Discover more insights into Constrained Application 제한된 적용

Keywords frequently search together with Constrained Application 제한된 적용

Narrow sentence examples with built-in keyword filters

Constrained Application sentence examples within web transfer protocol

Hardware and Software Framework for Controlling and Monitoring IoT Appliances

An Overview of Security in CoAP: Attack and Analysis

Constrained Application sentence examples within Resource Constrained Application

LFSR-Based Bit-Serial GF(2m) Multipliers Using Irreducible Trinomials

Comprehensive Study of Routing and Clustering Protocols in Wireless Sensor Networks

Constrained Application sentence examples within Time Constrained Application

Next Generation Noise and Affine Invariant Video Watermarking Scheme Using Harris Feature Extraction

Computing Coding Solutions for Opportunistic Network Coding Used in Wireless Mesh Networks

Constrained Application sentence examples within Energy Constrained Application

PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks

Ultra-Low-Energy DSP Processor Design for Many-Core Parallel Applications

Constrained Application sentence examples within Bandwidth Constrained Application

Towards an Adaptive Multi-Modal Traffic Analytics Framework at the Edge

A Comparison of Compression Codecs for Maritime and Sonar Images in Bandwidth Constrained Applications

Constrained Application sentence examples within Latency Constrained Application

Intrusion Detection for Cyber–Physical Systems Using Generative Adversarial Networks in Fog Environment

Serving deep neural networks at the cloud edge for vision applications on mobile platforms

Constrained Application sentence examples within constrained application protocol

The Impact of Networking Protocols on Massive M2M Communication in the Industrial IoT

A Survey of Application Layer Protocols for Internet of Things

Constrained Application sentence examples within constrained application scenario

Pruning by Explaining: A Novel Criterion for Deep Neural Network Pruning

Real-Time Performance Evaluation for Robotics

Constrained Application sentence examples within constrained application layer

A proposal for bridging application layer protocols to HTTP on IoT solutions

RPL And COAP Protocols, Experimental Analysis for IOT: A Case Study

Exploiting Motion Perception in Depth Estimation Through a Lightweight Convolutional Neural Network

Machine Learning: A Catalyst for THz Wireless Networks

A Reinforcement-Learning-Based Energy-Efficient Framework for Multi-Task Video Analytics Pipeline

Continuous-Time Programming of Floating-Gate Transistors for Nonvolatile Analog Memory Arrays

Impact of temperature on analog/RF, linearity and reliability performance metrics of tunnel FET with ultra-thin source region

A Shallow Neural Network for Real-Time Embedded Machine Learning for Tensorial Tactile Data Processing

Neural Network Training With Stochastic Hardware Models and Software Abstractions

A 1.25W 46.5%-Peak-Efficiency Transformer-in-Package Isolated DC-DC Converter Using Glass-Based Fan-Out Wafer-Level Packaging Achieving 50mW/mm2 Power Density

Design Optimization of a Synchronous Reluctance Machine for High-Performance Applications

Performance investigation of LAMBDA and bootstrapping methods for PPP narrow-lane ambiguity resolution

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT

AREEBA: An Area Efficient Binary Huff-Curve ARchitecture

Side-channel Resistant Implementations of a Novel Lightweight Authenticated Cipher with Application to Hardware Security

Set-Based Obfuscation for Strong PUFs Against Machine Learning Attacks

A 28nm Configurable Asynchronous SNN Accelerator with Energy-Efficient Learning

Dynamic Event-triggered Control and Estimation: A Survey

Small pixel MWIR sensors for low SWaP applications

A markerless platform for ambulatory systems neuroscience

Sentinel-1 A-DInSAR Approaches to Map and Monitor Ground Displacements

Real-Time Information-Theoretic Exploration with Gaussian Mixture Model Maps

Plasma Planar Helical Antenna

An Efficient Fault-Tolerant Scheduling Approach with Energy Minimization for Hard Real-Time Embedded Systems

Deterministic Dynamic Networks (DDN)

Integer-Value Encoding for Approximate On-Chip Communication

An Analog Design of 2D DCT Processor

Experimental demonstration of multi-watt wireless power transmission to ferrite-core receivers at 6.78 MHz

An algorithm for sink positioning in bus-assisted smart city sensing

Effects of Proton-Induced Radiation Damage on CLYC and CLLBC Performance

In-Memory Computing: Advances and prospects

Ultra-Low Voltage Microcontrollers

Practical fault resilient hardware implementations of AES

A Randomized Low Latency Resource Sharing Algorithm for Fog Computing

Hardware Constructions for Error Detection of Number-Theoretic Transform Utilized in Secure Cryptographic Architectures

A Framework for Real-Time Face-Recognition

Organic Rankine cycle systems for engine waste-heat recovery: Heat exchanger design in space-constrained applications

Broadband Single-Layered, Single-Sided Flexible Linear-to-Circular Polarizer Using Square Loop Array for S-Band Pico-Satellites

End-to-End Performance Analysis of Delay-Sensitive Multi-Relay Networks

A real-time Monte Carlo tool for individualized dose estimations in clinical CT.

Face Detection in Camera Captured Images of Identity Documents Under Challenging Conditions

Simplex FastICA: An Accelerated and Low Complex Architecture Design Methodology for $n$ D FastICA

Ultra Slim Optical Zoom System Using Alvarez Freeform Lenses

A Quad-Channel 11-bit 1-GS/s 40-mW Collaborative ADC Enabling Digital Beamforming for 5G Wireless

Sequence stratigraphy of the mixed wave-tidal-dominated Mesoproterozoic sedimentary succession in Chapada Diamantina Basin, Espinhaço supergroup– Ne/Brazil

Parallel Offloading in Green and Sustainable Mobile Edge Computing for Delay-Constrained IoT System

Energy-Efficient Intra-Task DVFS Scheduling Using Linear Programming Formulation

Experimental Study on Multiple Face Detection with Depth and Skin Color

Learn more from Constrained Application 제한된 적용

Constrained Application 제한된 적용

Constrained Application 제한된 적용
Encyclopedia 백과사전