Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Nagy, Marcin"'
Autor:
Szydlo, Tomasz, Nagy, Marcin
Deployment of solutions based on TinyML requires meeting several challenges. These include hardware heterogeneity, microprocessor (MCU) architectures, and resource availability constraints. Another challenge is the variety of operating systems for MC
Externí odkaz:
http://arxiv.org/abs/2304.11669
Opportunistic networking is one way to realize pervasive applications while placing little demand on network infrastructure, especially for operating in less well connected environments. In contrast to the ubiquitous network access model inherent to
Externí odkaz:
http://arxiv.org/abs/1506.03108
Autor:
Nagy, Marcin, Bui, Thanh, De Cristofaro, Emiliano, Asokan, N., Ott, Joerg, Sadeghi, Ahmad-Reza
Social relationships are a natural basis on which humans make trust decisions. Online Social Networks (OSNs) are increasingly often used to let users base trust decisions on the existence and the strength of social relationships. While most OSNs allo
Externí odkaz:
http://arxiv.org/abs/1412.2433
In this paper, we propose a new rate control algorithm for conversational multimedia flows. In our approach, along with Real-time Transport Protocol (RTP) media packets, we propose sending redundant packets to probe for available bandwidth. These red
Externí odkaz:
http://arxiv.org/abs/1310.1582
We present the design and implementation of the PeerShare, a system that can be used by applications to securely distribute sensitive data to social contacts of a user. PeerShare incorporates a generic framework that allows different applications to
Externí odkaz:
http://arxiv.org/abs/1307.4046
Publikováno v:
2016 IFIP Networking Conference (IFIP Networking) & Workshops; 2016, p530-535, 6p
Publikováno v:
MobiCom: International Conference on Mobile Computing & Networking; 2014, p1-6, 6p
Autor:
Asokan, N., Dmitrienko, Alexandra, Nagy, Marcin, Reshetova, Elena, Sadeghi, Ahmad-Reza, Schneider, Thomas, Stelle, Stanislaus
Publikováno v:
Applied Cryptography & Network Security (9783642389795); 2013, p432-440, 9p
Publikováno v:
2012 IEEE International Conference on Pervasive Computing & Communications Workshops; 1/ 1/2012, p516-518, 3p