Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Robustness
biblio
Ethos' Deeply Integrated Distributed Types
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
Robustness
type system
type safety
type constraints
Trusted Computing
Semantics
security-sensitive bugs
security
safety-critical software
Safety
runtime-agnostic Ethos
Runtime
deeply integrated distributed types
Protocols
programming languages
program debugging
operating systems (computers)
operating system approach
operating system
multilingual Ethos
Language-theoretic security
language runtime
Kernel
Ethos operating system
biblio
A unified approach to network anomaly detection
Submitted by BrandonB on Tue, 05/05/2015 - 9:32am
Big Data
Computer crime
computer network security
continuous-valued data
Correlation
hidden Markov model
Hidden Markov models
HMM
IP networks
Kalman filters
LDS
linear dynamical system
network anomaly detection
network traffic
Ports (Computers)
Robustness
biblio
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Submitted by BrandonB on Tue, 05/05/2015 - 8:57am
interoperable operations
Servers
security features
seamless integration
Robustness
robust authentication scheme
Resource Observation
resource consuming secure algorithms
physical objects
Payloads
participating entities
authentication
Internet of things environment
Internet of Things (IoT)
Internet of Things
internet
digital world
Cryptography
Conditional Option
computationally complex algorithms
CoAP
authorisation
biblio
Robust security network association adjusted hybrid authentication schema
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
monitoring mechanism
wireless vulnerability situation
wireless network
Wireless Intrusion Prevention System
Wireless Intrusion Detection System
Wireless communication
Wired Equivalent Privacy
weak authentication
telecommunication security
Servers
Robustness
robust security network association
Robust Secure Network
radio networks
Network Access Protection
802.11 standards
message authentication
IEEE standards
IEEE security standard
hybrid authentication schema
extensible authentication protocol
encryption
Cryptography
Communication system security
authorization
authorisation
authentication
accounting mechanism
802.1X framework
biblio
Occlusive vehicle tracking via processing blocks in Markov random field
Submitted by BrandonB on Mon, 05/04/2015 - 2:29pm
Vectors
occlusion phenomenon
occlusive block total energy function
occlusive vehicle tracking
processing blocks
Robustness
spatial correlation
tracking
traffic images
occlusion handling
vehicle contour
Vehicle detection
vehicle motion information
vehicle texture information
vehicle tracking
vehicle video detection
vehicles
video signal processing
Markov processes
background subtraction
clique functions
image motion analysis
Image resolution
image texture
information extraction
Intelligent Transportation Systems
ITS
attribution problem
Markov random field
Markov Random Field (MRF)
Markov random fields
motion coherence
MRF model
object detection
object tracking
occlusion
biblio
A framework of awareness for artificial subjects
Submitted by BrandonB on Mon, 05/04/2015 - 2:29pm
optimisation
Artificial Intelligence
artificial subject awareness
Educational institutions
embedded systems
Engines
environment model
fault tolerant computing
History
Monitoring
Semantics
Predictive models
Robustness
self-awareness
self-healing
self-model
self-optimization
semantic attribution
semantic interpretation
biblio
A Power Mask based audio fingerprint
Submitted by BrandonB on Mon, 05/04/2015 - 12:11pm
1f noise
audio fingerprint
audio signal processing
Bit error rate
Databases
fingerprint bits
music
Music Recognition
noise resistance
Power Mask
Resistance
Robustness
Signal to noise ratio
weight matrix
biblio
Audio fingerprinting to identify TV commercial advertisement in real-noisy environment
Submitted by BrandonB on Mon, 05/04/2015 - 11:49am
Noise
TV commercial advertisement identification
TV
Transforms
Time-frequency Analysis
television broadcasting
Servers
salient audio peak pair fingerprints
Robustness
real-noisy environment
acoustic noise
Fingerprint recognition
feature extraction
Databases
CQT
Constant Q Transform
audio signal processing
audio fingerprinting extraction method
Audio fingerprinting
audio content identification
biblio
An audio fingerprinting system for live version identification using image processing techniques
Submitted by BrandonB on Mon, 05/04/2015 - 11:48am
image processing techniques
Transforms
Time-frequency Analysis
template matching
speech processing
Speech
Spectrogram
smartphone
Robustness
music festival
log-frequency spectrogram
live version identification
image segmentation
adaptive thresholding
Hough transforms
Hough Transform
Hamming similarity
fingerprint identification
Degradation
cover identification
Constant Q Transform
compact fingerprints
audio signal processing
audio fingerprinting system
Audio fingerprinting
adaptive thresholding method
biblio
A general framework for dictionary based audio fingerprinting
Submitted by BrandonB on Mon, 05/04/2015 - 11:29am
greedy algorithms
Time-frequency Analysis
suboptimal greedy algorithm
structured sparsity
Speech
sparse support
Sparse Representation
Robustness
probabilistic distribution
penalized sparse representation problem
Pareto-like continuum
Pareto distribution
Atomic clocks
general framework
fingerprint-based audio recognition system
Fingerprint recognition
fingerprint identification
Entropy
dictionary based audio fingerprinting
Dictionaries
concurrent objectives
audio signal processing
Audio fingerprinting
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »