Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
Density Sensitive Hashing
Submitted by BrandonB on Wed, 05/06/2015 - 11:04am
locality sensitive hashing
Vectors
search problems
random projection
Quantization (signal)
projective function
principal component analysis
Nearest neighbor searches
LSH
Binary codes
high dimensional nearest neighbor search
geometric structure
file organisation
Entropy
DSH
density sensitive hashing
Databases
clustering
biblio
On a Hashing-Based Enhancement of Source Separation Algorithms Over Finite Fields With Network Coding Perspectives
Submitted by BrandonB on Wed, 05/06/2015 - 10:48am
per-symbol encoding
multimedia transmission
network coding
network coding perspective
nonlinear codes
nonlinear encoding
nonlinear message digest
observed mixtures
overhead cost reduction
multimedia networking
relaying linear packet combination
scaling ambiguity
Source separation
source separation algorithm
source signal recovery
throughput maximization
Vectors
video coding
encoding
BSS
channel coding
classical entropy-based separation method
combination coefficient
compressed media sources
Context
Decoding
decoding rate
blind source separation
Entropy
finite fields
Galois fields
hashing-based enhancement
independent component analysis
loss immunity
mixing process
Multimedia communication
biblio
Entropy constrained exemplar-based image inpainting
Submitted by BrandonB on Tue, 05/05/2015 - 12:28pm
edge detection
Entropy
entropy constrained exemplar-based image inpainting
Equations
false edge propagation
Image color analysis
Image edge detection
Image reconstruction
image restoration
old painting restoration
photograph restoration
PSNR
structural similarity index
biblio
Blind identification of source mobile devices using VoIP calls
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
device-based detection technique
Entropy
mel-frequency cepstrum coefficients
Pattern recognition
biblio
Cross-layer wireless information security
Submitted by BrandonB on Tue, 05/05/2015 - 9:14am
reciprocal channel dynamics
low key bit disagreement ratio
Noise measurement
noise-free channel response
noise-free per-symbol channel
OFDM
per-frame channel measurements
Pollution measurement
poor secrecy
KGR
security performance
signal strength
subtle channel fluctuations
telecommunication security
uncorrelated channel measurement volume
wireless channels
Wireless communication
antenna rotation
key generate rate
information security
high entropy rate
GNU SDR testbed
GNU radio simulator
Frequency measurement
frequency domain
fine-grained per-symbol reciprocal channel measurements
Entropy
Cryptography
cross-layer wireless information security
correlation coefficients
Communication system security
channel probing
bit per probing frame
biblio
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Submitted by BrandonB on Tue, 05/05/2015 - 8:54am
random number generator
Whirlwind RNG
VM snapshots
VM boots
virtualized Linux
virtualized environments
Virtualization
virtual machines
virtual machine
software-based random number generators
cryptographic secrets
not-so-random numbers
Linux RNG systems
Linux
Kernel
Instruments
Hardware
entropy sources
Entropy
Cryptography
biblio
User identification through command history analysis
Submitted by BrandonB on Mon, 05/04/2015 - 1:35pm
learning (artificial intelligence)
user profile corpus
user identification
user corpora
user configuration
Unix user
Unix
standard algorithm
Semantics
Schonlau variant
Schonlau masquerading corpus
Schonlau corpus
natural language processing
natural language authorship attribution literature
Accuracy
Information analysis
History
feature set
feature extraction
Entropy
editor war
Decision trees
computer science
command-line history
command-line behavior
command history analysis
Cal Poly command history corpus
biblio
A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Submitted by BrandonB on Mon, 05/04/2015 - 12:14pm
mobile computing
user privacy
unauthorized interceptions
text communication encryption
telecommunication security
smart phones
Skype
Protocols
mVoIP communications
mobile voice-over-Internet protocol
Android mobile devices
Mobile communication
lawful interceptions
Internet telephony
internet
Google
Entropy
data privacy
Cryptography
Android mobile VoIP applications
biblio
A general framework for dictionary based audio fingerprinting
Submitted by BrandonB on Mon, 05/04/2015 - 10:29am
greedy algorithms
Time-frequency Analysis
suboptimal greedy algorithm
structured sparsity
Speech
sparse support
Sparse Representation
Robustness
probabilistic distribution
penalized sparse representation problem
Pareto-like continuum
Pareto distribution
Atomic clocks
general framework
fingerprint-based audio recognition system
Fingerprint recognition
fingerprint identification
Entropy
dictionary based audio fingerprinting
Dictionaries
concurrent objectives
audio signal processing
Audio fingerprinting
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Fri, 05/01/2015 - 7:32am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »