Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimization
biblio
A Two-Stage Genetic Programming Hyper-Heuristic for Uncertain Capacitated Arc Routing Problem
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
poor routing policies
vehicle routing
UCARP
Two-Stage GPHH
two-stage genetic programming hyper-heuristic
TS-GPHH
Task Analysis
Statistics
Sociology
single-objective GPHH
search problems
routing policy
Routing
Robustness
pubcrawl
complex uncertain capacitated arc routing problem
optimization
MultiObjective GP
multi-objective.
MOGP
interpretable routing policies
human trust
Human behavior
graph theory
GPHH
GP-evolved routing policies
genetic algorithms
effective routing policies
Complexity theory
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
Heterogeneity Aware Workload Management in Distributed Sustainable Datacenters
Submitted by aekwall on Mon, 11/30/2020 - 12:02pm
holistic heterogeneity-aware cloud workload management approach
dynamic power availability
flexible batch job management approach
flexible batch job manager
green computing
green energy
green power availability
green power supply
Green products
heterogeneity
heterogeneity aware workload management
heterogeneity-oblivious approach
heterogeneous workloads
distributed sustainable datacenters
Internet service operators
Internet-scale services
job migration
large-scale data analytics
real-world weather conditions
sCloud
Sustainable datacenter
system goodput
transactional workload placement
workload placement
workload traces
Internet-scale Computing Security
computer centres
Task Analysis
power aware computing
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
sustainable development
quality of service
constrained optimization problem
scheduling
Cloud Computing
QoS requirements
nonlinear programming
Power supplies
System performance
policy governance
batch job migration algorithm
brown energy
clouds
datacenter power consumption
distributed datacenters
distributed self-sustainable datacenters
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
parallel optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
asynchronous parallel surrogate optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
Adaptation models
uncertainty handling
parallel algorithms
approximation theory
inference mechanisms
ensemble model
optimisation
Load modeling
Stochastic processes
Computational modeling
Scalability
optimization
Resiliency
resilience
pubcrawl
Predictive models
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
Lifetime Analysis of Underwater Wireless Networks Concerning Privacy with Energy Harvesting and Compressive Sensing
Submitted by aekwall on Mon, 10/26/2020 - 12:03pm
lifetime analysis
underwater acoustic communication
energy harvesting
compressive sensing
civil operations
classical wireless sensor networks
improved network lifetime
integrated limited batteries
invasion detection
lifetime
compressed sensing
listening
mixed integer programming model
novel encryption decision method
silent positioning
underwater life monitoring
underwater sensor nodes
Underwater Wireless Networks
Location Privacy in Wireless Networks
energy conservation
encryption
data privacy
Resiliency
Human behavior
pubcrawl
batteries
wireless sensor networks
privacy
Cryptography
telecommunication power management
Metrics
optimization
Energy Efficiency
military operations
Compositionality
integer programming
UWSN
biblio
Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels
Submitted by willirn1 on Thu, 10/22/2020 - 11:02am
Monitoring, Fusion, and Response for Cyber Resilience
surrogate models
sensitivity analysis
security models
Metrics
metamodels
KU
Human behavior
emulators
reliability models
optimization
Uncertainty Quantification
Human Behavior
Metrics
KU
Monitoring, Fusion, and Response for Cyber Resilience
2020: October
biblio
Trust-Region Minimization Algorithm for Training Responses (TRMinATR): The Rise of Machine Learning Techniques
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
Scalability
Neural networks
Newton method
nonconvex functions
optimisation
optimization
pubcrawl
Quasi-Newton methods
resilience
Resiliency
memory storage
security
Signal processing algorithms
storage management
Training
training responses
TRMinATR
Trust-region methods
trust-region minimization algorithm
Hessian matrices
computational complexity
computer architecture
computer theory
deep learning
Europe
gradient descent methods
gradient methods
Hessian approximations
approximation theory
Hessian matrix inversion
Human Factors
learning (artificial intelligence)
limited memory BFGS quasiNewton method
Limited-memory BFGS
Line-search methods
machine learning
matrix inversion
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »