Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
biology
biblio
Associative Data Model in Search for Nearest Neighbors and Similar Patterns
Submitted by
grigby1
on Fri, 05/22/2020 - 1:30pm
learning (artificial intelligence)
search problems
Training
pubcrawl
Data models
data structures
Classification algorithms
neural nets
Metrics
Measurement
nearest neighbour methods
Acceleration
graph theory
classification
biology
KNN
associative data model
associative data structures
associative neural network graphs
associative structures
computational intelligence
Knowledge representation
nearest neighbor search
Sebestyen measure
self-organize data
similarity
biblio
DURS: A Distributed Method for k-Nearest Neighbor Search on Uncertain Graphs
Submitted by
grigby1
on Fri, 05/22/2020 - 1:22pm
pubcrawl
Correlation
Indexes
computer science
Metrics
Measurement
nearest neighbour methods
probability
graph theory
query processing
biology
distributed system
DURS
k-nearest neighbor
k-nearest neighbor queries
k-nearest neighbor search
Market research
Scalability
scalable search
social networking (online)
uncertain graphs
nearest neighbor search
biblio
Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance
Submitted by
aekwall
on Mon, 03/30/2020 - 10:32am
History
Resiliency
Human behavior
pubcrawl
composability
biology
Metrics
query processing
database
Databases
finance
relational databases
Flowcharts
Provenance
data provenance
RDBMS
data origin
data provenance finding
data provenance tracking
Data-Intensive Applications
inverse queries
inversion queries
mathematical formulation
mathematical formulations
Physics
query inversion techniques
relational algebra
relational algebra operations
relational database management system
Springs
unexpected results
biblio
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Submitted by
aekwall
on Mon, 02/18/2019 - 11:58am
security of data
telecommunication security
security
Protocols
pubcrawl
composability
sybil attacks
artificial spider-monkey technique
biology
densely deployed challenge zone
destination vehicles
dynamic VANET system
energy conservation
energy-efficient time synchronization
erroneous messages
legitimate vehicles
malicious nodes
metaheuristic stimulated framework approach
minimized energy consumption
multiple identities
natural spider-monkey behavior
packet delivery time synchronization
probability of detection
pseudocode algorithm
roadside unit
Routing
Spider monkey time synchronization (SMTS)
spider-monkey time synchronization technique
Sybil attack detection
Sybil attacking strategies
Sybil security threat
synchronisation
Synchronization
telecommunication power management
time division multiple access
unintended vehicles
VANETs
vehicular ad hoc networks
vehicular collisions
Metrics
file
bioCPS for Engineering Living Cells
Submitted by
Calin Belta
on Mon, 12/17/2018 - 10:21am. Contributors:
Calin Belta
Doug Densmore
Vijay Kumar
Ron Weiss
Demarcus Briers
Sambeeta Das
Nicholas DeLateur
Iman Haghighi
Elizabeth Hunter
Curtis Madsen
Noushin Mehdipour
Edward Steager
Brian Teague
Prashant Vaidyanathan
Junmin Wang
biology
formal methods
robotics
Session 12: LT
1446607
CPS-PI Meeting 2018
2018
Presentation
profile
Ricardo Sanfelice
Networked Control
Hybrid Models
Smart Grid
Models of Computation
Time Synchronization
Modeling
Robotics
Aerospace
biology
cyber-physical systems
embedded systems
hybrid modeling
robotics
robust control
simulation of nonlinear
stability
file
Bridging CS and Biology for CyberSecurity
Submitted by
TimTh
on Mon, 11/15/2010 - 10:22am. Contributor:
Stephanie Forrest
biology
Santa Fe Institute
University of New Mexico
Academia
Presentation
Cyber Security