Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has Title" with value "Assessing the Potential Energy Savings of a Fluidified Infrastructure". Since there have been only a few results, also nearby values are displayed.

â§Ľshowingresultsâ§˝

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Publication:614  + (An Encoder-Decoder Deep Learning Approach for Multistep Service Traffic Prediction)
  • Publication:502  + (An Enhanced Method for Objective QoE Analysis in Adaptive Streaming Services)
  • Publication:148  + (An Experimental Study of the Response Time in an Edge-Cloud Continuum with ClusterLink)
  • Publication:7  + (An Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous Resources)
  • Publication:713  + (An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems)
  • Publication:669  + (An Interactive Approach to Support Event Log Generation for Data Pipeline Discovery)
  • Publication:137  + (An NIDS for Known and Zero-Day Anomalies)
  • Publication:647  + (An SQL-Based Declarative Process Mining Framework for Analyzing Process Data Stored in Relational Databases)
  • Publication:769  + (An analytical model for loop tiling transformation)
  • Publication:812  + (An empirical characterization of software bugs in open-source Cyber Physical Systems)
  • Publication:899  + (An iterative approach for model-based requirements engineering in large collaborative projects: A detailed experience report)
  • Publication:352  + (Anomaly Detection and Resolution on the Edge: Solutions and Future Directions)
  • Publication:861  + (Anomaly detection for fault detection in wireless community networks using machine learning)
  • Publication:8  + (Anonymous Authenticated Key Exchange)
  • Publication:34  + (Another Look at Side-Channel Resistant Encoding Schemes)
  • Publication:605  + (Anticipate, Ensemble and Prune: Improving Convolutional Neural Networks via Aggregated Early Exits)
  • Publication:439  + (AnyTEE: An Open and Interoperable Software Defined TEE Framework)
  • Publication:86  + (AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions)
  • Publication:787  + (Applications of Automated Planning for Business Process Management)
  • Publication:718  + (Applying Federated Learning on Decentralized Smart Farming: A Case Study)
  • Publication:267  + (Applying Hybrid Quantum Lstm For Indoor Localization Based On Rssi)
  • Publication:745  + (Applying Model-based Requirements Engineering in Three Large European Collaborative Projects: An Experience Report)
  • Publication:2  + (Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario)
  • Publication:9  + (Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario)
  • Publication:843  + (Argumentation-Based Online Incremental Learning)
  • Publication:466  + (Assessing the Potential Energy Savings of a Fluidified Infrastructure)
  • Publication:850  + (Asymptotic Stability Analysis of Lur e Systems with Butterfly Hysteresis Nonlinearities)
  • Publication:785  + (Asynchronous Time-Sensitive Networking for 5G Backhauling)
  • Publication:497  + (At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives)
  • Publication:866  + (Automated Design Approximation to Overcome Circuit Aging)
  • Publication:385  + (Automated Generation of Smart Contract Code from Legal Contract Specifications with Symboleo2SC)
  • Publication:824  + (Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms)
  • Publication:437  + (Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning)
  • Publication:536  + (Automatic Lighthouse Calibration Using Conics for Indoor Robot Localization)
  • Publication:573  + (Automatic linux malware detection using binary inspection and runtime opcode tracing)
  • Publication:271  + (Autonomy Loops for Monitoring, Operational Data Analytics, Feedback, and Response in HPC Operations)
  • Publication:695  + (B-ETS: A Trusted Blockchain-based Emissions Trading System for Vehicle-to-Vehicle Networks)
  • Publication:231  + (B5G/6G Cyber Security Testbed)
  • Publication:471  + (BASTION: Beyond automated service and security orchestration for next-generation networks)
  • Publication:90  + (BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect)
  • Publication:400  + (BWKA: A Blockchain-Based Wide-Area Knowledge Acquisition Ecosystem)
  • Publication:112  + (Balancing Energy Efficiency and Infrastructure Knowledge in Cloud-to-Edge Task Distribution Systems)
  • Publication:454  + (Balancing local vs. remote state allocation for micro-services in the cloud edge continuum)
  • Publication:819  + (Basic block coverage for search-based unit testing and crash reproduction)
  • Publication:623  + (Basic block coverage for unit test generation at the SBST 2022 tool competition)
  • Publication:325  + (Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation)
  • Publication:114  + (Benchmarking Different Strategies for Offloading ROS2 Computation to the Edge)
  • Publication:143  + (Benchmarking Performance of Various MQTT Broker Implementations in a Compute Continuum)
  • Publication:372  + (Benchmarking Support for RISC-V CPUs in Serverless Computing)
  • Publication:100  + (Benchmarking an EDGELESS Cluster for Serverless Edge Computing Applications)
  • Publication:183  + (Benefits of Agent-Oriented Transitioning from Monolithic To Service-Based Architectures)