Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Gaussian processes
biblio
Enhanced recognition of keystroke dynamics using Gaussian mixture models
Submitted by grigby1 on Wed, 03/08/2017 - 1:45pm
Gaussian mixture model
standards
pubcrawl170115
outlier detection
mixture models
machine learning methods
learning (artificial intelligence)
keystroke dynamics
keystroke data
image recognition
image enhancement
human computer interaction
GMM
Gaussian processes
Gaussian Mixture Models
authentication
gaussian distribution
Gaussian density estimator
feature extraction
error statistics
equal error rate
enhanced recognition
EER
directed graphs
digraph patterns
Cryptographic Protocols
computer authentication
biometrics (access control)
biometrics
biblio
SPAA-Aware 2D Gaussian Smoothing Filter Design Using Efficient Approximation Techniques
Submitted by grigby1 on Wed, 03/08/2017 - 1:03pm
Error Tolerant Applications
speed-power-area-accuracy
SPAA-aware 2D Gaussian smoothing filter design
SPAA metric
smoothing methods
rounding-off Gaussian kernel coefficient
pubcrawl170111
portable multimedia devices
nearest pixel approximation
limited battery lifetime
Kernel
Image edge detection
Gaussian Smoothing Filter
Gaussian processes
adders
energy-efficient designs
energy-efficient approximate 2D GSF architecture
energy-efficient approximate 2D Gaussian smoothing filter architecture
Energy-efficiency
Edge-detection
edge detection
computer architecture
Complexity theory
approximation theory
approximation technique
Approximation methods
Approximate design
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 12:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming
biblio
Scanned Image Descreening With Image Redundancy and Adaptive Filtering
Submitted by BrandonB on Wed, 05/06/2015 - 8:27am
image redundancy
steerable filter
scanned image descreening
Scanned image
scanned halftone image
Redundancy
printing noise reduction
printing distortion
Printing
printers
noise reduction
Noise
local gradient features
Kernel
inverse halftoning
adaptive filtering
Image edge detection
image denoising
high quality contone image recovery
halftone pattern
Gaussian processes
electrophotography
electrophotographic printers
edge-preserving filter
descreening
denoising algorithm
continuous tone image print
anisotropic Gaussian kernel
adaptive filters
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Mon, 05/04/2015 - 11:04am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
biblio
A fast human detection algorithm of video surveillance in emergencies
Submitted by BrandonB on Fri, 05/01/2015 - 8:37am
frame subtraction
video surveillance
target mask
single Guassian model
object detection
Moving Target
Image edge detection
IEEE Computer Society
human detection algorithm
Gaussian processes
Gaussian filter
background subtraction
fame subtraction
estimation
emergencies
Electronic mail
Educational institutions
edge tracking of head
edge detection
dilation
detection algorithms
Conferences
biblio
Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:34am
Lucas-Kanade approach
video surveillance
video frames
targets identification
synthesized videos
Streaming media
real time videos
Optical imaging
optical flow
Optical computing
object detection
normal movement
Neural networks
neural network
mixture models
abnormal behavior detection
image sequences
image motion analysis
Gaussian processes
Gaussian Mixture Models
foreground detection with Gaussian mixture model
Foreground Detection
FGMM model
feedforward neural nets
feed forward neural network
Feature Selection
computer vision
chaotic movement
Adaptive optics
biblio
Skip Decision and Reference Frame Selection for Low-Complexity H.264/AVC Surveillance Video Coding
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
static camera surveillance video encoders
Motion detection
Motion segmentation
motion-compensated prediction
multiple frames
recognition performance
reference frame selection
reference frame selection algorithm
skip decision
motion compensation
Streaming media
surveillance
video codecs
video coding
video sequence
video surveillance
video surveillance data sets
floating point computations
Cache optimization
Cameras
coding uncovered background regions
compression complexity
data compression
detection performance
distortion
encoding
bit rate savings
foreground pixels
Gaussian mixture model
Gaussian processes
H.264/advanced video coding (AVC)
H.264/advanced video coding surveillance video encoders
low-complexity H.264/AVC surveillance video coding
mixture model
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Fri, 05/01/2015 - 7:39am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 12:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
« first
‹ previous
1
2
3
next ›
last »