Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Partitioning algorithms
biblio
F-DPC: Fuzzy Neighborhood-Based Density Peak Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:11pm
expandability
neighborhood membership
local density
fuzzy neighborhood-based density peak algorithm
fuzzy neighborhood relationship
fuzzy neighborhood density peak clustering
fuzzy neighborhood
F-DPC
degree of membership
Compositionality
Partitioning algorithms
data objects
Classification algorithms
Heuristic algorithms
pattern clustering
fuzzy set theory
Data mining
clustering
Clustering algorithms
Shape
Robustness
Licenses
pubcrawl
Resiliency
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 1:45pm
load balancing
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
nearest neighbor search
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
Measurement
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
machine learning algorithms
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 4:50pm
Knight’s Tour Matrix
Signal processing algorithms
signal processing
Resiliency
pubcrawl
Partitioning algorithms
n-neighbourhood addition
n-neighborhood addition
Matrix converters
matrix algebra
KT matrix
Knight’s Tour Problem (KTP)
composability
Knight's Tour Problem
knight tour matrix
Image Processing
image encryption
encryption algorithm
encryption
efficient encryption
digital images
cyber physical systems
Cryptography
cover images
biblio
Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
Metrics
skew attacks
sensitive groups
sensitive attacks
Resists
Resiliency
resilience
Publishing
pubcrawl
Privacy Requirements
privacy
personalized protection characteristic
personalized privacy protection
Partitioning algorithms
one size fits all unified privacy protection level
anonymity
Human behavior
homogeneous attacks
faces
enhanced p-sensitive k-anonymity models
enhanced anonymous models
data utility
data publishing
data privacy
Data models
data anonymity
composability
Clustering algorithms
clustering
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
A Study of Big Data Security on a Partitional Clustering Algorithm with Perturbation Technique
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
parallel processing
security of data
security
Scalability
Resiliency
resilience
pubcrawl
privacy preserving
principal component analysis
Precision
perturbation technique
Perturbation methods
PCA
pattern clustering
Partitioning algorithms
partitional clustering algorithm
Accuracy
Metrics
Human behavior
HDFS
Hadoop distributed file system
F-Socre Measure
execution time
Distributed databases
data privacy
Conferences
Clustering Tme
Clustering algorithms
big data security
big data privacy
Big Data
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
Network Intrusion Detection Using Improved Genetic k-means Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
k-means++ algorithm
Training
Time complexity
Resiliency
pubcrawl
Prediction algorithms
personal privacy theft
pattern clustering
Partitioning algorithms
network intrusion detection
network intrusion
Metrics
KDD-99 dataset
KDD-99
Clustering algorithms
intrusion detection system
Intrusion Detection
internet
IGKM algorithm
IGKM
Genetics
genetic k-means algorithm
genetic algorithms
data privacy
computer network security
computer network
composability
biblio
A Swarm Intelligence Approach to Avoid Local Optima in Fuzzy C-Means Clustering
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
pattern clustering
swarm intelligence global optimization method
optimization process
NP-hard
inter-cluster similarity
hill climbing method
fuzzy self-tuning particle swarm optimization
fuzzy clustering task
fuzzy c-means clustering
FST-PSO
clustering analysis
Linear programming
Compositionality
Partitioning algorithms
Task Analysis
computational complexity
fuzzy set theory
Fuzzy logic
Clustering algorithms
particle swarm optimization algorithm
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
pubcrawl
« first
‹ previous
1
2
3
next ›
last »