Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Compressive Detection of Random Signals from Sparsely Corrupted Measurements
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
privacy
testing
Task Analysis
sparsely corrupted measurements
Sparse matrices
sparse error
signal reconstruction
signal processing tasks
signal processing
signal detection problem
signal detection
Resiliency
resilience
random signals
pubcrawl
composability
Noise
Detectors
detection
dense noise
data amount
cyber physical systems
Cyber Physical System
Current measurement
CSP techniques
CS reconstruction
compressive sampling
compressive detection problem
Compressive detection
compressed sensing
biblio
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
service request
preference learning
Processor scheduling
QoS provision
quality of service provision
scheduling
serious security risks
service brokers
service composition
multiagent platform JADE
three-layered trust-enabled service composition model
transaction success rate
trust-based agent learning model
user experience
user experiences
user preference learning
user satisfaction
Computing Theory and Trust
Trust management
Task Analysis
Trusted Computing
mobile computing
learning (artificial intelligence)
pubcrawl
composability
Computational modeling
multi-agent systems
Cloud Computing
fuzzy set theory
quality of service
mobile cloud computing
Compositionality
customers service preferences
fuzzy comprehensive evaluation method
mobile cloud computing environments
multi-agent technology
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
Physical layer
telecommunication security
Task Analysis
Silicon
security
secure physical layer network coding
secure communication
secrecy analysis
Resiliency
resilience
Receivers
pubcrawl
Predictive Metrics
physical layer security
coding theory
noisy channel
noiseless network
Noise measurement
network coding
Metrics
forward error correction
error correction codes
error correction
cyber physical systems
Cryptography
computation and forward
Compositionality
composability
biblio
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
recurrent neural nets
compiler security
understand code style
RNN-based model
optimising compilers
compiler optimization algorithms
CNN-based compiler optimization recognition system
CNN-based compiler optimization level recognition model
closed source compilers
binary security analysis
binary file processing
Compositionality
Semantics
security of data
convolution
Analytical models
convolutional neural nets
optimization
Metrics
pubcrawl
Resiliency
Task Analysis
Software
security
Scalability
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
A comparative analysis of channel coding for molecular communication
Submitted by aekwall on Mon, 11/25/2019 - 2:07pm
cyclic codes
single nanomachine
Silicon
nanomachines
Nanoelectromechanical systems
molecular communication via diffusion
molecular communication (telecommunication)
molecular communication
MCvD
electromagnetic waves
Dogs
Task Analysis
communication via diffusion
Bose-Chaudhuri-Hocquenghem codes
BCH codes
Reed-Solomon codes
channel coding
Metrics
composability
pubcrawl
Resiliency
biblio
Learning Transferable Features For Open-Domain Question Answering
Submitted by aekwall on Mon, 11/25/2019 - 2:01pm
single open-domain QA model
open-domain QA models
open-domain question answering
open-domain Question-Answering models
pattern clustering
pubcrawl
question answering (information retrieval)
Question-Answering
sentence-level QA models
natural language processing
span-level QA benefits
Task Analysis
Training
training corpora
Training data
transfer learning
transferable feature learning
transferable features
domain-specific QA models
Analogies and Transference
clustering algorithm
complementary data
Data models
Deep Networks
domain adaptation approaches
domain-adaptation
domain-specific features
Adaptation models
Human behavior
Human Factors
information retrieval
Knowledge Discovery
learning (artificial intelligence)
Linear programming
natural language
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
next ›
last »