Search

Showing total 53 results

Search Constraints

Start Over You searched for: Topic computer Remove constraint Topic: computer Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Publisher ieee Remove constraint Publisher: ieee
53 results

Search Results

1. Peer-to-Peer Energy Trading in Smart Grid Considering Power Losses and Network Fees

2. Disaster Warning and Alerting Integrated Systems Based on CAP profile

3. Edge Computing System applying Integrated Object Recognition based on Deep Learning

4. A Survey on the Security in Cyber Physical System with Multi-Factor Authentication

5. Orthogonal Defect Classification-based Ontology Construction and Application of Software-hardware Integrated Error Pattern of Software-intensive Systems

6. Cadros: The cloud-assisted data replication in decentralized online social networks

7. RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows

8. Analyzing real-world accidents for test scenario generation for automated vehicles

9. A Power Transformer Fault Diagnosis Method-Based Hybrid Improved Seagull Optimization Algorithm and Support Vector Machine

10. Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0

11. Compiling and Analyzing Open Source Malware for Research Purposes

12. Optimizing VMs across Multiple Hosts with Transparent and Consistent Tracking of Unused Memory

13. MSEMT: An Advanced Modelica Library for Power System Electromagnetic Transient Studies

14. PHIL implementation of a decentralized online OPF for active distribution grids

15. Exploring the effectiveness of service decomposition in fog computing architecture for the Internet of Things

16. SCPM-CR: A Novel Method for Spatial Co-location Pattern Mining with Coupling Relation Consideration

17. Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee

18. Implementation of Smart Farm Devices using Open Source Software

19. Detection of Different stages of COPD Patients Using Machine Learning Techniques

20. Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method

21. OS noise Analysis on Azalea-unikernel

22. A Study of Throughput Prediction using Convolutional Neural Network over Factory Environment

23. Software Log Classification in Telecommunication Industry

24. A System Design for Monitoring the Violation of Home Quarantine

25. Peer-to-peer energy trading and energy conversion in interconnected multi-energy microgrids using multi-agent deep reinforcement learning

26. A Machine Learning Approach to Predict Length of Stay for Opioid Overdose Admitted Patients

27. Tens of gigabytes per second JSON-to-Arrow conversion with FPGA accelerators

28. New Predictor-Based Attacks in Processors

29. Shortest Path to Secured Hardware: Domain Oriented Masking with High-Level-Synthesis

30. MobileSwap: Cross-Device Memory Swapping for Mobile Devices

31. JPDHeap: A JVM Heap Design for PM-DRAM Memories

32. Interactive Analog Layout Editing with Instant Placement Legalization

33. Invited: End-to-End Secure SoC Lifecycle Management

34. Distilling Arbitration Logic from Traces using Machine Learning: A Case Study on NoC

35. gGuard: Enabling Leakage-Resilient Memory Isolation in GPU-accelerated Autonomous Embedded Systems

36. Enabling On-Device Model Personalization for Ventricular Arrhythmias Detection by Generative Adversarial Networks

37. I/O-GUARD: Hardware/Software Co-Design for I/O Virtualization with Guaranteed Real-time Performance

38. PRUID: Practical User Interface Distribution for Multi-surface Computing

39. 3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors

40. ISA Modeling with Trace Notation for Context Free Property Generation

41. Two-Stage Neural Network Classifier for the Data Imbalance Problem with Application to Hotspot Detection

42. PRID: Model Inversion Privacy Attacks in Hyperdimensional Learning Systems

43. Towards Reliable Spatial Memory Safety for Embedded Software by Combining Checked C with Concolic Testing

44. AID: Attesting the Integrity of Deep Neural Networks

45. Invited: Bambu: an Open-Source Research Framework for the High-Level Synthesis of Complex Applications

46. CascadeHD: Efficient Many-Class Learning Framework Using Hyperdimensional Computing

47. Low-Cost Lithography Hotspot Detection with Active Entropy Sampling and Model Calibration

48. Quantifying Rowhammer Vulnerability for DRAM Security

49. On the Explainability of Black Box Data-Driven Controllers for Power Electronic Converters

50. Integrated frameworks of unsupervised, supervised and reinforcement learning for solving air traffic flow management problem