization
pubcrawl
Resiliency
Software
biblio
Indexing in k-Nearest Neighbor Graph by Hash-Based Hill-Climbing
Submitted by grigby1 on Fri, 05/22/2020 - 2:25pm
file organisation
nearest neighbor search
vector quantization
Upper bound
SIFT1M datasets
query assignment process
nearest neighbor graph
k-nearest neighbor graph
Inverted index
indexing
hill-climbing
hashing-based seed generation
hashing
hash-based hill-climbing
GIST1M datasets
pubcrawl
Euclidean distance
Binary codes
approximation theory
approximate nearest neighbor search
query processing
Clustering algorithms
principal component analysis
graph theory
Acceleration
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
biblio
Deep Semantic Hashing with Generative Adversarial Networks
Submitted by grigby1 on Mon, 11/19/2018 - 12:23pm
CNN
GANs
Generative Adversarial Learning
hashing
Metrics
pubcrawl
resilience
Resiliency
Scalability
similarity learning
biblio
Fast K-means for Large Scale Clustering
Submitted by grigby1 on Mon, 06/11/2018 - 3:44pm
clustering
hashing
k-means
Measurement
Metrics
nearest neighbor search
pubcrawl
1
2
next ›
last »