Zobrazeno 1 - 10
of 176 663
pro vyhledávání: '"resource constrained"'
Publikováno v:
International Journal of Production Research. Aug2024, Vol. 62 Issue 16, p5631-5653. 23p.
Autor:
Amjadian, Alireza1 (AUTHOR), O'Neil, Ryan1 (AUTHOR), Khatab, Abdelhakim1,2 (AUTHOR), Chen, Jing1 (AUTHOR), Venkatadri, Uday1 (AUTHOR), Diallo, Claver1 (AUTHOR) claver.diallo@dal.ca
Publikováno v:
International Journal of Production Research. Sep2024, p1-23. 23p. 10 Illustrations.
Autor:
Thiruvady, Dhananjay1 (AUTHOR) dhananjay.thiruvady@deakin.edu.au, Nguyen, Su2 (AUTHOR), Sun, Yuan3 (AUTHOR), Shiri, Fatemeh4 (AUTHOR), Zaidi, Nayyar1 (AUTHOR), Li, Xiaodong5 (AUTHOR)
Publikováno v:
International Journal of Production Research. Sep2024, Vol. 62 Issue 17, p6227-6250. 24p.
Autor:
Alwaisi, Zainab, Soderi, Simone
Resource constraints pose a significant cybersecurity threat to IoT smart devices, making them vulnerable to various attacks, including those targeting energy and memory. This study underscores the need for innovative security measures due to resourc
Externí odkaz:
http://arxiv.org/abs/2410.07810
Optimizing Deep Learning-based Simultaneous Localization and Mapping (DL-SLAM) algorithms is essential for efficient implementation on resource-constrained embedded platforms, enabling real-time on-board computation in autonomous mobile robots. This
Externí odkaz:
http://arxiv.org/abs/2409.14515
Autor:
Mlekusch, Johanna1 (AUTHOR) johanna.mlekusch@univie.ac.at, Hartl, Richard F.1 (AUTHOR)
Publikováno v:
International Journal of Production Research. Aug2024, p1-22. 22p. 5 Illustrations.
Recently, generative semantic communication models have proliferated as they are revolutionizing semantic communication frameworks, improving their performance, and opening the way to novel applications. Despite their impressive ability to regenerate
Externí odkaz:
http://arxiv.org/abs/2410.02491
3D object detection with omnidirectional views enables safety-critical applications such as mobile robot navigation. Such applications increasingly operate on resource-constrained edge devices, facilitating reliable processing without privacy concern
Externí odkaz:
http://arxiv.org/abs/2410.01270