Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Accuracy
biblio
Improve Iot Security System Of Smart-Home By Using Support Vector Machine
Submitted by aekwall on Mon, 01/27/2020 - 9:19am
Accuracy
windows (construction)
Windows
support vector machine algorithm
smart-home system
Network
motors
Internet of Things security system
human resources preservation
human resource management
electrical products control
electric motors
doors
domestic safety
civil engineering computing
building occupants safety
security
Predictive Metrics
Switches
self-learning
Unsupervised Learning
Design engineering
Databases
composability
pubcrawl
Resiliency
machine learning
support vector machine
Support vector machines
machine learning algorithms
Internet of Things
Monitoring
biblio
Network Behavioral Features for Detecting Remote Access Trojans in the Early Stage
Submitted by grigby1 on Wed, 11/28/2018 - 1:08pm
Accuracy
composability
cyber physical systems
False Data Detection
false negative rate
Human behavior
machine learning
pubcrawl
Remote Access Trojans detection
resilience
Resiliency
biblio
L-GEM based robust learning against poisoning attack
Submitted by grigby1 on Fri, 07/06/2018 - 1:05pm
Robustness
poisoning attack
pubcrawl
radial basis function networks
RBFNN
resampling
resilience
Resiliency
robust learning
perturbation techniques
sampling methods
Scalability
Sensitivity
sensitivity analysis
Support vector machines
Training
wavelet analysis
Accuracy
perturbation
Pattern recognition
nearest-first flips attack
Localized Generalization Error Model (L-GEM)
localized generalization error model
localized generalization error bound
learning process
learning (artificial intelligence)
label flip poisoning attacks
L-GEM based robust learning
Human behavior
farthest-first flips attack
classifier output
AI Poisoning
adversarial learning
biblio
Dmodel: Online Taxicab Demand Model from Big Sensor Data in a Roving Sensor Network
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
pickup pattern
wireless sensor networks
Training
traffic information systems
taxicab business
sensors
roving taxicabs
roving sensor network
Roads
real-world logical information
real-time systems
real-time mobile sensors
Accuracy
passenger demand inference
passenger arriving moments inference
online taxicab demand model
mobile computing
Meteorology
inference mechanisms
Dmodel
customized online training
Context
big sensor data
Big Data
1536086
biblio
Trusted Recomendation System Based on Level of Trust(TRS_LoT)
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
Accuracy
Companies
composability
indexing
information retrieval
Probabilistic logic
pubcrawl
recommendation
recommender systems
Reliability
resilience
Resiliency
Trusted recommendation system
web of trust
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
Automatic detection of frustration of novice programmers from contextual and keystroke logs
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
learning
student frustration detection
sensors
regression analysis
pubcrawl170115
Programming profession
programming exercise session
programming
novice programmers
novice
Mathematical model
logistic regression
Accuracy
lasso regularization
keystrokes
keystroke logs
Java tutoring system
Java
intelligent tutoring systems
frustration
feature extraction
contextual logs
Context modeling
computer science education
biblio
Smartphone: The key to your connected smart home
Submitted by grigby1 on Wed, 03/08/2017 - 1:13pm
facial authentication
user control point
User Centric Automation
Training
smart phones
secret pin based authentication
pubcrawl170113
Internet-of-Things
Humanoid robots
home security
home based automation systems
home automation
facial recognition
Accuracy
face recognition
eigenfaces algorithm
dual factor based authentication
connected smart home
building management systems
biometrics
authentication
Androids
Android based smartphone
Android application
Android (operating system)
biblio
Quality of information-aware real-time traffic flow analysis and reporting
Submitted by grigby1 on Wed, 03/08/2017 - 1:06pm
pubcrawl170111
video signal processing
vehicles
vehicle count
traffic video analysis
traffic metrics
traffic information systems
Streaming media
sensors
quality of service
quality of information-aware networking
QoI
Accuracy
mobile device
mobile computing
information-aware real-time traffic flow analysis
Image edge detection
form responses
end devices
desktop workstation
Cameras
bandwidth savings
average speed
biblio
Motion estimation with accurate boundaries
Submitted by grigby1 on Wed, 03/08/2017 - 1:06pm
Joints
video coding
scalable interactive video coding scheme
pubcrawl170111
multiresolution metric
MSE
moving average processes
motion estimation
motion boundary
Measurement
matching metrics
local dense estimation scheme
Accuracy
Image resolution
image matching
image filtering
Image edge detection
image domain
Image coding
edge-preserving filters
edge-aware moving average filter
edge detection algorithm
edge detection
compressible motion field
« first
‹ previous
1
2
3
4
5
next ›
last »