Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Modelling and evaluating failures in human-robot teaming using simulation
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
resource management
Work Models that Compute
work factor metrics
Teamwork
team working
team performance
team designers
Task Analysis
space EVA operations
Scalability
robots
robotic capabilities
robot failures
aerospace robotics
Resiliency
resilience
pubcrawl
multi-robot systems
human-robot teams
human-robot teaming
human-robot interaction
fault tolerance
failure evaluation
Extraterrestrial measurements
computational simulation
Computational modeling
biblio
A Trace-Based Performance Study of Autoscaling Workloads of Workflows in Datacenters
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
resources
operational behavior
provisioning policies
pubcrawl
real world traces
resilience
Resiliency
resource allocation
resource management
Monitoring
Scalability
scheduling
simulation
Task Analysis
time related autoscaling complexity metrics
trace based simulation
work factor metrics
allocation policies
memory related autoscaling complexity metrics
Measurement
Human Factors
elasticity metrics
datacenters
datacenter operators
Data models
customer experience
computer centres
computational complexity
Cloud Computing
autoscaling
autoscaler
application domains
Analytical models
biblio
Explainable AI for Designers: A Human-Centered Perspective on Mixed-Initiative Co-Creation
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
learning (artificial intelligence)
XAID framework
xai
visualization
tools
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
Neurons
mixed-initiative co-creation
machine learning
AI machine
Human-computer interaction
human-centered perspective
human-centered approach
human computer interaction
Games
game designers
game design
explainable artificial intelligence
explainable AI for designers
computer games
AI/ML techniques
biblio
“Combat Cloud-Fog” Network Architecture for Internet of Battlefield Things and Load Balancing Technology
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
military computing
Internet of battlefield things
Internet of Things
Internet of Things technology
iobt
load balancing strategy
load balancing technology
Load management
load-balancing
military communication
Internef ot Battlefield Things
pubcrawl
resilience
Resiliency
resource allocation
Scalability
Task Analysis
task response latency
the-Internet-of-Battlefield-Things
Distributed databases
battlefield information
Cloud Computing
combat cloud network
combat cloud- fog network architecture
combat cloud-fog network system
combat-cloud-fog
computer architecture
computing capability
distributed computing load balancing problem
battlefield environment
distributed generalized diffusion strategy
distributed processing
edge computing
edge network equipment close
fog computing layer
fog equipment
fog-computing
Human Factors
biblio
Privacy Preserving in TPA for Secure Cloud by Using Encryption Technique
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
secure cloud
privacy identification
privacy preserving
Protocols
pubcrawl
public auditing
public verifiers
resilience
Resiliency
Metrics
Secure storage
Servers
shared data
software/hardware error
Task Analysis
TPA
VerifyProof
data services
auditing task
Cloud Computing
cloud data
Compositionality
Cryptography
data holders
data integrity
data privacy
auditing
EAP
encryption
encryption audits
Encryption technique
extensible authentication protocol
human error
liberated encryption standard
biblio
Usage of game theory in the internet wide scan
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
internet mass scan
tools
Task Analysis
Scalability
pubcrawl
Network Scanning game
network games
network game
Metrics
masscan
internet wide scan
antagonistic game
internet
information security
Human Factors
honeypot/honeynet systems
Games
game theory
game theoretic security
computer network security
coalition antagonistic
biblio
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks
Submitted by grigby1 on Fri, 10/26/2018 - 4:51pm
real-world data
WSN platforms
wireless sensor networks
turbo codes
Topology
telecommunication network topology
Task Analysis
sophisticated communication mechanisms
simple communication protocols
short range multihop topologies
sensor nodes
security
Scalability
Resiliency
composability
pubcrawlBase stations
pubcrawl
Protocols
multihop wireless sensor networks
multihop extended star topologies
Metrics
forward-error correction schemes
forward error correction paradigm
forward error correction
energy resources
energy consumption
Decoding
computational energy resources
biblio
An evaluation of region based object detection strategies within X-ray baggage security imagery
Submitted by grigby1 on Thu, 06/07/2018 - 3:03pm
security
policy-based governance
Policy-Governed Secure Collaboration
Proposals
pubcrawl
R-CNN/R-FCN variants
region based object detection
resilience
Resiliency
ResNet-101
Policy
sliding window driven CNN approach
SWCNN
Task Analysis
transfer learning
VGG16
Weapons
X-ray baggage security
X-ray baggage security imagery
X-ray imaging
image classification
cluttered X-ray security imagery
collaboration
convolution
cyber physical systems
deep learning
Faster Region-based CNN
feature extraction
first-stage region proposal
Fully Convolutional Networks
class firearm detection problem
ImageNet dataset
learning (artificial intelligence)
Metrics
microsoft windows
neural nets
neural networks security
object class X-ray detection problem
object detection
object localization strategies
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
biblio
Vulnerability detection with deep learning
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
Compositionality
convolution
convolution neural network
deep learning
Human behavior
long short term memory
machine learning
Metrics
Neural networks
pubcrawl
Resiliency
Software
Task Analysis
tools
Training
vulnerability detection
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »