News
Abstract: Edge computing techniques allow to exploit the devices ... portion to be offloaded to the available devices at the edge of the network by comparing a centralized and a distributed ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results