Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context
biblio
Impact Analysis based on a Global Hierarchical Object Graph
Submitted by Jamie Presken on Mon, 12/05/2016 - 2:33pm
Abstracts
Apr'15
CMU
Computational modeling
Context
Microwave integrated circuits
Runtime
Syntactics
CMU
Apr'15
biblio
An overview of cloud middleware services for interconnection of healthcare platforms
Submitted by BrandonB on Wed, 05/06/2015 - 2:12pm
middleware
Healthcare
healthcare platform interconnection
heterogeneous devices
IaaS
management problem
medical computing
medical devices
Medical services
health care
PaaS
performance improvement
security
security of data
security problem
Software Architecture
software performance evaluation
standards
cloud technologies
application program interfaces
Big Data
big-data analytics
Biomedical imaging
cloud
Cloud architecture
Cloud Computing
cloud computing middleware services
API
computer architecture
Context
data analysis
Data integration
data sources
delay problem
electronic health records
electronic healthcare register literature
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
service provider ability
service provider integrity
transacting parties
trust
Banking
Cloud Computing
cloud services acquisition
internet
Context
Data protection
digital identity management system
financial institutions
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Ghana
identity abuses
information privacy
interest protection
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
identity abuses
information privacy
interest protection
internet
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
Banking
Cloud Computing
cloud services acquisition
Ghana
Context
service provider ability
service provider integrity
transacting parties
trust
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Data protection
digital identity management system
financial institutions
biblio
Decoupling Identity Resolution from the Maintenance of Identity Information
Submitted by BrandonB on Wed, 05/06/2015 - 1:21pm
Entity Resolution
Synchronization
Robustness
robust information access
quality management
Organizations
maintenance engineering
knowledge based systems
Context
decoupling identity resolution
EIIM model
entity identity structures
batch IR configuration
ER
Erbium
identity information
identity knowledge base
Identity Life Cycle Management
identity management service
IKB
information quality
information retrieval
Interactive Identity Resolution
biblio
Global convergence in digital identity and attribute management: Emerging needs for standardization
Submitted by BrandonB on Wed, 05/06/2015 - 1:17pm
attribute format
attribute management
authentication
authorisation
authorization
Context
data privacy
digital identification
digital identity management
Educational institutions
global convergence
Identity management
privacy
privacy maintaining international framework
standards
biblio
On a Hashing-Based Enhancement of Source Separation Algorithms Over Finite Fields With Network Coding Perspectives
Submitted by BrandonB on Wed, 05/06/2015 - 11:48am
per-symbol encoding
multimedia transmission
network coding
network coding perspective
nonlinear codes
nonlinear encoding
nonlinear message digest
observed mixtures
overhead cost reduction
multimedia networking
relaying linear packet combination
scaling ambiguity
Source separation
source separation algorithm
source signal recovery
throughput maximization
Vectors
video coding
encoding
BSS
channel coding
classical entropy-based separation method
combination coefficient
compressed media sources
Context
Decoding
decoding rate
blind source separation
Entropy
finite fields
Galois fields
hashing-based enhancement
independent component analysis
loss immunity
mixing process
Multimedia communication
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Wed, 05/06/2015 - 10:48am
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Wed, 05/06/2015 - 10:26am
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
biblio
Random Manhattan Indexing
Submitted by BrandonB on Tue, 05/05/2015 - 1:29pm
Mathematical model
Vectors
vector space model
text analysis
sparse Cauchy random projections
RMI
retrieval models
random projection
random Manhattan indexing
natural language text
Computational modeling
Manhattan distance
L1 normed VSM
indexing
Equations
dimensionality reduction technique
dimensionality reduction
data reduction
Context
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »