Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Pattern recognition
biblio
Incipient Fault Diagnosis Using Support Vector Machines Based on Monitoring Continuous Decision Functions
Submitted by BrandonB on Wed, 05/06/2015 - 2:36pm
Binary mixture distillation column
Continuous decision function
Incipient fault diagnosis
Pattern recognition
Support vector machines
biblio
A Chaotic Theorectical Approach to ECG-Based Identity Recognition [Application Notes]
Submitted by BrandonB on Wed, 05/06/2015 - 1:25pm
Biomedical monitoring
Access Control
security access control
private document protection
Pattern recognition
Identity management
Fingerprint recognition
entrance security management system
Electrocardiography
ECG-based identity recognition
chaotic theoretical approach
chaos
biometrics (access control)
biometrics
biometric identification
biometric features
biblio
DeepQA Jeopardy! Gamification: A Machine-Learning Perspective
Submitted by BrandonB on Tue, 05/05/2015 - 1:29pm
real-world business problems
Newton-Raphson logistic regression
NLP algorithms
NLP question-and-answer system
nongame play
Pattern recognition
Pipelines
positive-to-negative ratio
question answering (information retrieval)
question-and-answer pairs
natural language processing (NLP)
regularization term
Structured Data
text analysis
Training
training instances
true-false labels
Unstructured Data
Watson gamification
Watson machine-learning pipelines
Games
algorithm engineering
business data processing
business domain
computer games
configuration settings
data engineering techniques
DeepQA Jeopardy! gamification
domain gamification
extreme class imbalance
Accuracy
Gamification
ingested corpus sets
large-scale natural language processing question-and-answer system
learning (artificial intelligence)
Logistics
machine learning
machine learning algorithms
machine-learning process
natural language processing
biblio
Blind identification of source mobile devices using VoIP calls
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
device-based detection technique
Entropy
mel-frequency cepstrum coefficients
Pattern recognition
biblio
Tagged visual cryptography with access control
Submitted by BrandonB on Tue, 05/05/2015 - 8:46am
meaningless share images
visualization
visual cryptography
tagged visual cryptography
Stacking
self-authentication mechanism
secret sharing
secret image
printed pattern
Pattern recognition
message authentication
Access Control
lossless construction ability
image secret sharing scheme
Image coding
Equations
encryption
Cryptography
authorization
authorisation
authentication
biblio
A Novel Acoustic Fingerprint Method for Audio Signal Pattern Detection
Submitted by BrandonB on Mon, 05/04/2015 - 11:32am
finite state machine
Time-Frequency processing
Time-frequency Analysis
time-domain analysis
speech recognition techniques
Spectral signature
Pitch frequency
Pattern recognition
Noise measurement
mechanical sounds
hybrid time-frequency approach
FSM model
frequency-domain analysis
finite state machines
Finite State Machine(FSM)
Acoustic Fingerprint
efficient audio signal recognition algorithm
Correlation
computational complexity
background noises
audio signal processing
audio signal pattern detection
Audio recognition
Audio detection
Acoustics
Acoustic signal processing
acoustic signal detection
acoustic noise
acoustic fingerprint method
biblio
Multi-source Multi-modal Activity Recognition in Aerial Video Surveillance
Submitted by BrandonB on Fri, 05/01/2015 - 9:36am
spatial-temporal activity boundary detection
multisource associated data
multisource multimodal activity recognition
multisource multimodal event recognition
object detection
overhead imagery
Pattern recognition
probabilistic graph-based matching approach
query processing
Radar tracking
Semantics
multiple dynamic target tracking
Streaming media
target tracking
targets-of-interest
unsynchronized data sources
user interfaces
vehicles
video streaming
video surveillance
voice-to-text chat messages
full-motion video
activities of interest
activity pattern learning framework
activity video segments
aerial imagery
aerial video surveillance
analyst call-outs
associated text
FMV streaming
FMV target track representation
FMV videos
ACO
geolocation
image matching
image motion analysis
image representation
index query
indexing
learning (artificial intelligence)
multi-intelligence user interface
multiple dynamic target detection
biblio
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud
Submitted by BrandonB on Thu, 04/30/2015 - 2:18pm
multiprocessing
vocabularies
security of data
security issue
security
secured distributed OCR system
recognition process
pervasive environment
Pattern recognition
Optical character recognition software
optical character recognition
natural language processing
authentication
mobile environment
mobile computing
Mobile communication
Distributed OCR system
distributed computing technologies
distributed Arabic optical character recognition
Computational modeling
cloud computing technology
Cloud Computing
authentication as a service
biblio
Network Intrusion Detection System using attack behavior classification
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
Neural networks
unauthorized accesses
TDNN neural network structure
TDNN neural network
reconnaissance attacks
Protocols
Probes
preprocessor
Ports (Computers)
port scan attacks
Port scan
Pattern recognition
pattern classification
packet capture engine
NIDS
alert module
neural nets
network probe attacks
Network probe attack
network intrusion detection system
IP networks
Intrusion Detection Systems
Intrusion Detection
host-based intrusion detection system
host sweep attacks
Host sweep
HIDS
computer security systems
computer network security
attack behavior classification
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU
« first
‹ previous
1
2
3
4
5