Discover more insights into Concept Implementation

Keywords frequently search together with Concept Implementation

Narrow sentence examples with built-in keyword filters

Concept Implementation sentence examples within concept implementation show



Attack-aware Security Function Management



AVGuard: A Forensic Investigation Framework for Autonomous Vehicles


Concept Implementation sentence examples within concept implementation demonstrate



PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises



A Frequency Tunable MIMO Antenna Cluster with Transmitter IC


Concept Implementation sentence examples within concept implementation offer



Demonstrating Dothraki: Tracking Tangibles Atop Tabletops Through De-Bruijn Tori



Dothraki: Tracking Tangibles Atop Tabletops Through De-Bruijn Tori



Learn more from Concept Implementation



Formal Framework for Checking Compliance of Data-Driven Case Management



Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC


More Concept Implementation sentence examples
10.32987/2617-8532-2021-2-117-127

INNOVATIVE APPROACHES TO THE EDUCATIONAL PROCESS ORGANIZATION IN PRIMARY SCHOOL FOR THE NUS


More Concept Implementation sentence examples
10.1109/INDIN45523.2021.9557535

Improving Code Reuse between Industrial Embedded Systems and Discrete Event Simulators


More Concept Implementation sentence examples
10.1109/RoSE52553.2021.00012

Specifying QoS Requirements and Capabilities for Component-Based Robot Software


More Concept Implementation sentence examples
10.30598/JUPITEKVOL3ISS2PP71-80

THE ETHNOMATHEMATICS OF TUTUWARU COMMUNITY IN THE CRAFTS OF KOLI LEAF WEAVING


More Concept Implementation sentence examples
10.5194/egusphere-egu21-3820

Building Australia’s Scalable Drone Cloud



PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises


More Concept Implementation sentence examples
10.1109/ACCESS.2021.3115445

A Theoretical Foundation for Syntactico-Semantic Pattern Recognition



THE ROLE OF CLUSTERS IN THE REALIZATION OF BIOECONOMIC POTENTIAL



Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility



AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop



Offloading load balancers onto SmartNICs


More Concept Implementation sentence examples
10.1007/978-3-030-87626-5_7

Explanation as a Process: User-Centric Construction of Multi-level and Multi-modal Explanations



Weighted approximate Bayesian computation via Sanov’s theorem



Blockchain-based Task-centric Team Building



Demonstrating Dothraki: Tracking Tangibles Atop Tabletops Through De-Bruijn Tori


More Concept Implementation sentence examples
10.1109/ACCESS.2021.3077529

Natural Brain-Inspired Intelligence for Screening in Healthcare Applications



FitFone: Tracking Home Workout in Pandemic Times


More Concept Implementation sentence examples
10.1016/J.KNOSYS.2021.107005

Hybrid agent-based methodology for testing response protocols



Preacher: Network Policy Checker for Adversarial Environments


More Concept Implementation sentence examples
10.23919/IFIPNetworking52078.2021.9472798

Towards Large-Scale Deterministic IP Networks


More Concept Implementation sentence examples
10.1080/00268976.2021.1954709

p†q: a tool for prototyping many-body methods for quantum chemistry


More Concept Implementation sentence examples
10.1051/e3sconf/202128108006

“Smart City” concept in the urban economy digitalization system of St. Petersburg



Formal foundations for responsible application integration



A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs


More Concept Implementation sentence examples
10.1109/CSR51186.2021.9527978

ERAMO: Effective Remote Attestation through Memory Offloading


More Concept Implementation sentence examples
10.1109/VRW52623.2021.00068

Revisiting the Scene-Graph-as-Bus Concept: Inter-networking Heterogeneous Applications Using glTF Fragments



Compressive Spectral Imaging Via Virtual Side Information


More Concept Implementation sentence examples
10.1103/PhysRevD.104.034006

Numerical resummation at subleading color in the strongly ordered soft gluon limit



Attack-aware Security Function Management



PAPIR: privacy-aware personalized information retrieval



NovidChain: Blockchain‐based privacy‐preserving platform for COVID‐19 test/vaccine certificates



Efficient Programmable Random Variate Generation Accelerator From Sensor Noise



THE IMPACT OF INDUSTRY 4.0 ON EDUCATION CONTENTS


More Concept Implementation sentence examples
10.1109/ACCESS.2021.3115343

Efficient Certification of Endpoint Control on Blockchain


More Concept Implementation sentence examples
10.1016/j.ecohyd.2021.08.010

Implementation of ecohydrology to support sustainable water resources management in tropical region, Indonesia



On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage



Blockchain-based Privacy-Preserving Record Linkage: enhancing data privacy in an untrusted environment


More Concept Implementation sentence examples
10.1007/978-3-030-85469-0_13

Delta-BPMN: A Concrete Language and Verifier for Data-Aware BPMN


More Concept Implementation sentence examples
10.1007/978-3-030-77385-4_10

A Semantic Framework to Support AI System Accountability and Audit



Blockchain-based identity and authentication scheme for MQTT protocol



Unified and standalone monitoring module for NFV/SDN infrastructures



Managing Anonymous Keys in a Fog-Computing Platform



Snapshot compressive spectral depth imaging from coded aberrations.


More Concept Implementation sentence examples
10.1109/E-TEMS51171.2021.9524867

Selecting Features for the Next Release in a System of Systems Context


More Concept Implementation sentence examples
10.1016/j.adhoc.2020.102330

Adaptive multi-PHY IEEE802.15.4 TSCH in sub-GHz industrial wireless networks



Towards a standardized model for privacy-preserving Verifiable Credentials



A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks



Machine learning for holistic visualization of STEMI registry data


More Concept Implementation sentence examples
10.1109/SACI51354.2021.9465634

Predict Stock Market Prices with Recurrent Neural Networks using NASDAQ Data Stream



Accelerating Phylogenetics Using FPGAs in the Cloud



A development cycle for automated self-exploration of robot behaviors


More Concept Implementation sentence examples
10.1109/MWSCAS47672.2021.9531838

An Accurate and Compact Hyperbolic Tangent and Sigmoid Computation Based Stochastic Logic


More Concept Implementation sentence examples
10.1109/ICOIN50884.2021.9334000

Lightweight and Scalable DAG based distributed ledger for verifying IoT data integrity



A Review on Sustainable Construction Regulations in Asian Countries: Savvy Insights for Indonesia



A Blockchain-based Iterative Double Auction Protocol using Multiparty State Channels



See-Through a Vehicle: Augmenting Road Safety Information Using Visual Perception and Camera Communication in Vehicles



Development of a block-coupled finite volume methodology for non linear elasticity



5G-Enabled UAVs with Command and Control Software Component at the Edge for Supporting Energy Efficient Opportunistic Networks


More Concept Implementation sentence examples
10.1007/978-3-030-85469-0_15

CoCoMoT: Conformance Checking of Multi-Perspective Processes via SMT (Extended Version)


More Concept Implementation sentence examples
10.3390/ELECTRONICS10050541

D-PARK: User-Centric Smart Parking System over BLE-Beacon Based Internet of Things



Design of a Process Mining Alignment Method for Building Big Data Analytics Capabilities



Automatic Information Exchange in the Early Rescue Chain Using the International Standard Accident Number (ISAN)


More Concept Implementation sentence examples
10.1007/978-3-030-71500-7_3

Bootstrapping Automated Testing for RESTful Web Services



Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC


More Concept Implementation sentence examples
10.1109/ICBC51069.2021.9461152

Verifiable Observation of Permissioned Ledgers


More Concept Implementation sentence examples
10.1109/WoWMoM51794.2021.00019

Extending the QUIC Protocol to Support Live Container Migration at the Edge



Dendrite: Bolt-on Adaptivity for Data Systems


More Concept Implementation sentence examples
10.1109/PIMRC50174.2021.9569523

Cloud Native Hardware Accelerated 5G virtualized Radio Access Network


More Concept Implementation sentence examples
10.1109/ACCESS.2021.3083576

Securing Implantable Medical Devices Using Ultrasound Waves



Time-Slotted LoRa Networks: Design Considerations, Implementations, and Perspectives



Consolidating Policy Chains Using One Pass Packet Steering in Software Defined Data Centers



Reverse engineering for reduction parallelization via semiring polynomials



Semantic Microservice Framework for Digital Twins


More Concept Implementation sentence examples
10.1109/NetSoft51509.2021.9492679

SDN Intent-based conformance checking: application to security policies



Totally-Ordered Prefix Parallel Snapshot Isolation



Random CFI (RCFI): Efficient Fine-Grained Control-Flow Integrity Through Random Verification



Efficient and provable local capability revocation using uninitialized capabilities



Standoff UV-C imaging of alpha particle emitters



Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal


More Concept Implementation sentence examples
10.1109/ATEE52255.2021.9425213

SigFox Wireless Communication Enhancement for Internet of Things: A study



Practical Private Set Intersection Protocols for Privacy-Preserving Applications


More Concept Implementation sentence examples
10.23919/EuCAP51087.2021.9411090

A Frequency Tunable MIMO Antenna Cluster with Transmitter IC



Network Science in Law: A Framework for Polish Case-Law Citation Network Analysis



Adaptation of the Standard Off-Axis Digital Holographic Microscope to Achieve Variable Magnification



Evaluation of pedestrian paths feasibility in the area around Manggarai to support the transit-oriented development concept



Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation


More Concept Implementation sentence examples
10.1109/ACCESS.2021.3087398

Cloud-Based Implementation of a SON Radio Resources Planning System for Mobile Networks and Integration in SaaS Metric



[The Neumarkt concept of nursing case responsibility: A framework for consequent and person-centred realization of the nursing process].


More Concept Implementation sentence examples
10.1088/1742-6596/1818/1/012211

Semantic-Based Multi-Domain Data Access Authorization



Ninja Codes: Exploring Neural Generationof Discreet Visual Codes



Linking Semantic 3D City Models with Domain-Specific Simulation Tools for the Planning and Validation of Energy Applications at District Level


More Concept Implementation sentence examples
10.1109/ICBC51069.2021.9461111

PoSH in Practice: Implementing Proof of Staked Hardware Consensus with Limited Storage


Learn more from Concept Implementation


Concept Implementation
Encyclopedia