135 results on '"Mann, Zoltán Ádám"'
Search Results
2. On Achieving Privacy-Preserving State-of-the-Art Edge Intelligence
3. Predicting the Execution Time of Secure Neural Network Inference
4. Secure Neural Network Inference for Edge Intelligence: Implications of Bandwidth and Energy Constraints
5. Solutions to Data Protection Challenges in Distributed Ledger and Blockchain Technologies: A Combined Legal and Technical Approach
6. Data Protection Challenges in Distributed Ledger and Blockchain Technologies: A Combined Legal and Technical Analysis
7. UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems
8. Feature-Model-Guided Online Learning for Self-Adaptive Systems
9. EdgeDecAp: An auction-based decentralized algorithm for optimizing application placement in edge computing
10. Security- and Privacy-Aware IoT Application Placement and User Assignment
11. Evaluation of fog application placement algorithms: a survey
12. JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services
13. FogProtect: Protecting Sensitive Data in the Computing Continuum
14. Feature Model-Guided Online Reinforcement Learning for Self-Adaptive Services
15. Towards Understanding Adaptation Latency in Self-adaptive Systems
16. Security- and Privacy-Aware IoT Application Placement and User Assignment
17. Secure Data Processing in the Cloud
18. Optimized Application Deployment in the Fog
19. Notions of architecture in fog computing
20. Specification of cloud topologies and orchestration using TOSCA: a survey
21. Cloud Topology and Orchestration Using TOSCA: A Systematic Literature Review
22. Using Risk Patterns to Identify Violations of Data Protection Policies in Cloud Systems
23. Modeling Data Protection Vulnerabilities of Cloud Systems Using Risk Patterns
24. Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead.
25. Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead
26. Feature Model-Guided Online Reinforcement Learning for Self-Adaptive Services
27. Two Are Better Than One: An Algorithm Portfolio Approach to Cloud Resource Management
28. Situativer Datenschutz im Fog-Computing
29. Interplay of Virtual Machine Selection and Virtual Machine Placement
30. Optimization Problems in Fog and Edge Computing
31. Optimized Application Deployment in the Fog
32. Using Risk Patterns to Identify Violations of Data Protection Policies in Cloud Systems
33. Cloud Topology and Orchestration Using TOSCA: A Systematic Literature Review
34. Modeling Data Protection Vulnerabilities of Cloud Systems Using Risk Patterns
35. Accelerating backtrack search with a best-first-search strategy
36. Two Are Better Than One: An Algorithm Portfolio Approach to Cloud Resource Management
37. Automatic online quantification and prioritization of data protection risks
38. Component-Based Hardware-Software Co-design
39. Predicting algorithmic complexity through structure analysis and compression
40. Testing Access to External Information Sources in a Mediator Environment
41. Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration
42. Interplay of Virtual Machine Selection and Virtual Machine Placement
43. Finding optimal hardware/software partitions
44. KuVS-Fachgespräch Fog Computing 2020
45. Optimized Application Deployment using Fog and Cloud Computing Environments
46. Notions of architecture in fog computing
47. Secure software placement and configuration
48. Classification of optimization problems in fog computing
49. Comparison of simulators for fog computing
50. Time-constrained scheduling of large pipelined datapaths
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.