EtinyNet: Extremely Tiny Network for TinyML
نویسندگان
چکیده
There are many AI applications in high-income countries because their implementation depends on expensive GPU cards (~2000$) and reliable power supply (~200W). To deploy resource-poor settings cheaper (~20$) low-power devices (
منابع مشابه
PicOS: A Tiny Operating System for Extremely Small Embedded Platforms
We present a certain programming paradigm for implementing low-footprint applications on small embedded platforms and a tiny operating system based on that paradigm. The primary objective of our work was to create a friendly environment for rapid, reliable, and efficient deployment of customizable microcontroller applications primarily (but not necessarily) aimed at the wireless world. The prop...
متن کاملANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a way as the present Internet does. In this scenario, new challenges appear with such massive deployment, as the constant interaction of nodes and networks will transform them in dynamic entities that will need to evol...
متن کاملA Network-Centric Approach to Embedded Software for Tiny Devices
The ability to incorporate low-power, wireless communication into embedded devices gives rise to a new genre of embedded software that is distributed, dynamic, and adaptive. This paper describes the network-centric approach to designing software for highly constrained devices embodied in TinyOS. It develops a tiny Active Message communication model and shows how it is used to build non-blocking...
متن کاملCrypto for Tiny Objects
This work presents the first known implementation of elliptic curve cryptography for sensor networks, motivated by those networks’ need for an efficient, secure mechanism for shared cryptographic keys’ distribution and redistribution among nodes. Through instrumentation of UC Berkeley’s TinyOS, this work demonstrates that secret-key cryptography is already viable on the MICA2 mote. Through anal...
متن کاملCan a Fuzzy Rule Extraction Find an Extremely Tiny non-Self Region?
This paper reports one snapshot of our on-going experiments in which a common target we call a-tiny-island-in-a-huge-lake is explored with different methods ranging from a data-mining technique to an artificial immune system. Our implicit interest is a network intrusion detection where we usually do not know what does an illegal transaction pattern look like until it completed intrusion when it...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence
سال: 2022
ISSN: ['2159-5399', '2374-3468']
DOI: https://doi.org/10.1609/aaai.v36i4.20387