Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has Title" with value "Energy Efficient Deep-Edge Computing through Hardware Machine Learning". Since there have been only a few results, also nearby values are displayed.

â§Ľshowingresultsâ§˝

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Publication:456  + (EDGELESS: A Software Architecture for Stateful FaaS at the Edge)
  • Publication:541  + (EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis)
  • Publication:286  + (ELA: Secure, Lightweight, and Zero-Touch Enrollment for IoT Devices)
  • Publication:287  + (ENOCH: ENabling On-body network Contention Handling)
  • Publication:191  + (Edge AI in the computing continuum: Consistency and Availability at Early Design Stages)
  • Publication:180  + (Edge Intelligence for Industrial IoT: Opportunities and Limitations)
  • Publication:581  + (Edge Networking Technology Drivers for Next-generation Internet of Things in the TERMINET Project)
  • Publication:789  + (Edge infrastructure traces)
  • Publication:867  + (Edge intelligence secure frameworks: Current state and future challenges)
  • Publication:175  + (Edge-cloud continuum driven industry 4.0)
  • Publication:391  + (EdgeBus: Co-Simulation based resource management for heterogeneous mobile edge computing environments)
  • Publication:606  + (EdgeCloud Mon: A lightweight monitoring stack for K3s clusters)
  • Publication:553  + (Efficient CNN-based low-resolution facial detection from UAVs)
  • Publication:89  + (Efficient and Safe I/O Operations for Intermittent Systems)
  • Publication:246  + (Efficient, Reliable and Secure Framework for the 5G Virtualization of the UltraSound Medical System)
  • Publication:539  + (Embedded Artificial Intelligence for IoT Applications Using the MAX78000)
  • Publication:268  + (Emergency communications leveraging decentralized swarm computing)
  • Publication:32  + (Emerging IoT Applications and Architectures for Smart Maritime Container Terminals)
  • Publication:326  + (Empirical Comparison of Face Verification Algorithms from UAVs)
  • Publication:696  + (Enabling An Isolated And Energy-Aware Deployment of Computationally Intensive Kernels on Multi-Tenant Environments)
  • Publication:201  + (Enabling Cloud-native IoT device management)
  • Publication:121  + (Enabling Compute and Data Sovereignty with Infrastructure-Level Data Spaces)
  • Publication:359  + (Enabling Syscall Intercept for RISC-V)
  • Publication:895  + (Enabling Wireless-powered IoT through Incentive-based UAV Swarm Orchestration)
  • Publication:526  + (Energy Efficiency in Agriculture through Tokenization of 5G and Edge Applications)
  • Publication:104  + (Energy Efficient Deep-Edge Computing through Hardware Machine Learning)
  • Publication:896  + (Energy-Aware Design of UAV-Mounted RIS Networks for IoT Data Collection)
  • Publication:457  + (Energy-Efficient Deployment of Stateful FaaS Vertical Applications on Edge Data Networks)
  • Publication:450  + (Energy-Efficient Task Computation at the Edge for Vehicular Services)
  • Publication:534  + (Energy-aware multi-robot task scheduling using meta-heuristic optimization methods for ambiently-powered robot swarms)
  • Publication:133  + (Enhanced Smart Advertising through Federated Learning)
  • Publication:528  + (Enhancing 5G performance: A standalone system platform with customizable features)
  • Publication:341  + (Enhancing Machine Learning Performance in Dynamic Cloud Environments with Auto-Adaptive Models)
  • Publication:127  + (Enhancing Network Intrusion Detection: An Online Methodology for Performance Analysis)
  • Publication:584  + (Enhancing Once-For-All: A Study on Parallel Blocks, Skip Connections and Early Exits)
  • Publication:571  + (Enhancing cybersecurity in railways: Machine learning approaches for attack detection)
  • Publication:428  + (Enhancing network slice security with Deep Reinforcement Learning and Moving Target Defense strategies)
  • Publication:423  + (Enhancing the output of time series forecasting algorithms for cloud resource provisioning)
  • Publication:452  + (Entropy)
  • Publication:749  + (Ethical AI-Powered Regression Test Selection)
  • Publication:361  + (Evaluating ECC for Cache Reliability Under Multi-Bit Upsets: A Design Space Exploration)
  • Publication:721  + (Evaluating SDN Applicability in the Edge)
  • Publication:151  + (Evaluating the Impact of Inter-Cluster Communications in Edge Computing)
  • Publication:210  + (Evaluation of Cloud Continuum Computing Resources: A Mathematical Programming approach)
  • Publication:645  + (ExeKG: Executable Knowledge Graph System for User-friendly Data Analytics)
  • Publication:635  + (ExeKGLib: Knowledge Graphs-Empowered Machine Learning Analytics)
  • Publication:662  + (Executable Knowledge Graph for Transparent Machine Learning in Welding Monitoring at Bosch)
  • Publication:661  + (Executable Knowledge Graphs for Machine Learning: A Bosch Case of Welding Monitoring)
  • Publication:347  + (Executing Mobile Edge Functions in the Cloud-Edge Continuum: Analyzing Threats to Location Integrity)
  • Publication:908  + (Explain what you see: argumentation-based learning and robotic vision)
  • Publication:396  + (Exploring Collaborative Diffusion Model Inferring for AIGC-enabled Edge Services)