Search Results - "Network computing"
-
1
<i>Carlo</i>: cross-plane collaboration for multiple in-network computing applications
Published 2024“…In-network computing (INC) is a new paradigm that allows applications to be executed within the network, rather than on dedicated servers. …”
Get full text
Default Conference proceeding -
2
IN3: A framework for in-network computation of neural networks in the programmable data plane
Published 2024Subjects: Get full text
Default Article -
3
-
4
Classroom and chatroom - why school science pupils should discuss practical science work online
Published 2005“…When referring to the use of networked computers as a tool for online collaborative learning, the term CSCL (Computer Supported Collaborative Learning) is used throughout this paper.…”
Get full text
Default Conference proceeding -
5
Code for Unsupervised ML based Basic Probability Assignment
Published 2019Get full text
Software Software -
6
Design of outdoor wireless networks using computer simulation
Published 2008Get full text
Default Conference proceeding -
7
Real-time and embedded compact deep neural networks for seagrass monitoring
Published 2020“…More importantly, the scale of network can be feasibly adjusted, to balance the network computational demands and segmentation accuracy. …”
Get full text
Default Conference proceeding -
8
Delay-aware and power-efficient resource allocation in virtualized wireless networks
Published 2016Get full text
Default Conference proceeding -
9
Cyber-physical system security for networked industrial processes
Published 2015“…Cyber-physical systems (CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. …”
Get full text
Default Article -
10
Loughborough University - Network Traffic with Port Scanning Attack
Published 2017Get full text
Data Data -
11
CPS for community security and safety
Published 2016“…Cyber - physical systems (CPS) are intelligent robotics systems, linked with the Internet of Things, or technical systems of networked computers, robots and artificial intelligence that interact with the physical world. …”
Get full text
Default Book chapter -
12
Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks
Published 2017Get full text
Data Data