Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Publication:664 + (SIM-PIPE DryRunner: An approach for testing container-based big data pipelines and generating simulation data)
- Publication:765 + (Safety by Construction: Pattern-Based Application of Safety Mechanisms in XANDAR)
- Publication:157 + (Sandboxing Functions For Efficient and Secure Multi-tenant Serverless Deployments)
- Publication:538 + (Scalable Plug-and-Play Robotic Fabrics Based on Kilobot Modules)
- Publication:421 + (Scalable energy-aware VM allocation on cloud data centers through mathematical programming models)
- Publication:650 + (Scaling Data Science Solutions with Semantics and Machine Learning: Bosch Case)
- Publication:156 + (Scaling Serverless Functions in Edge Networks: A Reinforcement Learning Approach)
- Publication:321 + (Scaling Up Performance of Managed Applications on NUMA Systems)
- Publication:384 + (Scaling a Variant Calling Genomics Pipeline with FaaS)
- Publication:106 + (Scheduling Latency-Sensitive Tasks in the Cloud Continuum with Hierarchical Reinforcement Learning)
- Publication:113 + (Scheduling Multi-Component Applications Across Federated Edge Clusters With Phare)
- Publication:657 + (Scheduling of Distributed Applications on the Computing Continuum: A Survey)
- Publication:503 + (Seamless User-Generated Content Processing for Smart Media: Delivering QoE-Aware Live Media with YOLO-Based Bib Number Recognition)
- Publication:178 + (Sec5GLoc: Securing 5G Indoor Localization via Adversary-Resilient Deep Learning Architecture)
- Publication:540 + (Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols)
- Publication:862 + (Secure Distributed Storage Orchestration on Heterogeneous Cloud-Edge Infrastructures)
- Publication:463 + (Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case)
- Publication:599 + (Secure execution of ML workflows on the Computing Continuum)
- Publication:99 + (SecureExecutor: An Automated Way to Leverage SCONE to Enhance Application Security)
- Publication:708 + (Secured Distributed Storage Resource Allocation on Cloud-Edge Infrastructures)
- Publication:565 + (Securing IoT: Unveiling Attacks with Multiview-Multitask Learning)
- Publication:351 + (Securing P4-SDN Data Plane against Flow Table Modification Attack)
- Publication:596 + (Securing the Execution of ML Workflows across the Compute Continua)
- Publication:705 + (Securitization of cloud, edge and IoT communications through hardware accelerations/offloadings)
- Publication:736 + (Security Requirements as Code: Example from VeriDevOps Project)
- Publication:748 + (Security Requirements as Code:Example from VeriDevOps Project)
- Publication:744 + (Security Testing and Resilience)
- Publication:777 + (Security in Cloud-Native Services: A Survey on Key Features)
- Publication:487 + (Security in DevSecOps: Applying Tools and Machine Learning to Verification and Monitoring Steps)
- Publication:414 + (Self-* capabilities of heterogeneous nodes in the computing continuum; a research review)
- Publication:334 + (Semantic Programming for Device-Edge-Cloud Continuum)
- Publication:402 + (Semantic-Enhanced Digital Twin System for Robot Environment Interaction Monitoring)
- Publication:1 + (Semantics for Resource Selection in Next Generation Internet of Things Systems)
- Publication:724 + (Semi-Grant-Free Non-Orthogonal Multiple Access for Tactile Internet of Things)
- Publication:55 + (Serverful Functions: Leveraging Servers in Complex Serverless Workflows (industry track))
- Publication:797 + (Serverless Workflows for Containerised Applications in the Cloud Continuum)
- Publication:464 + (Serverless computing: A security perspective)
- Publication:781 + (Serverless computing: a security perspective)
- Publication:354 + (Set in stone: Analysis of an immutable web3 social media platform)
- Publication:304 + (Sharing the control of robot swarms among multiple human operators: A user study)
- Publication:84 + (Shedding Light on Static Partitioning Hypervisors for Arm-based Mixed-Criticality Systems)
- Publication:320 + (Short Paper: Estimating Patch Propagation Times across Blockchain Forks)
- Publication:332 + (Short Reasons for Long Vectors in HPC CPUs: A Study Based on RISC-V)
- Publication:168 + (Should I Stay or Should I Go: A Learning Approach for Drone-based Sensing Applications)
- Publication:4 + (Sicherheitsmechanismen des Cloud-Computings zur Verwendung in Korrekturverfahren)
- Publication:20 + (Side-Channel Analysis of OpenVINO-based Neural Network Models)
- Publication:25 + (Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation)
- Publication:375 + (Silent Data Corruptions in Computing Systems: Early Predictions and Large-Scale Measurements)
- Publication:576 + (Silent Data Corruptions: Microarchitectural Perspectives)
- Publication:376 + (Silent Data Corruptions: The Stealthy Saboteurs of Digital Integrity)
- Publication:373 + (Silent Data Errors: Sources, Detection, and Modeling)