Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
iot algorithm » rd algorithm (Expand Search)
event based » agent based (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
iot algorithm » rd algorithm (Expand Search)
event based » agent based (Expand Search)
implementing » implemented (Expand Search)
-
1
-
2
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Get full text
doctoralThesis -
3
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…Unlike frame-based imagers, event-based imagers output asynchronous pixel events without the need for global exposure time, therefore lowering both power consumption and latency. …”
-
4
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…The latter are required as the building blocks for event-based Collective Knowledge (CK) organization, where CK underlines the combination of all known data, information, and metadata concerning a given concept or event. …”
Get full text
Get full text
Get full text
Get full text
article -
5
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…SA evolves a solution by minimizing an energy function that is based on testing objectives such as coverage, diversity, and continuity of events. …”
Get full text
Get full text
Get full text
Get full text
article -
6
-
7
-
8
Process Mining over Unordered Event Streams
Published 2020“…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
Get full text
Get full text
Get full text
-
9
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
10
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
11
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
12
Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem
Published 2024“…We present the effectiveness of the developed integrated approaches, Sampling Based Progressive Hedging Algorithm (SBPHA) and Discarding SBPHA (d-SBPHA), over the pure strategies (i.e. …”
-
13
-
14
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
15
-
16
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
17
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
Published 2018“…<p dir="ltr">Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to cloud computing. …”
-
18
An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication
Published 2019“…Aligned with these design objectives, a robust event-triggered attitude control algorithm is proposed to regulate the orientation of a flexible spacecraft subjected to parametric uncertainties, external disturbances, and vibrations due to flexible appendages. …”
-
19
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …”
-
20
MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments
Published 2022“…<p dir="ltr">Many novel IoT-based applications demand low latency, large compute resources, and high privacy. …”