We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Device (Chip Design) Modeling

    This chapter provides the principles and implementations of FPGA device (chip design) modeling. FPGA device information can be derived from the...
    Kaihui Tu, **fan Tang, ... Zhufei Chu in FPGA EDA
    Chapter 2024
  2. Device Characterization for Opportunistic Networks

    When implementing opportunistic networks in real applications, not only connectivity problems need to be addressed, but also device restrictions....
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  3. Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree

    Industrial control device asset identification is essential to the active defense and situational awareness system for industrial control network...

    Wei Yang, Yushan Fang, ... Yu Yao in Journal of Network and Systems Management
    Article 05 March 2024
  4. Towards cyber awareness among smart device users: an interactive, educational display of IoT device vendors compromise history

    In recent history, individual-owned devices were used to launch widespread botnet attacks like Mirai. it is therefore critically needed to educate...

    Gatha Varma, Ritu Chauhan, Dhananjay Singh in Multimedia Tools and Applications
    Article 13 November 2023
  5. HandiMathKey-Device

    Ty** mathematics is sometimes difficult with text editor functions for students with motor impairment and other associated impairments (visual,...
    Frédéric Vella, Nathalie Dubus, ... Nadine Vigouroux in HCI International 2023 – Late Breaking Papers
    Conference paper 2023
  6. Enhancing smart home device identification in WiFi environments for futuristic smart networks-based IoT

    The recognition of smart home devices within WiFi environments stands as a pivotal focus within contemporary Internet of Things (IoT) security,...

    Hassan Falah Fakhruldeen, Mohamed J. Saadh, ... Ghulam Mustafa in International Journal of Data Science and Analytics
    Article 07 January 2024
  7. Radio frequency fingerprinting techniques for device identification: a survey

    The Internet of Things (IoT) paradigm and the advanced wireless technologies of 5G and beyond are expected to enable diverse applications such as...

    Sohail Abbas, Manar Abu Talib, ... Ali Mohamed in International Journal of Information Security
    Article 28 December 2023
  8. Advanced Memory and Device Packaging

    Assembly and reliability of memory device packaging are very important topics in semiconductor manufacturing. There are many books and papers written...
    Chapter 2023
  9. Wearable Device Dataset for Stress Detection

    Stressful situations produce physiological changes that are difficult to measure. Among the acute stress body effects, increased blood glucose level...
    Andrea Hongn, Lara Eleonora Prado, ... María Paula Bonomini in Bioinspired Systems for Translational Applications: From Robotics to Social Engineering
    Conference paper 2024
  10. H4VDM: H.264 Video Device Matching

    Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in...
    Conference paper 2023
  11. An embedded device-oriented fatigue driving detection method based on a YOLOv5s

    Currently, most fatigue driving detection methods rely on complex neural networks whose feasibility in hardware implementation needs to be further...

    Jiaxiang Qu, Ziming Wei, Yimin Han in Neural Computing and Applications
    Article 07 December 2023
  12. Lattice-based device-to-device authentication and key exchange protocol for IoT system

    Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...

    Article 05 July 2024
  13. Experience Design for Multi-device Sharing Based on 3C Framework

    With the development of current technology, intelligent interaction scenarios based on multi-device collaboration are becoming more and more...
    Kun Wang, Bilan Huang, ... Tingting Gu in Distributed, Ambient and Pervasive Interactions
    Conference paper 2023
  14. On-Device Query Auto-completion for Email Search

    Traditional query auto-completion (QAC) relies heavily on search logs collected over many users. However, in on-device email search, the scarcity of...
    Yifan Qiao, Otto Godwin, Hua Ouyang in Advances in Information Retrieval
    Conference paper Open access 2024
  15. Adaptive device sampling and deadline determination for cloud-based heterogeneous federated learning

    As a new approach to machine learning, Federated learning enables distributned traiing on edge devices and aggregates local models into a global...

    Deyu Zhang, Wang Sun, ... Shiwen He in Journal of Cloud Computing
    Article Open access 03 November 2023
  16. Device personalization for heterogeneous populations: leveraging physician expertise and national population data to identify medical device patient user groups

    Interaction with patient-facing medical devices requires integrated performance of both physical and cognitive tasks that are highly dependent on...

    Benjamin M. Knisely, Monifa Vaughn-Cooke, ... Jeffrey C. Fink in User Modeling and User-Adapted Interaction
    Article 12 October 2021
  17. Device to Device Communication over 5G

    The dependency on small cells, the cost of establishing a 5G infrastructure, and traffic at the Base Transceiver Station (BTS) can be reduced by...
    Md.Tabrej Khan, Ashish Adholiya in Computing Science, Communication and Security
    Conference paper 2022
  18. Opening the “Black Box” of VR for Workforce Development: Investigating Learners’ Device, Usage, and Identities

    Virtual reality (VR) technologies are increasingly used in workforce development and training, and studies show they can be effective tools to...
    Eileen McGivney, Tessa Forshaw, ... Tina Grotzer in Immersive Learning Research Network
    Conference paper 2024
  19. Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography

    Abstract

    An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor...

    Article 01 December 2023
  20. Research of ReLU output device in ternary optical computer based on parallel fully connected layer

    When implementing fully connected layer computation on electronic computer (EC), slow computing speed and high power consumption result in the...

    Kai Song, Huaqiong Ma, ... Li** Yan in The Journal of Supercomputing
    Article 06 November 2023
Did you find what you were looking for? Share feedback.