Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vectors
biblio
Occlusive vehicle tracking via processing blocks in Markov random field
Submitted by BrandonB on Mon, 05/04/2015 - 2:29pm
Vectors
occlusion phenomenon
occlusive block total energy function
occlusive vehicle tracking
processing blocks
Robustness
spatial correlation
tracking
traffic images
occlusion handling
vehicle contour
Vehicle detection
vehicle motion information
vehicle texture information
vehicle tracking
vehicle video detection
vehicles
video signal processing
Markov processes
background subtraction
clique functions
image motion analysis
Image resolution
image texture
information extraction
Intelligent Transportation Systems
ITS
attribution problem
Markov random field
Markov Random Field (MRF)
Markov random fields
motion coherence
MRF model
object detection
object tracking
occlusion
biblio
Who Wrote This? Textual Modeling with Authorship Attribution in Big Data
Submitted by BrandonB on Mon, 05/04/2015 - 2:22pm
textual modeling
multiple-author documents
Predictive models
Probabilistic topic models
receiver operating characteristic curve
ROC curve
SAT model
supervised author-topic model
text analysis
meta-data
topic representations
topic-based generative models
Training
unsupervised AT model
Unsupervised Learning
unsupervised learning technique
Vectors
Computational modeling
area under curve
AUC
author-topic model
authorship attribution
authorship learning
authorship prediction
Bayesian inference
Big Data
Analytical models
Data models
dimension reduction
Dirichlet distribution
High dimensional texual data
information discovery
Mathematical model
meta data
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 1:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids
biblio
On the modeling of natural vocal emotion expressions through binary key
Submitted by BrandonB on Mon, 05/04/2015 - 12:03pm
natural vocal emotion expression modelling
Vectors
VAM corpus
Training
three-continuous emotional dimensions
support vector regression model
Support vector machines
standard acoustic feature mapping
spontaneous dialogues
Speech recognition
speech features
Speech
spectral parameters
speaker emotion characteristics
regression analysis
acoustic descriptors
mean absolute error
German TV talk-show
feature extraction
emotion recognition
Emotion modeling
dimensional emotions
correlation coefficient
binary value representation
binary key modeling
binary fingerprint
binary acoustic modeling
Acoustics
Acoustic signal processing
biblio
Montage: Combine frames with movement continuity for realtime multi-user tracking
Submitted by BrandonB on Mon, 05/04/2015 - 11:59am
smart phones
Vectors
user movement vector estimation
tracking
Topology
temporal constraints
target tracking
submeter-level tracking
spatial constraints
Smartphones
Acceleration
real-time multiuser formation tracking
moving-direction estimation
movement continuity
mobile phones
meter-second-level formation tracking accuracy
Earth
Distance measurement
Acoustics
biblio
Underwater ultra-wideband fingerprinting-based sparse localization
Submitted by BrandonB on Mon, 05/04/2015 - 11:48am
sparse recovery
Vectors
UWB signal utilization
underwater ultrawideband fingerprinting-based sparse localization
underwater acoustic propagation
underwater acoustic communication
underwater
ultrawideband signal utilization
ultra wideband communication
Synchronization
sparsity-based localization method
Accuracy
Signal processing algorithms
receiving antennas
Indexes
grid matching
fingerprinting localization
Dictionaries
compressive sampling
compressed sensing
acoustic wave utilization
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Fri, 05/01/2015 - 8:34am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary
biblio
Contingency-Risk Informed Power System Design
Submitted by BrandonB on Fri, 05/01/2015 - 7:47am
long-term grid planning
Vectors
transmission expansion problem
time 2 h
standards
separation oracle
risk analysis
power systems
power system reliability
power system economics
Planning
N-k-ε survivability criterion
mixed-integer programming formulation
minimum cost
combinatorial explosion
Laboratories
Investment
integer programming
implicit optimization
IEEE 57-bus systems
IEEE 30-bus systems
generation expansion problem
electricity
Electric Power System
decomposition
contingency-risk informed power system design
Contingency requirements
contingency analysis problem
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack
biblio
Opposition-based learning harmony search algorithm with mutation for solving global optimization problems
Submitted by BrandonB on Thu, 04/30/2015 - 12:59pm
mutation strategy
Vectors
stability
self-adaptive strategy
Search Space
search problems
original pitch adjustment operation
optimization
optimisation
opposition-based learning harmony search algorithm
Opposition-Based Learning
OLHS-M
Algorithm design and analysis
Mutation Operation
local search
Linear programming
learning (artificial intelligence)
Heuristic algorithms
harmony search algorithm
global search
global continuous optimization problems
convergence
algorithm search space
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »