Loading…
The Fog computing paradigm: Scenarios and security issues
Stojmenovic, Ivan, Sheng Wen
Published in 2014 Federated Conference on Computer Science and Information Systems (01.09.2014)
Published in 2014 Federated Conference on Computer Science and Information Systems (01.09.2014)
Get full text
Conference Proceeding
Journal Article
Loading…
Overview of the Transformer-based Models for NLP Tasks
Gillioz, Anthony, Casas, Jacky, Mugellini, Elena, Khaled, Omar Abou
Published in 2020 15th Conference on Computer Science and Information Systems (FedCSIS) (01.09.2020)
Published in 2020 15th Conference on Computer Science and Information Systems (FedCSIS) (01.09.2020)
Get full text
Conference Proceeding
Journal Article
Loading…
Analysis of DDoS-capable IoT malwares
De Donno, Michele, Dragoni, Nicola, Giaretta, Alberto, Spognardi, Angelo
Published in 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (01.09.2017)
Published in 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (01.09.2017)
Get full text
Conference Proceeding
Loading…
Virtual reality for fire evacuation research
Kinateder, Max, Ronchi, Enrico, Nilsson, Daniel, Kobes, Margrethe, Muller, Mathias, Pauli, Paul, Muhlberger, Andreas
Published in 2014 Federated Conference on Computer Science and Information Systems (01.09.2014)
Published in 2014 Federated Conference on Computer Science and Information Systems (01.09.2014)
Get full text
Conference Proceeding
Journal Article
Loading…
Crowdsourcing platform for QoE evaluation for cloud multimedia services
Laghari, Asif, He, Hui, Khan, Asiya, Laghari, Rashid, Yin, Shoulin, Wang, Jiachi
Published in Computer Science and Information Systems (01.09.2022)
Published in Computer Science and Information Systems (01.09.2022)
Get full text
Journal Article
Loading…
Loading…
A novel deep LeNet-5 convolutional neural network model for image recognition
Zhang, Jingsi, Yu, Xiaosheng, Lei, Xiaoliang, Wu, Chengdong
Published in Computer Science and Information Systems (01.09.2022)
Published in Computer Science and Information Systems (01.09.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
A homomorphic-encryption-based vertical federated learning scheme for rick management
Ou, Wei, Zeng, Jianhuan, Guo, Zijun, Yan, Wanqin, Liu, Dingwan, Fuentes, Stelios
Published in Computer Science and Information Systems (01.10.2020)
Published in Computer Science and Information Systems (01.10.2020)
Get full text
Journal Article
Loading…
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges
Kotulski, Zbigniew, Nowak, Tomasz, Sepczuk, Mariusz, Tunia, Marcin, Artych, Rafal, Bocianiak, Krzysztof, Osko, Tomasz, Wary, Jean-Philippe
Published in 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (10.11.2017)
Published in 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (10.11.2017)
Get full text
Conference Proceeding
Loading…
Deep RNN-based network traffic classification scheme in edge computing system
Kim, Kwihoon, Lee, Joo-Hyung, Lim, Hyun-Kyo, Oh, Se, Han, Youn-Hee
Published in Computer Science and Information Systems (2022)
Published in Computer Science and Information Systems (2022)
Get full text
Journal Article
Loading…
From machine-to-machine communications towards cyber-physical systems
Wan, Jiafu, Chen, Min, Xia, Feng, Di, Li, Zhou, Keliang
Published in Computer Science and Information Systems (01.06.2013)
Published in Computer Science and Information Systems (01.06.2013)
Get full text
Journal Article
Loading…
Loading…
Loading…