Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristic algorithms
biblio
A hopping sensor deployment scheme based on virtual forces
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
maximal coverage optimization problem
wireless sensor networks
Wireless Sensor Network
Voronoi neighbor sensor
virtual force algorithm enhancement
telecommunication power management
Robot sensing systems
pubcrawl170110
optimization
mobile sensor continuous dynamics
Mobile communication
dynamics
local Voronoi cell centroid
hopping sensor dynamics equation
hopping sensor discrete dynamics
hopping sensor deployment scheme
hopping sensor constraint dynamics
Heuristic algorithms
Force
energy efficient hopping sensor
energy conservation
biblio
Multi-objective dynamic unit commitment optimization for energy-saving and emission reduction with wind power
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
satisfaction-maximizing decision
NSGA-D
NSGA-II algorithm
optimization
Pareto optimisation
Pareto solution
pollution emission
power generation dispatch
power generation scheduling
pubcrawl170110
nondominated sorting genetic algorithm-II
SO2
Spinning
sulphur compounds
unit commitment optimization
Wind power generation
wind power integrated system
wind power plants
Wind speed
wind turbines
fuzzy satisfaction-maximizing method
carbon compounds
CO2
commitment discrete magnitude
double optimization
double-optimization strategy
emission reduction
energy-saving
energy-saving and emission reducing
fault time
air pollution
fuzzy set theory
genetic algorithms
Heuristic algorithms
Linear programming
load distribution
mixed-integer variable
multi-objective
multiobjective dynamic unit commitment optimization
multiobjective unit commitment modeling
biblio
Virtual machine placement strategy based on discrete firefly algorithm in cloud environments
Submitted by grigby1 on Wed, 03/08/2017 - 1:53pm
optimisation
Virtual machining
virtual machines
virtual machine placement strategy
virtual machine placement
search problems
search mechanism
resource wastage
resource allocation
pubcrawl170110
power aware computing
Brightness
OpenStack cloud platform
multiobjective constraint optimization model
Heuristic algorithms
firefly algorithm
evolutionary computation
energy consumption
discrete firefly algorithm
Constraint optimization
Cloud Computing
biblio
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
attack graph
computational complexity
computer network security
Heuristic algorithms
k zero day safety
network hardening
network security
network security metric
Security Metrics
software flaws
biblio
A Modified Empirical Mode Decomposition Filtering-Based Adaptive Phasor Estimation Algorithm for Removal of Exponentially Decaying DC Offset
Submitted by BrandonB on Wed, 05/06/2015 - 9:25am
Heuristic algorithms
Relays
real power system fault signals
power system faults
Power system dynamics
Power harmonic filters
polynomials
polynomial approximation
phasor measurement
phasor estimation
optimum hermite polynomial fitting method
optimum hermite polynomial fitting
modified empirical mode decomposition filtering
adaptive dynamic phasor estimation algorithm
fundamental frequency component
exponentially decaying DC offset
estimation
Empirical mode decomposition
dynamic system fault
Discrete Fourier transforms
discrete Fourier transform
digital protective relays
Algorithm design and analysis
adaptive filters
adaptive filtering procedure
adaptive filtering
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
Secure Mail using Visual Cryptography (SMVC)
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
OpenPGP
wavelet transforms
wavelet transform
wavelet decomposition
visualization
visual cryptography
transmission medium
SMVC
secure mail using visual cryptography
Receivers
receiver side
receipent mail box
public key cryptography
public key based image authentication method
pretty good privacy
personal security
CFB mode encryption
message authentication
low frequency wavelet coefficient
Internet standards
Image Processing
Heuristic algorithms
gray scale image
encryption
Electronic mail
e-mail messaging
dynamic s-box algorithm
data privacy
chaos-based image encryption algorithm
chaos based image encryption algorithm
chaos
biblio
Intradomain and interdomain QoT-aware RWA for translucent optical networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:32am
routing-and-wavelength assignment problem
Nonlinear optics
Optical fiber networks
optical signal regeneration
physical impairments
probability
quality-of-transmission requirement
Repeaters
Routing
next-generation optical-transport networks
scalability concerns
telecommunication network routing
telecommunication security
translucent long-haul optical networks
wavelength assignment
wavelength division multiplexing
wavelength division multiplexing-based optical networks
Heuristic algorithms
backward-recursive path-computation
Bit error rate
blocking probability
BRPC
confidentiality concerns
cross-layer heuristics
dynamic programming
end-to-end service demands
Availability
interdomain QoT-aware RWA
Internet Engineering Task Force
intradomain QoT-aware RWA
multidomain path computation
multipath channels
network-level performance metric minimization
network-state information
biblio
Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid ARQ
Submitted by BrandonB on Tue, 05/05/2015 - 10:29am
Automatic repeat request
Base stations
Cross-layer optimization
Decoding
Heuristic algorithms
hybrid automatic repeat request (ARQ)
Mutual information
physical-layer security
Uplink
wireless networks
biblio
Establishing Theoretical Minimal Sets of Mutants
Submitted by BrandonB on Fri, 05/01/2015 - 8:08am
Minimization
test cases
set theory
redundant mutants
program testing
Mutation testing
mutation score
mutation analysis
mutant set minimization
Benchmark testing
minimisation
minimal mutant sets
Heuristic algorithms
Electronic mail
dynamic subsumption
Context
Computational modeling
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »