Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Publication:513 + (Lightweight authenticated key exchange for low-power IoT networks using EDHOC)
- Publication:663 + (Literal-Aware Knowledge Graph Embedding for Welding Quality Monitoring: A Bosch Case)
- Publication:898 + (LoRa-Based IoT Network Assessment in Rural and Urban Scenarios)
- Publication:858 + (Local-HDP: Interactive open-ended 3D object category recognition in real-time robotic scenarios)
- Publication:680 + (Locality-Aware Workflow Orchestration for Big Data)
- Publication:470 + (Locality-aware deployment of application microservices for multi-domain fog computing)
- Publication:288 + (Low-latency Symbol-Synchronous Communication for Multi-hop Sensor Networks)
- Publication:283 + (Low-power Energy Management Module for Ambiently Powered Robotic Swarms)
- Publication:449 + (M100 ExaData: a data collection campaign on the CINECA s Marconi100 Tier-0 supercomputer)
- Publication:806 + (MAGES 4.0: Accelerating the world s transition to VR training and democratizing the authoring of the medical metaverse)
- Publication:390 + (MASTER: Machine Learning-Based Cold Start Latency Prediction Framework in Serverless Edge Computing Environments for Industry 4.0)
- Publication:110 + (MIMO: a Framework for Extensible and Flexible Intent-based Workload Meta-Orchestration)
- Publication:177 + (MLIoT: Transparent and Secure ML Offloading in the Cloud-Edge-IoT Continuum)
- Publication:416 + (MLLess: Achieving cost efficiency in serverless machine learning training)
- Publication:387 + (MP-SL: Multihop Parallel Split Learning)
- Publication:642 + (MPEC2: Multilayer and Pipeline Video Encoding on the Computing Continuum)
- Publication:491 + (MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering)
- Publication:644 + (Machine Learning Based Resource Utilization Prediction in the Computing Continuum)
- Publication:703 + (Machine Learning Network Tomography with partial topology knowledge and dynamic routing)
- Publication:900 + (Machine Learning Techniques for Software Vulnerability Prediction: A comparative study)
- Publication:504 + (Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation)
- Publication:814 + (Machine learning-based test selection for simulation-based testing of self-driving cars software)
- Publication:556 + (Machine-Learning-Based Carbon Dioxide Concentration Prediction for Hybrid Vehicles)
- Publication:370 + (Malware Detection on Linux Using Runtime Opcode Tracing)
- Publication:529 + (Management of 6TiSCH Networks Using CORECONF: A Clustering Use Case)
- Publication:187 + (Managing Far-Edge Devices using Kubernetes)
- Publication:68 + (Manifesting the Elasticity of Serverless Data Pipelines: a Metabolomics Use Case)
- Publication:826 + (Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems)
- Publication:6 + (Marginal Cost of Computation as a Collaborative Strategy for Resource Management at the Edge)
- Publication:441 + (Marionette: Manipulate Your Touchscreen via A Charging Cable)
- Publication:788 + (Mastering Robotic Process Automation with Process Mining)
- Publication:633 + (Matching-based Scheduling of Asynchronous Data Processing Workflows on the Computing Continuum)
- Publication:209 + (Maximizing the Application Utility in the Computing Continuum by Feasible Site Selection)
- Publication:109 + (Measured Firmware Management for Integrity of Edge Devices)
- Publication:734 + (Message from A-MOST 2023 Workshop Chairs)
- Publication:740 + (Message from ITEQS 2023 Workshop Chairs)
- Publication:751 + (Message from the ITEQS 2021 Workshop Chairs)
- Publication:739 + (Message from the ITEQS 2022 Workshop Chairs)
- Publication:815 + (Metamorphic Testing for Web System Security)
- Publication:77 + (Mind the CORS)
- Publication:537 + (Minimal-Overlap Centrality for Multi-Gateway Designation in Real-Time TSCH Networks)
- Publication:63 + (Mobility Usecase: Intelligent Service Migration in Cloud-Edge Continuum)
- Publication:841 + (Mobility-Aware IoT Applications Placement in the Cloud Edge Continuum)
- Publication:344 + (Mobility?Hub: Next Generation Traffic Light Controller integrated into the Computing Continuum with Serverless Technology and AI?enabled Orchestration)
- Publication:727 + (Model-Agnostic Meta-Learning Techniques: A State-of-The-Art Short Review)
- Publication:764 + (Model-Based STPA: Enabling Safety Analysis Coverage Assessment with Formalization)
- Publication:756 + (Model-Based STPA: Towards Safety-Guided Design with Formalization)
- Publication:790 + (Modeling and Analysis of Data Trading on Blockchain-Based Market in IoT Networks)
- Publication:682 + (Modeling and analysis of butterfly loops via Preisach operators and its application in a piezoelectric material)
- Publication:567 + (Modeling the Green Cloud Continuum: integrating energy considerations into Cloud Edge models)
- Publication:212 + (Modelling Adaptive Autonomic Cloud Application Utility Using Template Functions)