Articles with "behavior aware" as a keyword



Photo from wikipedia

Malicious-Behavior-Aware D2D Link Selection Mechanism

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2734807

Abstract: Device-to-device (D2D) communications can effectively offload the traffic of cellular system in a distributed way. However, during the data forwarding process, malicious D2D users can intermittently discard data of other users, which seriously affects the… read more here.

Keywords: link selection; mechanism; link; behavior aware ... See more keywords
Photo from wikipedia

Driving Behavior-Aware Network for 3D Object Tracking in Complex Traffic Scenes

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3068899

Abstract: Recently a large number of 3D object tracking methods have been extensively investigated and applied in a variety of applications using convolutional neural networks. Although most of them have made great progress in partial occlusion,… read more here.

Keywords: complex traffic; object tracking; traffic scenes; tracking complex ... See more keywords
Photo by edhoradic from unsplash

Vehicular Behavior-Aware Beamforming Design for Integrated Sensing and Communication Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2023.3251303

Abstract: Communication and sensing are two important features of connected and autonomous vehicles (CAVs). In traditional vehicle-mounted devices, communication and sensing modules exist but in an isolated way, resulting in a waste of hardware resources and… read more here.

Keywords: vehicular behavior; communication; beamforming design; integrated sensing ... See more keywords
Photo from academic.microsoft.com

Behavior-Aware cache hierarchy optimization for low-power multi-core embedded systems

Sign Up to like & get
recommendations!
Published in 2017 at "Modern Physics Letters B"

DOI: 10.1142/s021798491740067x

Abstract: In modern embedded systems, the increasing number of cores requires efficient cache hierarchies to ensure data throughput, but such cache hierarchies are restricted by their tumid size and interfer... read more here.

Keywords: hierarchy optimization; aware cache; behavior aware; cache ... See more keywords