Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
iterative process
biblio
Tackling Actuator Saturation in Fixed Point Iteration-based Adaptive Control
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
nonlinear control systems
van der Pol oscillator
saturated control system
relaxation oscillators
nominal trajectory
Lyapunov function-based approach
FPIAC control
fixed point iteration-based adaptive control
Fixed Point Iteration
control design methods
Banach Space
Anti-windup
adaptive control
actuator saturation
Resiliency
actuator security
controller design
control system synthesis
iterative process
Lyapunov methods
actuators
dynamic system
Metrics
Iterative methods
composability
pubcrawl
Human behavior
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
APDPk-Means: A New Differential Privacy Clustering Algorithm Based on Arithmetic Progression Privacy Budget Allocation
Submitted by aekwall on Mon, 01/06/2020 - 10:36am
k-means algorithm
Sensitivity
security of data
Scalability
resource management
Resiliency
pubcrawl
privacy protection
privacy budgets
privacy budget allocation
privacy
pattern clustering
optimisation
network information security
network data mining
APDPk-means
iterative process
Iterative methods
Human behavior
differential privacy k-means
differential privacy clustering algorithm
differential privacy
Data protection
Data mining
data clustering
composability
Clustering algorithms
Big Data
arithmetic progression privacy budget allocation