Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Power consumption analysis, measurement, management, and issues: A state-of-the-art review of smartphone battery and energy usage
The advancement and popularity of smartphones have made it an essential and all-purpose
device. But lack of advancement in battery technology has held back its optimum potential …
device. But lack of advancement in battery technology has held back its optimum potential …
A survey of performance optimization for mobile applications
To ensure user satisfaction and success of mobile applications, it is important to provide
highly performant applications. This is particularly important for resource-constrained …
highly performant applications. This is particularly important for resource-constrained …
Face recognition using deep multi-pose representations
We introduce our method and system for face recognition using multiple pose-aware deep
learning models. In our representation, a face image is processed by several pose-specific …
learning models. In our representation, a face image is processed by several pose-specific …
Automated test generation for detection of leaks in Android applications
Android devices have limited hardware resources (eg, memory). Excessive consumption of
such resources may lead to crashes, poor responsiveness, battery drain, and negative user …
such resources may lead to crashes, poor responsiveness, battery drain, and negative user …
Towards a catalog of energy patterns in deep learning development
The exponential rise of deep learning, aided by the availability of several frameworks and
specialized hardware, has led to its application in a wide variety of domains. The availability …
specialized hardware, has led to its application in a wide variety of domains. The availability …
{MLEE}: Effective Detection of Memory Leaks on {Early-Exit} Paths in {OS} Kernels
W Wang - 2021 USENIX Annual Technical Conference (USENIX …, 2021 - usenix.org
Memory leaks in operating system (OS) kernels can cause critical performance and security
issues. However, it is quite challenging to detect memory leaks due to the inherent …
issues. However, it is quite challenging to detect memory leaks due to the inherent …
A distributed learning automata scheme for spectrum management in self-organized cognitive radio network
M Fahimi, A Ghasemi - IEEE Transactions on Mobile Computing, 2016 - ieeexplore.ieee.org
We propose a distributed Learning Automata (LA) for spectrum management problem in
Cognitive Radio (CR) networks. The objective is to design intelligent Secondary Users (SUs) …
Cognitive Radio (CR) networks. The objective is to design intelligent Secondary Users (SUs) …
Dsverifier: A bounded model checking tool for digital systems
This work presents the Digital-Systems Verifier (DSVerifier), which is a verification tool
developed for digital systems. In particular, DSVerifier employs the bounded model checking …
developed for digital systems. In particular, DSVerifier employs the bounded model checking …
Performance management based on resource consumption
AK Vyas, AS Liu, A Ramadurai, DA Schmitt… - US Patent …, 2017 - Google Patents
(57) ABSTRACT A method and apparatus of a device for performance man agement by
terminating application programs that consume an excessive amount of system resources is …
terminating application programs that consume an excessive amount of system resources is …
Assuring Autonomy of UAVs in Mission-critical Scenarios by Performability Modeling and Analysis
Uncrewed Aerial Vehicles (UAVs) have been used in mission-critical scenarios such as
Search and Rescue (SAR) missions. In such a mission-critical scenario, flight autonomy is a …
Search and Rescue (SAR) missions. In such a mission-critical scenario, flight autonomy is a …