Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Publication:605 + (Anticipate, Ensemble and Prune: Improving Convolutional Neural Networks via Aggregated Early Exits)
- Publication:439 + (AnyTEE: An Open and Interoperable Software Defined TEE Framework)
- Publication:86 + (AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions)
- Publication:787 + (Applications of Automated Planning for Business Process Management)
- Publication:718 + (Applying Federated Learning on Decentralized Smart Farming: A Case Study)
- Publication:267 + (Applying Hybrid Quantum Lstm For Indoor Localization Based On Rssi)
- Publication:745 + (Applying Model-based Requirements Engineering in Three Large European Collaborative Projects: An Experience Report)
- Publication:2 + (Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario)
- Publication:9 + (Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario)
- Publication:843 + (Argumentation-Based Online Incremental Learning)
- Publication:466 + (Assessing the Potential Energy Savings of a Fluidified Infrastructure)
- Publication:850 + (Asymptotic Stability Analysis of Lur e Systems with Butterfly Hysteresis Nonlinearities)
- Publication:785 + (Asynchronous Time-Sensitive Networking for 5G Backhauling)
- Publication:497 + (At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives)
- Publication:866 + (Automated Design Approximation to Overcome Circuit Aging)
- Publication:385 + (Automated Generation of Smart Contract Code from Legal Contract Specifications with Symboleo2SC)
- Publication:824 + (Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms)
- Publication:437 + (Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning)
- Publication:536 + (Automatic Lighthouse Calibration Using Conics for Indoor Robot Localization)
- Publication:573 + (Automatic linux malware detection using binary inspection and runtime opcode tracing)
- Publication:271 + (Autonomy Loops for Monitoring, Operational Data Analytics, Feedback, and Response in HPC Operations)
- Publication:695 + (B-ETS: A Trusted Blockchain-based Emissions Trading System for Vehicle-to-Vehicle Networks)
- Publication:231 + (B5G/6G Cyber Security Testbed)
- Publication:471 + (BASTION: Beyond automated service and security orchestration for next-generation networks)
- Publication:90 + (BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect)
- Publication:400 + (BWKA: A Blockchain-Based Wide-Area Knowledge Acquisition Ecosystem)
- Publication:112 + (Balancing Energy Efficiency and Infrastructure Knowledge in Cloud-to-Edge Task Distribution Systems)
- Publication:454 + (Balancing local vs. remote state allocation for micro-services in the cloud edge continuum)
- Publication:819 + (Basic block coverage for search-based unit testing and crash reproduction)
- Publication:623 + (Basic block coverage for unit test generation at the SBST 2022 tool competition)
- Publication:325 + (Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation)
- Publication:114 + (Benchmarking Different Strategies for Offloading ROS2 Computation to the Edge)
- Publication:143 + (Benchmarking Performance of Various MQTT Broker Implementations in a Compute Continuum)
- Publication:372 + (Benchmarking Support for RISC-V CPUs in Serverless Computing)
- Publication:100 + (Benchmarking an EDGELESS Cluster for Serverless Edge Computing Applications)
- Publication:183 + (Benefits of Agent-Oriented Transitioning from Monolithic To Service-Based Architectures)
- Publication:412 + (Berth Allocation Considering Multiple Quays: A Practical Approach Using Cuckoo Search Optimization)
- Publication:309 + (Beyond Container CVE Analysis: A GitOps-Based Attestation and Sandbox Framework for Container Supply Chains)
- Publication:485 + (Beyond Multi-Access Edge Computing: Essentials to Realize a Mobile, Constrained Edge)
- Publication:434 + (Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing)
- Publication:435 + (BiRtIO: VirtIO for Real-Time Network Interface Sharing on the Bao Hypervisor)
- Publication:675 + (Big Data Pipeline Discovery through Process Mining: Challenges and Research Directions)
- Publication:665 + (Big Data Pipeline Scheduling and Adaptation on the Computing Continuum)
- Publication:674 + (Big Data Pipelines on the Computing Continuum: Ecosystem and Use Cases Overview)
- Publication:831 + (Big Data Pipelines on the Computing Continuum: Tapping the Dark Data)
- Publication:838 + (Big Data Workflows: Locality-Aware Orchestration Using Software Containers)
- Publication:94 + (Bio-Inspired Drone Control: A Reinforcement Learning-Trained Spiking Neural Networks for Agile Navigation in Dynamic Environment)
- Publication:770 + (Bird s-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML)
- Publication:300 + (Blip: Identifying Boats in a Smart Marina Environment)
- Publication:462 + (Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations)
- Publication:601 + (Bridging the Gap: Enhancing the Utility of Synthetic Data via Post-Processing Techniques)