Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Dynamic-Feature Extraction, Attribution, and Reconstruction (DEAR) Method for Power System Model Reduction
Submitted by BrandonB on Mon, 05/04/2015 - 2:22pm
IEEE standards
Transient Stability
Rotors
reduced order systems
quasi-nonlinear reduced model
power systems
power system transient stability
power system stability
power system model reduction
power system interconnection
Power system dynamics
power system dynamic stability
orthogonal decomposition
model reduction
and reconstruction method
IEEE standard
Generators
feature extraction
electric generators
dynamic response measurement
dynamic response
dynamic feature extraction
DEAR Method
cost reduction
Computational modeling
computational cost reduction
characteristic generator state variable
attribution
biblio
Multiple-Human Tracking by Iterative Data Association and Detection Update
Submitted by BrandonB on Fri, 05/01/2015 - 9:40am
Iterative methods
video surveillance
Trajectory
tracklet association
tracking
temporal information extraction
Solid modeling
sensor fusion
Reliability
object tracking
multiple-human tracking
Accuracy
iterative data association
Intelligent Transportation Systems
human detection results
feature extraction
detection update
detection responses
Data mining
Data association
Computational modeling
automated video surveillance
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 9:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
biblio
Provenance-aware security risk analysis for hosts and network flows
Submitted by BrandonB on Fri, 05/01/2015 - 8:29am
Computational modeling
computer network security
deep packet inspection
Educational institutions
high risk hosts
high risk network flows
Iterative methods
Monitoring
Ports (Computers)
provenance aware security risk analysis
risk analysis
risk management
risk score
security
biblio
Research on cloud computing complex adaptive agent
Submitted by BrandonB on Fri, 05/01/2015 - 8:12am
Adaptation models
adaptive systems
Business
CAS theoretical framework
Cloud Computing
cloud computing complex adaptive agent
cloud computing environment simulation
cloud computing system
cloud computing technology
complex adaptive system
Complexity theory
Computational modeling
Economics
information technology
multi-agent systems
service agent
biblio
Establishing Theoretical Minimal Sets of Mutants
Submitted by BrandonB on Fri, 05/01/2015 - 8:08am
Minimization
test cases
set theory
redundant mutants
program testing
Mutation testing
mutation score
mutation analysis
mutant set minimization
Benchmark testing
minimisation
minimal mutant sets
Heuristic algorithms
Electronic mail
dynamic subsumption
Context
Computational modeling
biblio
Towards Comprehensive Modeling of Reliability for Smart Grids: Requirements and Challenges
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
power transmission
Vulnerability Analysis
Transmission line measurements
smart power grids
Smart Grids
smart grid reliability
Smart Grid
reliability modeling
Reliability
power transmission lines
Computational modeling
power system reliability
power generation
power engineering computing
power distribution
Markov processes
Markov embedded system model
IEEE-14 bus system
distributed power generation
cyber-physical systems
biblio
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Submitted by BrandonB on Thu, 04/30/2015 - 2:37pm
bilinear pairings
Cloud Computing
Computational modeling
distributed computing
Distributed databases
identity-based cryptography
Indexes
Protocols
provable data possession
security
Servers
biblio
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud
Submitted by BrandonB on Thu, 04/30/2015 - 2:18pm
multiprocessing
vocabularies
security of data
security issue
security
secured distributed OCR system
recognition process
pervasive environment
Pattern recognition
Optical character recognition software
optical character recognition
natural language processing
authentication
mobile environment
mobile computing
Mobile communication
Distributed OCR system
distributed computing technologies
distributed Arabic optical character recognition
Computational modeling
cloud computing technology
Cloud Computing
authentication as a service
« first
‹ previous
…
66
67
68
69
70
71
72
73
74
next ›
last »