Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context
biblio
Tweet Sentiment Analytics with Context Sensitive Tone-Word Lexicon
Submitted by BrandonB on Tue, 05/05/2015 - 12:28pm
opinion polarity mining
word processing
twitter sentiment analytics
tweet sentiment analytics
tone word polarity
text analysis
social networking (online)
sentiment analysis
Semantics
Accuracy
natural language processing
learning (artificial intelligence)
Dictionaries
Data mining
context sensitive tone lexicon learning mechanism
Context
Cameras
biblio
Word Cloud Explorer: Text Analytics Based on Word Clouds
Submitted by BrandonB on Tue, 05/05/2015 - 12:24pm
text analysis
word clouds
word cloud explorer
visualization paradigm
visualization method
visualization
user interfaces
text summarization
text analytics
text analysis tasks
Context
Tag clouds
sophisticated interaction techniques
Pragmatics
natural language processing
Layout
Interaction
data visualisation
context information
biblio
Obtaining Technology Insights from Large and Heterogeneous Document Collections
Submitted by BrandonB on Tue, 05/05/2015 - 12:22pm
information retrieval
topic evolution
text analysis
publications
patents
patenting profiles
mining publications
mining patent databases
Market research
large heterogeneous text collections
insight generation
academic research
indexing
Hidden Markov models
heterogeneous document collections
Data visualization
Data mining
data analysis
Context
automated topical analysis
analyzing research trends
biblio
Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System
Submitted by BrandonB on Tue, 05/05/2015 - 11:41am
IRL metrics
Systems engineering and theory
surveillance
situational awareness
sharing mechanisms
shared maritime situational awareness system
risk assessment
risk analysis
pre-operational validation
operational validation
National security
Measurement
maturity
border control information interactions
Interviews
integration readiness levels
integration readiness level metrics
integration
Information systems
information system integration
Finnish national border control domains
European border control domains
control systems
Context
Buildings
border control information systems
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 11:38am
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 11:31am
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Trust and Big Data: A Roadmap for Research
Submitted by BrandonB on Tue, 05/05/2015 - 8:31am
Big Data
Cloud Computing
computer science
Conferences
Context
Data mining
data-driven approaches
focal issues
FORSEC project
next generation online trust
reputation
reputation-based trust management
security
trust
trust-related data
Trusted Computing
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 7:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control
biblio
AccAuth: Accounting system for OAuth protocol
Submitted by BrandonB on Tue, 05/05/2015 - 7:49am
Context
user-centric accounting model
three-party communication protocol
third party application
standards
service provider
Servers
resource usage monitor
Protocols
protected resource access
OAuth protocol
delegation
AccAuth
computer architecture
Cloud Computing
authorized usage
authorized resource usage
authorization
authorisation
authentication
accounting protocols
accounting process
accounting layer
accounting
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »