Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 8:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics
biblio
Evaluation of Bayesian and Dempster-Shafer approaches to fusion of video surveillance information
Submitted by BrandonB on Fri, 05/01/2015 - 8:39am
Kelly betting strategy
video surveillance information fusion
video surveillance
vehicles
vehicle reidentification
vehicle
uncertainty
traffic engineering computing
statistical parametric fusion methods
Shape
road vehicles
probability
probabilistic estimates
Mathematical model
Accuracy
inference mechanisms
fusion
evaluation
Dempster-Shafer method
Dempster-Shafer approach
Dempster-Shafer
Color
belief networks
Bayesian networks
Bayesian fusion approach
Bayesian
Bayes methods
biblio
An Open S-BPM Runtime Environment Based on Abstract State Machines
Submitted by BrandonB on Fri, 05/01/2015 - 7:10am
finite state machines
workflow management software
workflow engine
Subject-oriented Business Process Management
subject-oriented BPM
Semantics
S-BPM tools
S-BPM model
program interpreters
Open-S-BPM
Open S-BPM runtime environment
Mathematical model
abstract interpreter model
executable workflow engine
Engines
CoreASM
business process modeling
business data processing
Business
ASM approach
Analytical models
Abstracts
abstract state machine interpreter
Abstract State Machine
biblio
Convergence of physical system and cyber system modeling methods for aviation cyber physical control system
Submitted by BrandonB on Fri, 05/01/2015 - 7:06am
computational design concern
Unified modeling language
Spatial-Temporal Features
physical system modeling method
physical design concern
Modelicaml
Modelica
model-integrated development approach
Mathematical model
management problem
Formal Specification
Dynamic Continuous Features
design disciplines
cyber system modeling method
cyber physical systems
convergence
AADL
aviation system convergence
aviation cyber-physical systems
aviation cyber-physical system design
Aviation Cyber Physical System
aviation cyber physical control system
Atmospheric modeling
Architecture Analysis & Design Language
Analytical models
aircraft system specification
aircraft system modeling
Aircraft
aerospace control
aerospace computing
ACPS design
biblio
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
Submitted by BrandonB on Fri, 05/01/2015 - 6:33am
network topology
state estimation
SOCCA
situational awareness
security-oriented cyber-physical contingency analysis
security
power system topology
power system security
power system planning
power system contingency
power infrastructures
power grids
physical components
accidental contingency
Mathematical model
malicious compromises
Indexes
grid operation
cyber-physical systems
cyber-physical security evaluation
cyber perspective
cyber network configuration
cyber components
control network
contingency analysis
Algorithm design and analysis
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:59pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 12:33pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
On a Mathematical Model for Low-Rate Shrew DDoS
Submitted by BrandonB on Thu, 04/30/2015 - 12:17pm
low-rate shrew DDoS
transport protocols
transport control protocol
Throughput
TCP flows
TCP congestion window
shrew distributed denial-of-service
shrew attack
Packet loss
network environments
Mathematical model
Adaptation models
low-rate distributed denial of service (DDoS) attack
internet
delays
computer network security
Computer crime
bottleneck bandwidth
Bandwidth
attack pattern
attack effect estimation
Attack effect
biblio
User behaviour modelling based DDoS attack detection
Submitted by BrandonB on Thu, 04/30/2015 - 12:16pm
expectation maximization
user modelling
user modeling
user behaviour modelling
telecommunication traffic
signal processing
network system
Mathematical model
IP networks
Human Factors
Adaptation models
EM
distributed denial of service
destination IP traffic
DDoS attack detection
DDoS
Conferences
computer network security
Computer crime
Anomaly Detection
biblio
One-Layer Continuous-and Discrete-Time Projection Neural Networks for Solving Variational Inequalities and Related Optimization Problems
Submitted by BrandonB on Thu, 04/30/2015 - 11:57am
one-layer continuous-time projection neural networks
Vectors
variational techniques
variational inequalities.
variational inequalities
sufficient conditions
projection neural network
optimization problems
optimization
optimisation
one-layer discrete-time projection neural networks
constrained optimization
Neural networks
neural nets
Mathematical model
Lyapunov stability
Lyapunov methods
global convergence
Educational institutions
discrete time systems
convergence
constrained variational inequalities
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
next ›
last »