Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data analysis
biblio
Toward a Natural Language-Based Approach for the Specification of Decisional-Users Requirements
Submitted by aekwall on Mon, 02/22/2021 - 12:40pm
Scalability
Ontologies
Task Analysis
Resiliency
Human behavior
pubcrawl
query processing
tools
Decision Making
data analysis
natural language processing
Writing
Data Analytics
data warehouses
cleaning
critical task
Natural languages
complex task
Constellation schema
Data Warehouse
Data Warehouse technology
decision-makers
decision-making processes
decisional-users requirements
DW design
DW model
DW multidimensional schema
great challenge research domain
multidimensional components
Multidimensional Model
natural language
natural language NL-template
NL-templates
OLAP
On-Line-Analytical-Processing queries
query-like English sentences
requirement-gathering phase
Star schema
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 11:46am
Internet of Things
security
data analysis
Monitoring
IoT
pubcrawl
Metrics
resilience
Resiliency
computer network security
IoT devices
data privacy
telecommunication traffic
composability
network traffic
Reliability
security controls
testing
Google
dynamic analysis
Amazon Echo
security testing
Amazon devices
dynamic analysis security testing infrastructure
Google devices
Google Home
live traffic monitoring
offline data analysis
software analysis
dynamic networks
biblio
Reduced-Complexity Singular Value Decomposition For Tucker Decomposition: Algorithm And Hardware
Submitted by aekwall on Mon, 02/15/2021 - 3:45pm
Big Data
machine learning
pubcrawl
Iterative methods
Metrics
data analysis
cyber physical systems
CMOS integrated circuits
CMOS technology
Compositionality
hardware architecture
Data-Intensive Applications
singular value decomposition
SVD
big data analysis
high-dimensional data processing
iterative self-multiplication
power 37.6 mW
reduced-complexity SVD scheme
resource-constrained hardware platforms
size 28.0 nm
tensor algorithms
tensors
Tucker decomposition
decomposition
biblio
Using Singular Value Decomposition to Reduce Dimensionality of Initial Data Set
Submitted by aekwall on Mon, 02/15/2021 - 3:43pm
pubcrawl
Metrics
data analysis
cyber physical systems
principal component analysis
Compositionality
Matrix decomposition
Symmetric matrices
Eigenvalues and eigenfunctions
Matrix converters
singular value decomposition
initial data set
left eigenvectors
matrix rank
reduce dimensionality
right eigenvectors
singular value matrix
SVD
decomposition
biblio
Immutable DNA Sequence Data Transmission for Next Generation Bioinformatics Using Blockchain Technology
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
security
security of data
Cryptography
Resiliency
Human behavior
pubcrawl
blockchain
open source
data analysis
privacy
DNA
blockchain technology
Healthcare
health care
medical information systems
Predictive Metrics
bioinformatics
healthcare providers
secure data
DNA cryptography
biology computing
Genetics
block-chaining technology
decentralized
future generation bioinformatics systems
genome-sequencing
genomics
healthcare user
high throughput DNA sequencing technology
Immutable
immutable DNA sequence data transmission
secure storage platform
secured substances
securing healthcare data
biblio
Experiment Design for Complex Immersive Visualisation
Submitted by grigby1 on Wed, 02/03/2021 - 12:11pm
immersive systems
composability
cyber physical systems
cyber warfare
data analysis
Data visualization
Human behavior
human computer interaction
Human Factors
Information systems
military communication
military computing
network forensics
privacy
pubcrawl
resilience
software performance
tools
visualisation
biblio
Exploring Immersive and Non-Immersive Techniques for Geographic Data Visualization
Submitted by grigby1 on Wed, 02/03/2021 - 12:09pm
immersive systems
composability
cyber physical systems
data analysis
data visualisation
geographic data visualization
geographic information systems
geospatial data visualization
geospatial model visualization
Human behavior
Human Factors
immersive technique
nonimmersive technique
nonimmersive visualizations
privacy
pubcrawl
resilience
biblio
Machine Learning Method Based on Stream Homomorphic Encryption Computing
Submitted by aekwall on Mon, 02/01/2021 - 10:34am
security
Scalability
Cryptography
encryption
mobile computing
nearest neighbour methods
machine learning
Resiliency
pubcrawl
Metrics
Distributed databases
Mathematical model
Elliptic curve cryptography
Human Factors
estimation
data analysis
Homomorphic encryption
\$k\$ nearest neighbors
computational resources
computational time
k nearest neighbors
KNN
mobile positioning
stream homomorphic encryption computing
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 12:39pm
security of data
feature extraction
Anomaly Detection
data analysis
Unsupervised Learning
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Correlation
Scalability
Cybersecurity
Training data
advanced persistent threat
APT
Clustering algorithms
pattern clustering
advanced persistent threats
Behaviour Analysis
Cyber Threats Intelligence
heterogeneous log-files
Log-files Analysis
malicious behaviour
Multi-stage threats
multistage threats
pattern extraction
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
Scalability
data privacy
programming
Resiliency
Human behavior
pubcrawl
composability
privacy
tools
Databases
cognition
differential privacy
programming languages
data analysis
reasoning
Accuracy
functional programming
accuracy concentration
concentration bounds
data analyses results
Haskell
private data analyses
programming differentially private analyses
1
2
3
4
5
6
7
8
9
…
next ›
last »