Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Towards Emotion-Aware Agents For Negotiation Dialogues
Submitted by aekwall on Fri, 08/26/2022 - 11:05am
Computational modeling
computer architecture
deep learning
Predictive models
pubcrawl
Scalability
Metrics
Human behavior
Decision Making
conversational agents
Adaptation models
affective computing
emotion models
human-agent interaction
negotiation dialogues
outcome prediction
biblio
Artificial Conversational Agent using Robust Adversarial Reinforcement Learning
Submitted by aekwall on Fri, 08/26/2022 - 11:04am
Neural networks
Computational modeling
tools
pubcrawl
Scalability
Metrics
Human behavior
encoding
Reinforcement learning
Manuals
conversational agents
Stochastic processes
conversational agent
Long Short Term Memory (LSTM)
Seq2Seq Model
biblio
An Empathetic Conversational Agent with Attentional Mechanism
Submitted by aekwall on Fri, 08/26/2022 - 11:03am
Computational modeling
social networking (online)
pubcrawl
Scalability
Metrics
Human behavior
Informatics
conversational agents
Context modeling
attention mechanism
depression
empathetic conversational agent
machine translation
mental health
sequence-to-sequence model
biblio
Terminal Security Reinforcement Method based on Graph and Potential Function
Submitted by grigby1 on Fri, 08/26/2022 - 10:08am
security
pubcrawl
Computational modeling
edge computing
Metrics
automation
Computing Theory
security management
biblio
Security Risk Assessment Method of Edge Computing Container Based on Dynamic Game
Submitted by grigby1 on Fri, 08/26/2022 - 10:08am
Adaptation models
security
pubcrawl
Computational modeling
Containers
Games
Metrics
edge computing
reliability theory
security risk assessment
game theory
Nash Equilibrium
Computing Theory
container
feedback Nash equilibrium
biblio
Security Risk Assessment of Information Systems in an Indeterminate Environment
Submitted by grigby1 on Fri, 08/26/2022 - 9:58am
information systems security
uncertainty
tools
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Information systems
Human behavior
Fuzzy Inference Scheme
expert systems
Computational modeling
Bayesian belief network
Bayes methods
biblio
Toward Automated Threat Modeling of Edge Computing Systems
Submitted by grigby1 on Fri, 08/26/2022 - 9:58am
pubcrawl
Analytical models
Automated Threat Modeling
Computational modeling
Data models
Economics
edge computing security
Edge System Modeling
expert systems
Human behavior
Industries
resilience
Resiliency
Scalability
security
Systems modeling
biblio
SATCOM Jamming Resiliency under Non-Uniform Probability of Attacks
Submitted by grigby1 on Fri, 08/26/2022 - 9:48am
Markov processes
Sweeping Jamming Attack
SATCOM Resiliency
Markov Decision Process
greedy algorithms
Computer simulation
Computing Theory
q-learning
Reinforcement learning
pubcrawl
Compositionality
military communication
composability
Computational modeling
Conferences
Resiliency
resilience
biblio
Detection of False Data Injection Attacks Using Cross Wavelet Transform and Machine Learning
Submitted by grigby1 on Fri, 08/12/2022 - 3:35pm
feature extraction
wavelet transforms
wavelet transform
Time-frequency Analysis
Time measurement
state estimation
Smart Grids
Power measurement
machine learning
Computational modeling
false data injection attack
cyber-physical security
Metrics
Resiliency
composability
pubcrawl
command injection attacks
biblio
A Compositional Cost Model for the λ-calculus
Submitted by aekwall on Fri, 08/12/2022 - 2:57pm
Computational modeling
computer science
Games
Semantics
Program processors
Random access memory
pubcrawl
Compositionality
Turing machines
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »