Found 42 datasets matching "traffic models".
-
TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and...
Search relevance: 43.87 | Views last month: 9 -
TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and...
Search relevance: 43.27 | Views last month: 2 -
Round 4 Holdout DatasetThe data being generated and disseminated is the holdout data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
Search relevance: 42.77 | Views last month: 0 -
Round 2 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
Search relevance: 42.48 | Views last month: 0 -
Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 42.46 | Views last month: 0 -
Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 42.34 | Views last month: 0 -
Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
Search relevance: 42.34 | Views last month: 0 -
Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
Search relevance: 42.23 | Views last month: 0 -
Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 42.23 | Views last month: 0 -
Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 41.99 | Views last month: 0 -
Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 41.68 | Views last month: 0 -
Round1 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 41.57 | Views last month: 0 -
Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
Search relevance: 39.56 | Views last month: 0 -
Round 1 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
Search relevance: 39.48 | Views last month: 0 -
This dataset was an initial test harness infrastructure test for the TrojAI program. It should not be used for research. Please use the more refined datasets generated for the other rounds. The...
Search relevance: 39.36 | Views last month: 0 -
Timed-Triggered Ethernet (or TTEthernet)is a communication infrastructure that enables the use of Ethernet in real-time, distributed systems. TTEthernet is compatible with traditional IEEE 802.3...
Search relevance: 38.15 | Views last month: 0 -
The goal of the SHRP 2 Project L33 Validation of Urban Freeway Models was to assess and enhance the predictive travel time reliability models developed in the SHRP 2 Project L03, Analytic...
Search relevance: 35.52 | Views last month: 5 -
The North of Interstate 40 Pronghorn herd primarily resides in Arizona’s Game Management Unit (GMU) 7. GMU 7 had an estimated population of 550 pronghorn in 2019. The Pronghorn North of Interstate...
Search relevance: 35.37 | Views last month: 0 -
This paper discusses the effect of sequential conflict resolution maneuvers of an infinite aircraft flow through a finite control volume. Aircraft flow models are utilized to simulate traffic...
Search relevance: 34.26 | Views last month: 0 -
The datasets in this zip file are in support of FHWA-JPO-16-379, Analysis, Modeling, and Simulation (AMS) Testbed Development and Evaluation to Support Dynamic Mobility Applications (DMA) and...
Search relevance: 30.26 | Views last month: 0