Zobrazeno 1 - 10
of 4 355
pro vyhledávání: '"Model at runtime"'
Autor:
Shi, Xinyu, Abdelhamid, Dina Ali, Ilsche, Thomas, Chamazcoti, Saeideh Alinezhad, Evenblij, Timon, Gupta, Mohit, Biswas, Dwaipayan, Catthoor, Francky
The escalating energy demands of main memory have become a concern in modern computing architectures, particularly in large-scale systems, due to frequent access patterns, increasing data volumes, and the lack of efficient power management strategies
Externí odkaz:
http://arxiv.org/abs/2411.17960
Cyber-Physical Systems (CPSs) are increasingly prevalent across various industrial and daily-life domains, with applications ranging from robotic operations to autonomous driving. With recent advancements in artificial intelligence (AI), learning-bas
Externí odkaz:
http://arxiv.org/abs/2408.03892
Robot learning methods have recently made great strides, but generalization and robustness challenges still hinder their widespread deployment. Failing to detect and address potential failures renders state-of-the-art learning systems not combat-read
Externí odkaz:
http://arxiv.org/abs/2310.17552
Publikováno v:
In The Journal of Systems & Software September 2023 203
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Validating wireless protocol implementations is challenging. Today's approaches require labor-intensive experimental setup and manual trace investigation, but produce poor coverage and inaccurate and irreproducible results. We present VERIFI, the fir
Externí odkaz:
http://arxiv.org/abs/1808.03406
Autor:
Ahmed, Ahmed Abdelmoamen1 (AUTHOR) amahmed@pvamu.edu
Publikováno v:
Algorithms. Nov2022, Vol. 15 Issue 11, p390. 19p.
Autor:
Sangwoo Lee, Jungwon Cho
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 6, Iss 1-2, Pp 214-220 (2022)
Malware authorship attribution is a research field that identifies the author of malware by extracting and analyzing features that relate the authors from the source code or binary code of malware. Currently, it is being used as one of the detection
Externí odkaz:
https://doaj.org/article/aa33f8c6a4fd4cb8904f790c868191d4
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Incki, Koray, Ari, Ismail
Publikováno v:
In Procedia Computer Science 2018 134:75-82