Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Heating systems
Human Behavior and Cybersecurity
topological sort networks
network theory
movement association
mixed methods
graph topological ordering
dynamic decision-making
adversarial team
adversarial movement complexity
adaptive human behavior
Human behavior
security of data
cyberattacks
integrated circuits
Sorting
network theory (graphs)
social network
Training
Decision Making
tools
graph theory
pubcrawl
Computer crime
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
inference mechanisms
Expert Systems and Privacy
trust mechanisms
trust inference
trust computation
personality models
online human-fed evaluation systems
nonpersonality-wise approaches
malicious people
logical protection
evaluation system
affective aspects
psychology
trust model
Numerical models
security of data
Software systems
Human Factors
Data mining
Correlation
text analysis
Decision Making
tools
Computational modeling
pubcrawl
Human behavior
Data models
Trusted Computing
data privacy
Scalability
biblio
On Learning in Collective Self-Adaptive Systems: State of Practice and a 3D Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
multifaceted analysis
3D framework
adaptive systems
agent-specific goals
collective self-adaptive systems
CSAS applications
Distributed Sensing
environmental data collection
learning techniques
Interconnected Systems
multiple agents
privacy-aware mechanisms
search and rescue operations
self-adaptive systems
system-wide goals
taxonomy
Expert Systems and Privacy
Scalability
learning
Autonomic systems
Systematics
Gold
distributed systems
Human Factors
integrated circuits
Decision Making
Databases
multi-agent systems
pubcrawl
Human behavior
learning (artificial intelligence)
Conferences
data privacy
biblio
Collaborative Cyber-Physical Restoration for Enhancing the Resilience of Power Distribution Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:10pm
power system resilience
Load flow
Meteorology
modern power distribution system
operator decision making
physical subsystems
Power demand
power distribution
Power Distribution Systems
load dispatching
power system restoration
pubcrawl
resilience
resilience index
Resiliency
restoration rapidity
second-order cone programming problem
Voltage measurement
dependent subsystem
collaborative cyber-physical restoration model
Collaborative restoration
convex programming
CPS resilience
cyber physical systems
cyber-physical system
cyber-physical systems
Decision Making
33-bus power distribution system
Economic dispatch
Economics
extensive cyber-physical interdependencies
extreme weather event
functionality loss
greedy heuristics
heuristic approach
Indexes
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
biblio
Reinforcement Learning inspired Deep Learned Compositional Model for Decision Making in Tracking
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
previous location
neural nets
object tracking
occlusion handling
partial occlusions
partially observable Markov decision making
penalty based training
pose estimation
pose estimation capabilities
multiple large video datasets
pubcrawl
Reinforcement learning
skeleton based part representation
Streaming media
target tracking
tracker
tracking
video signal processing
heuristic methods
Compositional Models
Compositionality
Computational modeling
computer science
Decision Making
deep learned compositional model
Deep Neural Network
deep reinforcement
cluttered background
human bodies
human inputs
image representation
incessant decision making
learning (artificial intelligence)
Markov processes
Mathematical model
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
biblio
Decentralized Data Marketplace to Enable Trusted Machine Economy
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
streaming data
data marketplaces
decentralization
decentralized architecture
decentralized data marketplace
encrypted message channel
Evolutionary Game Theory
matching process
refunding processes
strategic decision-making
Data marketplace
trade records
trading policies
trading process
trusted data streams
trusted machine economy
trustless architecture
verifiable Auth-compliant request
Computer Theory and Trust
data providers
data privacy
data integrity
distributed processing
game theory
computer network management
pubcrawl
composability
Decision Making
Cryptography
Compositionality
transaction processing
financial data processing
distributed ledgers
transaction process
IoT data
contract-oriented interactions
customer experiences
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »