We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Real-time design patterns for the verification of safety-critical embedded systems in model-based approach

    The development of safety-critical real-time embedded systems (RTESs) is a difficult task. Indeed, in addition to functional requirements, these...

    Article 27 January 2024
  2. Early anomaly detection in time series: a hierarchical approach for predicting critical health episodes

    The early detection of anomalous events in time series data is essential in many domains of application. In this paper we deal with critical health...

    Vitor Cerqueira, Luis Torgo, Carlos Soares in Machine Learning
    Article 27 February 2023
  3. Applications of Real-Time Database Systems

    This chapter explores the wide range of applications where real-time databases play a crucial role in managing and processing time-sensitive data. It...
    Pedro Mejia Alvarez, Ricardo J. Zavaleta Vazquez, ... Raul E. Gonzalez Torres in Real-Time Database Systems
    Chapter 2024
  4. Refined Limit Theorems for the Critical Continuous-Time Markov Branching Systems

    We consider a critical homogeneous-continuous-time Markov branching system, i.e. the average value of the branching rate is zero. Our basic...
    Conference paper 2023
  5. Customized Slicing for Industrial Applications

    Wireless networks are required to provide mobile ultra-reliable and low-latency services for applications in vertical industries, promoting the...
    Chapter 2024
  6. Robust-PAC time-critical workflow offloading in edge-to-cloud continuum among heterogeneous resources

    Edge-to-cloud continuum connects and extends the calculation from edge side via network to cloud platforms, where diverse workflows go back and...

    Hongyun Liu, Ruyue **n, ... Zhiming Zhao in Journal of Cloud Computing
    Article Open access 15 April 2023
  7. Evaluating virtualization for fog monitoring of real-time applications in mixed-criticality systems

    Technological advances in embedded systems and the advent of fog computing led to improved quality of service of applications of cyber-physical...

    Marcello Cinque, Luigi De Simone, ... Francesco Vitale in Real-Time Systems
    Article Open access 01 November 2023
  8. ArkGPU: enabling applications’ high-goodput co-location execution on multitasking GPUs

    With the development of deep learning, hardware accelerators represented by GPUs have been used to accelerate the execution of deep learning...

    Jie Lou, Yiming Sun, ... Ninghui Sun in CCF Transactions on High Performance Computing
    Article 24 May 2023
  9. An Edge Cloud Based Coordination Platform for Multi-user AR Applications

    Augmented Reality (AR) applications can reshape our society enabling novel ways of interactions and immersive experiences in many fields. However,...

    Balázs Sonkoly, Bálint György Nagy, ... Balázs Péter Gerő in Journal of Network and Systems Management
    Article Open access 01 April 2024
  10. Integration of Synergetic IoT Applications with Heterogeneous Format Data for Interoperability Using IBM ACE

    Data interoperability is a crucial requirement in IoT to improve services and enhance business opportunities and innovation. Integrating synergetic...

    M. Sandeep, B. R. Chandavarkar in SN Computer Science
    Article 15 November 2023
  11. Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography

    Mission-critical applications refer to the real-time applications, which require fast and secure service provisioning, such as defense sector and...

    Anwesha Mukherjee, Shreya Ghosh, ... Rajkumar Buyya in The Journal of Supercomputing
    Article 08 May 2023
  12. AppChainer: investigating the chainability among payloads in android applications

    Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of...

    **aobo **ang, Yue Jiang, ... Baoxu Liu in Cybersecurity
    Article Open access 02 August 2023
  13. FT-EALU: fault-tolerant arithmetic and logic unit for critical embedded and real-time systems

    This paper presents a fault-tolerant ALU (“FT-EALU”) based on time redundancy and reward/punishment-based learning approaches for real-time embedded...

    Athena Abdi, Sina Shahoveisi in The Journal of Supercomputing
    Article 14 July 2022
  14. Securing Laravel Applications

    In the previous chapter, we delved into the crucial realm of advanced third-party integrations in Laravel, expanding the functionalities of our...
    Chapter 2024
  15. Scaling Laravel Applications

    In the previous chapter, we delved into the essential aspects of performance monitoring and debugging in Laravel, ensuring the efficiency and...
    Chapter 2024
  16. AMAS: Adaptive auto-scaling for edge computing applications

    Edge computing offers a promising approach to building on-demand computing infrastructure, leveraging clusters of small, commodity-scale,...

    Saptarshi Mukherjee, Subhajit Sidhanta in Multimedia Tools and Applications
    Article 18 June 2024
  17. An online ensemble method for auto-scaling NFV-based applications in the edge

    The synergy of edge computing and Machine Learning (ML) holds immense potential for revolutionizing Internet of Things (IoT) applications,...

    Thiago Pereira da Silva, Thais Vasconcelos Batista, ... Paulo Ferreira Pires in Cluster Computing
    Article 01 May 2024
  18. Securing Augmented Reality Applications

    Augmented Reality (AR) applications are becoming increasingly popular and are being used in various fields, including education, entertainment, and...
    Chapter 2024
  19. Chebyshev approximation technique: analysis and applications

    In many situations, exact solutions to complex problems may be challenging or impossible to obtain, making approximation techniques necessary for...

    Elie Nicolas, Rafic Ayoubi, Samir Berjaoui in The Journal of Supercomputing
    Article 21 June 2024
  20. Machine and deep learning for longitudinal biomedical data: a review of methods and applications

    Exploiting existing longitudinal data cohorts can bring enormous benefits to the medical field, as many diseases have a complex and multi-factorial...

    Anna Cascarano, Jordi Mur-Petit, ... Karim Lekadir in Artificial Intelligence Review
    Article Open access 05 August 2023
Did you find what you were looking for? Share feedback.