共 50 条
- [31] pKASSO : Towards seamless authentication providing non-repudiation on resource-constrained devices 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 105 - 112
- [32] Jini lookup service for resource-constrained mobile devices PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 1575 - 1578
- [33] An Authentication Client Proxy Mechanism for Resource-Constrained Devices 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
- [34] A Distributed Control Architecture for Resource-constrained Autonomous Systems SYSCON 2022: THE 16TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2022,
- [35] A Study of Emergency Siren Recognition on Resource-Constrained Devices INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 154 - 168
- [36] Efficient Pattern Detection in Extremely Resource-Constrained Devices 2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 10 - +
- [38] Resource-Constrained Neural Architecture Search on Edge Devices IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 134 - 142
- [39] Runtime Classification of Mobile Malware for Resource-Constrained Devices E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215