Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Algorithms
biblio
.Net library for SMS spam detection using machine learning: A cross platform solution
Submitted by aekwall on Mon, 02/25/2019 - 11:40am
short message service
Net library
online detection
pattern classification
pubcrawl
random forest algorithm
random processes
Scalability
security of data
Metrics
SMS
SMS spam detection
spam dataset classification
spam detection
spam filter
spam messages
tools
unsolicited e-mail
detection
classification
Classification algorithms
clustering
Clustering algorithms
cross platform .Net development
C\#
C\# languages
C\# library
Algorithms
electronic messaging
email spam detection
filtering algorithms
Human behavior
learning (artificial intelligence)
Libraries
machine learning
machine learning algorithms
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
Resiliency
malware
medical computing
Medical Informatics
models
Neoplasms
patient distress
pattern classification
poisoning attacks
pubcrawl
resilience
malicious data
Scalability
security
security breach
security of data
systematic poisoning attacks
targeted errors
Theoretical
Training
training datasets
health care
Algorithms
application domains
arbitrary errors
biomedicine
computer security
critical decisions
Databases
Factual
false diagnosis prompt users
false positive classification
AI Poisoning
health-related applications
Healthcare
Human behavior
Humans
learning (artificial intelligence)
life-threatening consequences
machine learning
machine learning algorithms
machine-learning algorithms
biblio
Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems
Submitted by el_wehby on Sun, 05/27/2018 - 10:13pm
optimization
wireless sensor networks
Wireless communication
WDS monitoring
water supply
water distribution systems
simulations
Robot sensing systems
process monitoring
Pipelines
Algorithms
Monitoring
mobile sensors
mobile sensor networks
Mobile communication
leak detection
leak and backflow detection
Image edge detection
backflow detection
1253968
biblio
Multi-part File Encryption for Electronic Health Records Cloud
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
Algorithms
security
1536086
biblio
Impact of Replacement Policies on Static-Dynamic Query Results Cache in Web Search Engines
Submitted by grigby1 on Mon, 03/26/2018 - 12:54pm
replacement policies
Web search engines
Web search engine companies
Web search engine
Web search
Web Caching
static-dynamic query
static-dynamic cache
search engines
SDC
Scalability
Resiliency
resilience
Algorithms
real large scale query logs
query results cache
query processing
pubcrawl
Metrics
law enforcement
internet
Engines
Companies
Clocks
caching query
cache system
biblio
Never Alone: A Video Agents Based Generative Audio-Visual Installation
Submitted by K_Hooper on Wed, 10/18/2017 - 10:17am
Algorithms
Artificial Intelligence
audio
generative art
Human Factors
installation
media art
pubcrawl
Scalability
Social Agents
video
biblio
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks
Submitted by K_Hooper on Wed, 09/27/2017 - 1:21pm
Ad hoc networks
Algorithms
Human behavior
Intrusion Response
mobile ad-hoc network
OLSR
pubcrawl
Resiliency
scalabilty
biblio
Compressing Graphs and Indexes with Recursive Graph Bisection
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
Algorithms
Approximation algorithms
Compression
Data mining
distributed algorithms
Experimentation
graph algorithms
graph theory
Human behavior
linear arrangement
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
social networks
biblio
Criticality of Response Time in the Usage of Metaheuristics in Industry
Submitted by grigby1 on Fri, 08/18/2017 - 2:08pm
Algorithms
ant algorithms
Ant colony optimization
ant colony system
auto tuning
combinatorial optimization
composability
Compositionality
Decision Making
manufacturing
metaheuristics
pubcrawl
scheduling
steel industry
Swarm Intelligence
« first
‹ previous
1
2
3
4
next ›
last »