• Aucun résultat trouvé

[PDF] Top 20 End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT

Has 10000 "End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT" found on our website. Below are the top 20 most common "End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT".

End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT

End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT

... of data and energy-hungry ...on Cloud infrastructures for storage and computing capabilities, transforming their architecture into more a distributed one based on edge facilities ... Voir le document complet

22

Leveraging Renewable Energy in Edge Clouds for Data Stream Analysis in IoT

Leveraging Renewable Energy in Edge Clouds for Data Stream Analysis in IoT

... participating to the increase of data- and energy-hungry ...capabilities for sustaining these applications, users perform computation offloading to the ...cloud. To avoid ... Voir le document complet

11

Distributed Operator Placement for IoT Data Analytics Across Edge and Cloud Resources

Distributed Operator Placement for IoT Data Analytics Across Edge and Cloud Resources

... forecast to exponentially grow within the coming ...strive to make predictions from large streams of complex input in near real ...time. Cloud-based architectures often centralize ... Voir le document complet

11

Confidence measure for speech-to-concept end-to-end spoken language understanding

Confidence measure for speech-to-concept end-to-end spoken language understanding

... applied to different confidence measures on concept/value pairs recognized by the E2E SLU model on MEDIA test dataset in normal mode These results show that external classifiers provide a more reliable ... Voir le document complet

6

CaSA : end-to-end quantitative security analysis of randomly mapped caches

CaSA : end-to-end quantitative security analysis of randomly mapped caches

... lead to lower signaling cost. On a cache with 1 way per hash group in Figure 7- 4(a), the signaling cost increases almost exponentially as the noise increases when the transmitter is composed of 1 ...group ... Voir le document complet

67

End-To-End Performance Analysis of Two-Hop Asynchronous Cooperative Diversity

End-To-End Performance Analysis of Two-Hop Asynchronous Cooperative Diversity

... System 3 : R1 and R2 receive the data, estimate the channel parameters as shown in section III but no separately decoding is performed in r-VAA, then an unprocessed version of the receiv[r] ... Voir le document complet

6

An end to end approach to the resequencing problem

An end to end approach to the resequencing problem

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

29

Recent Advances in End-to-End Spoken Language Understanding

Recent Advances in End-to-End Spoken Language Understanding

... used for experiments (see Table 1). ASR data The corpus for ASR training was composed of corpora from various eval- uation campaigns in the field of automatic speech processing for ... Voir le document complet

14

Towards End-to-End QoS in Ad Hoc Networks

Towards End-to-End QoS in Ad Hoc Networks

... difficult to realize in ad hoc ...reservation to provide hard guarantee when the resources do not ...reasons to beleive that per- hop differentiation technique is more appropriate for ... Voir le document complet

10

End-to-end latency and temporal consistency analysis in networked real-time systems

End-to-end latency and temporal consistency analysis in networked real-time systems

... an analysis method for end-to-end freshness and end-to-end temporal consistency properties on GALTT ...is based on a MILP modelling. Worst case ... Voir le document complet

27

End-to-end multi-view networks for text classification

End-to-end multi-view networks for text classification

... proaches for image processing ( Zhu et ...learns to automatically create views from its input text by focusing on different sets of ...pared to deep Convolutional Networks (CNN) for text ( ... Voir le document complet

7

BeatDB : an end-to-end approach to unveil saliencies from massive signal data sets

BeatDB : an end-to-end approach to unveil saliencies from massive signal data sets

... personal data It is worth noting that, while people are increasingly embracing data-recording tech- nologies and services, many concerns over data privacy are ...raised. For instance, if ... Voir le document complet

153

End-to-End Adaptive Framework for Multimedia Information Retrieval

End-to-End Adaptive Framework for Multimedia Information Retrieval

... approach to existing web resources is one of the major challenges for building the semantic ...search based on indexing data, few are actually accessing the data content and use ... Voir le document complet

11

End-to-end latency and temporal consistency analysis in networked real-time systems

End-to-end latency and temporal consistency analysis in networked real-time systems

... policy. In the civil aeronautics domain, embedded architectures follow the integrated modular avionics (IMA) standard (ARINC 653, ...is based on the reservation of static pre-defined time windows for ... Voir le document complet

26

TurboMouse: End-to-end Latency Compensation in Indirect Interaction

TurboMouse: End-to-end Latency Compensation in Indirect Interaction

... performance in pointing and dragging tasks [7, 9, 11] and can be perceived from as low as 5-10 ms on a touch device ...explored to reduce or compensate for end-to- end latency, ... Voir le document complet

5

Worst-case end-to-end delays evaluation for SpaceWire networks

Worst-case end-to-end delays evaluation for SpaceWire networks

... designed to be used as real-time com- munication networks through the use of virtual ...seem to be mostly designed essentially to carry short packets with small ...apply to SpaceWire ... Voir le document complet

17

Energy-aware Cache Placement Scheme for IoT-based ICN Networks

Energy-aware Cache Placement Scheme for IoT-based ICN Networks

... on energy efficiency, Zou et ...the energy in resource-constrained ...address in packets. Thus, the broadcast is used for interest forward- ing, and unicast for data ... Voir le document complet

7

End-to-end physics-informed representation learning from and for satellite ocean remote sensing data

End-to-end physics-informed representation learning from and for satellite ocean remote sensing data

... view to improving the reconstruc- tion performance issued from satellite altimeter ...comes to complement the considered variational model with a train- able observation ...where to sample additional ... Voir le document complet

9

Demo abstract: end-to-end root cause analysis of a mobile network

Demo abstract: end-to-end root cause analysis of a mobile network

... archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or ...institutions in France or abroad, or from public or private research ... Voir le document complet

3

The Brewing Storm in Cloud Gaming: A Measurement Study on Cloud to End-User Latency

The Brewing Storm in Cloud Gaming: A Measurement Study on Cloud to End-User Latency

... potential to bring new cloud operators into the cloud computing ...alternative to deploying a small number of large datacen- ters is to instead use a large number of smaller ...claim ... Voir le document complet

7

Show all 10000 documents...