Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Stochastic processes
biblio
An Energy-Efficient Stochastic Computational Deep Belief Network
Submitted by grigby1 on Wed, 03/06/2019 - 4:29pm
random number generation
high energy consumption
Human behavior
learning (artificial intelligence)
Metrics
neural nets
Neurons
nonlinearly separable patterns
pattern classification
policy-based governance
pubcrawl
Hardware
random number generators
rectifier linear unit
resilience
Resiliency
RNGs
SC-DBN design
Scalability
Stochastic computing
Stochastic processes
DNNs
belief networks
Biological neural networks
Cognitive Computing
collaboration
composability
computation speed
Correlation
Deep Belief Network
deep neural networks
approximate SC activation unit
effective machine learning models
Electronic mail
energy consumption
energy-efficient deep belief network
energy-efficient stochastic computational deep belief network
fixed point arithmetic
fixed-point implementation
floating point arithmetic
floating-point design
biblio
RISK ASSESSMENT IN PHARMACEUTICAL SUPPLY CHAINS UNDER UNKNOWN INPUT-MODEL PARAMETERS
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
Bayes methods
pubcrawl
Metrics
supply chains
Mathematical model
Pharmaceuticals
Stochastic processes
uncertainty
Supply Chain Risk Assesment
biblio
Deploying Robust Security in Internet of Things
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
risk management
worst-case security risks
uncertainty
Stochastic processes
stochastic model
Stochastic computing
security risk
security offloading
security of data
security incidents
security
Scalability
Robustness
robust security
risk measurement
Cloud Computing
resource-constrained nature
Resiliency
pubcrawl
optimal robust deployment
offloaded security mechanisms
IoT system
IoT security
IoT devices
Internet-of-Things
Internet of Things
expected case security risks
conditional value-at-risk
Communication networks
biblio
Analysis on Convergence of Stochastic Processes in Cloud Computing Models
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
cloud computing models
Stochastic computing
Stochastic Process
stochastic matrix
stochastic matrices
resource allocations
Rate of Convergence
matrix-defined systems
matrix algebra
Markov processes
complicated model
common stochastic processes
cloud computing systems
Cloud Computing
arbitrary stochastic processes
Eigenvalues and eigenfunctions
Biological system modeling
Steady-state
convergence
Stochastic processes
resource allocation
Scalability
Resiliency
pubcrawl
Computational modeling
security
file
Modeling and Maximizing Power for Wind Turbine Arrays
Submitted by Carolyn Beck on Tue, 01/22/2019 - 7:37pm. Contributors:
Carolyn Beck
Lucas Buccafusca
control
Nonlinear Optimization
robust control
Stochastic processes
Posters (Sessions 8 & 11)
1544953
CPS-PI Meeting 2018
2018
Poster
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Performance of compressive sensing based energy detection
Submitted by grigby1 on Thu, 08/23/2018 - 11:41am
Resiliency
one-dimensional Gaussian Q-function
privacy
probability
Probability density function
pubcrawl
radio spectrum management
Random variables
resilience
Mathematical model
sample size low
sensing time
signal detection
signal processing
signal-to-noise ratio
spectrum sensing
Stochastic processes
test statistic
CS framework
closed-form expressions
cognitive radio
cognitive radio applications
composability
compressed sensing
compressive ratio
compressive sampling
compressive sensing
central limit theorem
cyber-physical systems
decision variable
detected idle channels
Detectors
energy detection
Gaussian processes
low-complexity approximations
biblio
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
pubcrawl
Zero day attacks
two deep learning
Training
stochastically improved autoencoder
Stochastic processes
Stochastic Computing Security
Stochastic computing
stochastic approach
singular anomaly detection methods
security of data
security
Scalability
Resiliency
resilience
Anomaly Detection
noise reduction
network security
network anomaly detection
learning (artificial intelligence)
KDDTest+ dataset
Intrusion Detection Systems
Intrusion Detection
denoising autoencoder
deep learning
Data models
Computational modeling
autoencoder
anomaly detection models
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
probability parameters
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
domain specific architectural language
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
probability
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
formal verification
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
biblio
Stochastic security-constrained generation expansion planning methodology based on a generalized line outage distribution factors
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
Stochastic computing
PTDF
pubcrawl
resilience
Resiliency
SC-GCEP problem
Scalability
security
security-constrained
security-constraint analysis modeling
pre-contingency constraints
Stochastic Computing Security
Stochastic processes
stochastic programming
stochastic security-constrained generation capacity expansion planning problem
transmission lines
two-stage multi-period framework
two-stage problem
uncertainty
optimization
K-means clustering technique
line outage distribution factors
Linear distribution factors
Load flow
Load modeling
load uncertainty
LODF
N-m post-contingency analysis
electrical power systems
partial transmission distribution factors
Planning
post-contingency constraints
post-contingency power flows
power generation
power generation planning
power system security
power systems
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »