Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
gesture recognition
biblio
NeuronUnityIntegration2.0. A Unity Based Application for Motion Capture and Gesture Recognition
Submitted by aekwall on Mon, 01/27/2020 - 10:19am
Support vector machines
Resiliency
pubcrawl
composability
gesture recognition
Predictive Metrics
motion capture
unity
virtual reality
file
RF Sensing for Sign Language Driven Smart Environments
Submitted by Anonymous on Thu, 01/09/2020 - 6:11pm. Contributors:
Sevgi Gurbuz
Ali Cafer Gurbuz
Chris Crawford
Darrin Griffin
Evie A. Malaia
ASL
radar micro-Doppler
RF sensing
gesture recognition
machine learning
Posters
1932547
1931861
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Forecasting Hand Gestures for Human-Drone Interaction
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Resiliency
pubcrawl
composability
convolutional neural network
early recognition
gesture recognition
human-drone-interaction
Automated Response Actions
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
« first
‹ previous
1
2