共 50 条
- [31] An Authentication Client Proxy Mechanism for Resource-Constrained Devices [J]. 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
- [32] Jini lookup service for resource-constrained mobile devices [J]. PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 1575 - 1578
- [33] A Study of Emergency Siren Recognition on Resource-Constrained Devices [J]. INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 154 - 168
- [34] Runtime Classification of Mobile Malware for Resource-Constrained Devices [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
- [35] Resource-Constrained Neural Architecture Search on Edge Devices [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 134 - 142
- [37] Attacks on Resource-Constrained IoT Devices and Security Solutions [J]. INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
- [38] A Distributed Security Mechanism for Resource-Constrained IoT Devices [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
- [40] Masked encryption algorithm mCrypton for resource-constrained devices [J]. IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 628 - +