Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
On-line transient stability analysis using high performance computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:08pm
MPI
ultrafast transient stability analysis
Transient Stability
Transient analysis
system dynamics phenomena
SuperLU_MT library
Stability analysis
sparse linear solve
real-time systems
real-time simulation
real-time environment
power system transient stability
power system stability
power engineering computing
parallelization
on-line transient stability analysis
Computational modeling
message passing interface
message passing
local file system
local disk
Large-scale systems
large-scale contingency analysis
input-output bottleneck
high performance computing machine
High performance computing
File systems
ETMSP
EPRI extended transient midterm simulation program
Dynamic security assessment
control center
biblio
A Fuzzy Clustering-Based Credibility Model for Trust Assessment in a Service-Oriented Architecture
Submitted by BrandonB on Thu, 04/30/2015 - 12:53pm
human computer interaction
web services
Web Service
Trusted Computing
trust assessment
trust
Social network services
service-oriented architecture
Robustness
pattern clustering
majority rating
Clustering algorithms
fuzzy set theory
fuzzy clustering
Equations
customer satisfaction
credibility model
Credibility
consumer ratings
consumer credibility
Computational modeling
Communities
biblio
Computing Trust as a Form of Presumptive Reasoning
Submitted by BrandonB on Thu, 04/30/2015 - 12:31pm
presumptive reasoning
Walton argumentation schemes
Trusted Computing
trust schemes
trust model
trust expertise
trust computing
trust
standards
cognition
online communities
Measurement
fuzzy logics
Fuzzy logic
Context
Computational modeling
Communities
biblio
MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:30pm
social links
Mobile handsets
mobile social networks
mobile users
MSN
nonsemantical trust representation
Pragmatics
real-world mobile dataset
security of data
mobile devices
Social network services
social networking (online)
trust
trust graph
Trust models
trust value evaluation
Trusted Computing
Computational modeling
mobile context aware trust model
mobile context
mobile computing
Mobile communication
MobiFuzzyTrust inference mechanism
linguistic terms
graph theory
fuzzy trust inference mechanism
fuzzy set theory
fuzzy reasoning
fuzzy linguistic technique
fuzzy inference
distributed public virtual social spaces
Context modeling
Context
biblio
A model for Human-computer trust: A key contribution for leveraging trustful interactions
Submitted by BrandonB on Thu, 04/30/2015 - 12:29pm
human computer interaction
user trust needs
user perceptions
trustful interaction leveraging
social phenomenon
psychology
participation history
Participation
Interaction design
human-computer trust model
Human-computer trust
human-computer iteration
collaboration
Engagement
Educational institutions
Correlation
Context
Computers
computer-mediated interactions
computer systems
computer science
computer mediated communication
Computational modeling
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Thu, 04/30/2015 - 11:59am
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Computational modeling
covert channels
Lattices
Processor scheduling
secret information
secure information flow
security
security of data
Semantics
Sensitivity
timing
biblio
The Psychology of Security for the Home Computer User
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Phishing
usability and security
Software
security interventions
security decisions
security breaches
security
risky behavior
privacy
Computational modeling
home users
home computer user
Electronic mail
Educational institutions
Computers
computer security
Computer crime
« first
‹ previous
…
66
67
68
69
70
71
72
73
74