Author of the publication

EBV: Electronic Bee-Veterinarian for Principled Mining and Forecasting of Honeybee Time Series.

, , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OpenSense: An Open-World Sensing Framework for Incremental Learning and Dynamic Sensor Scheduling on Embedded Edge Devices., , and . CoRR, (2023)mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments., , , and . Comput. J., 58 (10): 2461-2475 (2015)Toward Practical Weakly Hard Real-Time Systems: A Job-Class-Level Scheduling Approach., , and . IEEE Internet Things J., 8 (8): 6692-6708 (2021)Predictable Shared Cache Management for Multi-Core Real-Time Virtualization., and . ACM Trans. Embed. Comput. Syst., 17 (1): 22:1-22:27 (2018)Know the Unknowns: Addressing Disturbances and Uncertainties in Autonomous Systems : Invited Paper., , , , , , , , , and 1 other author(s). ICCAD, page 82:1-82:9. IEEE, (2020)Mixed-Trust Computing for Real-Time Systems., , , , , , and . RTCSA, page 1-11. IEEE, (2019)AegisDNN: Dependable and Timely Execution of DNN Tasks with SGX., , , , and . RTSS, page 68-81. IEEE, (2021)Attribute-Based Encryption for Commercial Content Distribution., , , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 205-213. Springer, (2012)An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack., , and . ICITCS, page 1-4. IEEE Computer Society, (2015)Unleashing the Power of Preemptive Priority-based Scheduling for Real-Time GPU Tasks., , , and . CoRR, (2024)