Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 956 matches
- 2024
- Mateus da Silva Gilbert, Marcello L. R. de Campos, Miguel Elias M. Campista:
Asymmetric Autoencoders: An NN alternative for resource-constrained devices in IoT networks. Ad Hoc Networks 156: 103412 (2024) - Sundaram B. Pandya, Kanak Kalita, Robert Cep, Pradeep Jangir, Jasgurpreet Singh Chohan, Laith Abualigah:
Multi-objective Snow Ablation Optimization Algorithm: An Elementary Vision for Security-Constrained Optimal Power Flow Problem Incorporating Wind Energy Source with FACTS Devices. Int. J. Comput. Intell. Syst. 17(1): 33 (2024) - Ifeoluwapo Aribilola, Brian Lee, Mamoona Naveed Asghar:
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices. Internet Things 25: 101058 (2024) - Mahesh Ganesh Bhat, Sushmit Bhattacharjee, Cenk Gündogan, Konstantinos Alexandris, Alexander Gogolev:
CORECONF, NETCONF, and RESTCONF: Benchmarking Network Orchestration in Constrained IIoT Devices. IEEE Internet Things J. 11(7): 13082-13090 (2024) - Krittibas Parai, Daya Sagar Gupta, SK Hafizul Islam:
IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices. IEEE Internet Things J. 11(6): 10304-10313 (2024) - Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. ISC Int. J. Inf. Secur. 16(1): 93-114 (2024) - Donglei Wu, Weihao Yang, Haoyu Jin, Xiangyu Zou, Wen Xia, Binxing Fang:
FedComp: A Federated Learning Compression Framework for Resource-Constrained Edge Computing Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(1): 230-243 (2024) - Dong Xie, Jinghua Yang, Bin Wu, Weixin Bian, Fulong Chen, Taochun Wang:
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme. IEEE Trans. Inf. Forensics Secur. 19: 3451-3464 (2024) - Jeng-Shyang Pan, Pei-Cheng Song, Jyh-Horng Chou, Junzo Watada, Shu-Chuan Chu:
FPGA-Based Compact Differential Evolution for General-Purpose Optimization in Resource-Constrained Devices. IEEE Trans. Ind. Informatics 20(4): 6781-6790 (2024) - Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices. IEEE Trans. Ind. Informatics 20(1): 411-420 (2024) - Jie Zhang, Yanjiao Li, Qing Li, Wendong Xiao:
Variance-Constrained Local-Global Modeling for Device-Free Localization Under Uncertainties. IEEE Trans. Ind. Informatics 20(4): 5229-5240 (2024) - Quan Nguyen, Hieu H. Pham, Kok-Seng Wong, Phi Le Nguyen, Truong Thao Nguyen, Minh N. Do:
FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource-Constrained Devices Using Divide and Collaborative Training. IEEE Trans. Netw. Serv. Manag. 21(1): 418-436 (2024) - Edoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - Yushan Huang, Josh Millar, Yuxuan Long, Yuchen Zhao, Hamed Haddadi:
Towards Low-Energy Adaptive Personalization for Resource-Constrained Devices. EuroMLSys@EuroSys 2024: 73-80 - Xianghao Niu, Marco M. Cook, Dimitrios Pezaros:
Examining the Suitability of Stream Ciphers for Modbus-TCP Encryption on Resource Constrained Devices. EuroSec@EUROSYS 2024: 51-57 - Akhirul Islam, Manojit Ghose:
ELITE: Energy and Latency-Optimized Task Offloading for DVFS-Enabled Resource-Constrained Devices in MEC. ICDCIT 2024: 50-67 - Arko Datta, Aniruddha Pal, Ranbir Marandi, Nilanjan Chattaraj, Subrata Nandi, Sujoy Saha:
Efficient Air Quality Index Prediction on Resource-Constrained Devices using TinyML: Design, Implementation, and Evaluation. ICDCN 2024: 304-309 - Hao Yin, Murali Ramanujam, Joe Schaefer, Stan Adermann, Srihari Narlanka, Perry Lea, Ravi Netravali, Krishna Chintalapudi:
ADR-X: ANN-Assisted Wireless Link Rate Adaptation for Compute-Constrained Embedded Gaming Devices. NSDI 2024 - Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices. CoRR abs/2401.04308 (2024) - Ruixuan Zhang, Wenyu Han, Zilin Bian, Kaan Ozbay, Chen Feng:
Learning When to See for Long-term Traffic Data Collection on Power-constrained Devices. CoRR abs/2401.14504 (2024) - Ruiyang Qin, Yuting Hu, Zheyu Yan, Jinjun Xiong, Ahmed Abbasi, Yiyu Shi:
FL-NAS: Towards Fairness of NAS for Resource Constrained Devices via Large Language Models. CoRR abs/2402.06696 (2024) - Guangyu Zhu, Yiqin Deng, Xianhao Chen, Haixia Zhang, Yuguang Fang, Tan F. Wong:
ESFL: Efficient Split Federated Learning over Resource-Constrained Heterogeneous Wireless Devices. CoRR abs/2402.15903 (2024) - Xuanlei Zhao, Bin Jia, Haotian Zhou, Ziming Liu, Shenggan Cheng, Yang You:
HeteGen: Heterogeneous Parallel Inference for Large Language Models on Resource-Constrained Devices. CoRR abs/2403.01164 (2024) - Booy Vitas Faassen, Jorge Serrano, Paul D. Rosero-Montalvo:
Micro-Fracture Detection in Photovoltaic Cells with Hardware-Constrained Devices and Computer Vision. CoRR abs/2403.05694 (2024) - Ziru Niu, Hai Dong, A. Kai Qin:
FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update. CoRR abs/2403.11464 (2024) - Mounia Hamidouche, Biniam Fisseha Demissie, Bilel Cherif:
Real-time Threat Detection Strategies for Resource-constrained Devices. CoRR abs/2403.15078 (2024) - Yushan Huang, Josh Millar, Yuxuan Long, Yuchen Zhao, Hamed Haddadi:
Towards Low-Energy Adaptive Personalization for Resource-Constrained Devices. CoRR abs/2403.15905 (2024) - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:
Enabling PERK on Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2024: 88 (2024) - Eugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas:
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2024: 231 (2024) - 2023
- Alessio Canepa:
Application-aware optimization of Artificial Intelligence for deployment on resource constrained devices. University of Genoa, Italy, 2023
skipping 926 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 09:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint